On 10/05/2010 03:34 PM, Scott Lewis wrote:
This isn't really related to bridging. If your machine connects to an
access point (rogue) and that person behind that access point roots
your box, and you also are connected via LAN, that person has access
to your LAN without physical building access. No, I don't think it
would be very common, but they are subject to many audits, as they are
subject to PCI audits, HIPPA and SOX, so lots of odd things come up.
:)

<snip> while we're at it, maybe we could just smuggle in a computer already infected with a worm so we don't need to worry about the wireless being a vector so much as just the person using it as the weakness in the security chain.

Honestly it would be a lot easier just to offer the user a candy bar for their password (google for the reference if you didn't know about it)

Sometimes reading the paranoia from some companies is like listening in on a game of IT Clue. I get into their salary spreadsheet, using an XBox running Linux, hooked into a drop in an unused closet, which uploads a worm into their printer server with outdated firmware, then BAM! It emails me their print jobs!

:-)

Nothing on you in particular, I just think that sometimes companies go out of their way for wacky scenarios that really shouldn't be much of a concern in the first place while leaving open other more obvious routes of penetration, and forgetting their biggest security weakness is their users. The description you're giving is that the user will associate their Mac with a common AP, the attacker then targets that machine with an OS X exploit to get rooted, then implant a trojan that then attacks the wired network for...known files? Spreading a worm? Hopping shares as a user whose credentials they'd still have to steal, assuming the hacked laptop still needs to have something steal the credentials of someone who has access to the protected network and not just the local laptop credentials...

All possible but you'd have to be a pretty good target to have someone gunning for you like that. Or be stupid enough to take your laptop to Defcon.

Meanwhile, other actual blackhats just call the user pretending to be the help desk and just ask them for a username and password to troubleshoot a problem with the flux capacison marangue server so they can push Windows updates to the users's workstation. And offer them a chocolate bar.

Oh well. Fun times.

-Bart
_______________________________________________
MacOSX-admin mailing list
[email protected]
http://www.omnigroup.com/mailman/listinfo/macosx-admin

Reply via email to