Risk
1/22/2007
01:53 PM
Alexander Wolfe
Alexander Wolfe
Commentary
Connect Directly
Twitter
Facebook
RSS
E-Mail
50%
50%

The Wily 9-Year-Old Who 'Hacked' Airport Security

They say social engineering is the most potent form of hacking, and now we have a 9-year-old who's proved it.

They say social engineering is the most potent form of hacking, and now we have a 9-year-old who's proved it.Social engineering is that easiest of all hacking techniques, where instead of doing the tough work of breaking through a security system, one exploits people's natural inclination to trust others. Kevin Mitnick, the hacker who served five years in prison for breaking into corporate computer systems in the 1990s, was notorious in this regard. After his release, he wrote a book extolling his exploits, many of which involved getting compliant people to hand over their passwords willingly.

Tell people you're Bob from IT, and they're pretty much willing to give up anything up to, and sometimes including, their Social Security numbers.

All this is by way of edging into the fascinating tale of little Semaj Booker of Seattle.

Seems Semaj, who the Washington Post reports is all of 9 years old and 4 feet, 9 inches tall, had upset his mom after stealing a car last week, driving it 90 mph while being chased by the cops, and then crashing it into a tree.

But that's only the beginning. He was carted back home in the custody of his mother. Apparently worried that he might be in a heap of trouble, he sneaked out of the house the next morning and made his way to Seattle-Tacoma International.

There, according to the story, "he single-handedly conned Southwest Airlines and the federal Transportation Security Administration into allowing him to board a flight to San Antonio via Phoenix."

Apparently, he told them he'd lost his boarding pass. Hey, who can say no to a little kid?

Predictably, a congressman is calling on the TSA to explain how this happened.

The kid, meanwhile, has one heck of an excuse for why his homework's late.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.