Abstract
At the Black Hat conference in August 2006, David Maynor and Jon “Johnny Cache” Ellch shocked the Mac community by demonstrating to the world something that hackers had known for a long time: the Mac could be hacked, easily. Maynor and Ellch, two security professionals with long-time careers in the security industry, were able to release what is known as a proof-of-concept attack by exploiting the wireless Atheros drivers built into the Mac operating system. Using a script called setup.sh, which turned a Mac computer (with its wireless card turned on) into an access point, an attacker could gain control of an unsuspecting Mac user’s laptop. Another hacker script, called bad_seed, could then be run from the host computer to exploit the vulnerability in the target computer’s wireless driver; this would give an attacker access to a Terminal session on the target computer running root (which is a “superuser” that is allowed full control of the computer). The exploit was not released, but it did provide proof that the Mac community was a long way away from an operating system immune to wireless attacks. The concept used in the wireless exploit was not specific to Apple computers, but pointed instead to general flaws in wireless networking protocols as a whole.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2010 Charles Edge, William Barker, Beau Hunter, and Gene Sullivan
About this chapter
Cite this chapter
Edge, C., Barker, W., Hunter, B., Sullivan, G. (2010). Securing a Wireless Network. In: Enterprise Mac Security. Apress. https://doi.org/10.1007/978-1-4302-2731-1_12
Download citation
DOI: https://doi.org/10.1007/978-1-4302-2731-1_12
Publisher Name: Apress
Print ISBN: 978-1-4302-2730-4
Online ISBN: 978-1-4302-2731-1
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books