Hacker Shows How Easy It Is To Take Over A City's Public Wi-Fi Network
Hacker Shows How Easy It Is To Take Over A City's Public Wi-Fi Network

As we have already spoken many times about the privacy and security issues involved in the use of public WiFi networks. Hence, to teach us in an effective way, an Israeli hacker demonstrated that how easy it is to take control of public WiFi network of an entire city and spy on users.

Hacker Shows How Easy It Is To Take Over A City’s Public Wi-Fi Network

We have spoken many times about the privacy and security issues involved in the use of public WiFi networks. Users must take extra measures to such networks due to increased threats to the security of your data. A perfect example of this has been taught to us by an Israeli hacker who demonstrated how easy it is to take control of public WiFi network of an entire city and spy on users.

Amihai Neiderman, head of research firm cybersecurity Equus Technologies, noted the existence of a WiFi network that had never seen the way home from work. This is something that we suspect any of us as WiFi networks increasingly available there. However, there was something odd about this access point detected by Amihai and that there was no building nearby.

The name of the hotspot he saw, advertised as “FREE_TLV,” and soon he found out that it was a free WiFi installed by the local administration of the city of Tel Aviv in Israel. Intrigued by this, decided to get down to work to see whether it was safe or not.

During the following weeks, he devoted himself to it in his spare time. The first thing he did was connected to one of the many points available throughout the city and check the public IP address assigned to him. Then he looked for open ports on the router responsible for connecting and he found that the device was serving a web-based login interface over port 443 (HTTPS).

This section showing the manufacturer’s name, but no other information of interest. So after this, he had to analyze the firmware offered by the manufacturer on its website for possible security flaws. Although it used an encryption method that complicated matters to third parties trying to access, could easily bypass this protection and access the CGI scripts (Common Gateway Interface).

Soon he spotted a vulnerability “buffer overflow” that he can take advantage of without any problem. Hence, through this, he managed to gain complete control of the router responsible for providing Internet access to the entire city through a public WiFi network.

The problem with this vulnerability is that it can expose thousands of users who connect to a public WiFi network. Therefore, users should take measures to connect to these networks and, as a general measure, should use a VPN for it.



COMMENTS