Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Researcher To Demonstrate Flaws In Wireless Warehouse Networks

Trustwave pen tester says 802.11 FHSS networks aren't as safe as many companies think

A security researcher at next week's Black Hat Europe will demonstrate a simple, low-cost method for hacking wireless networks commonly used in shipping and warehousing facilities.

Rob Havelt, practice manager for penetration testing at Trustwave's SpiderLabs unit, will demonstrate how easy it is to attack legacy 802.11 FHSS networks, which are often seen as inherently secure because so few off-the-shelf tools are available for remote eavesdropping.

The 802.11 FHSS technology has been outmoded in most wireless applications, but it is still commonly used in warehousing facilities because it works so well with inventory management equipment, such as handheld bar-code scanners and printers.

"Penetrating an 802.11 FHSS network is mistakenly believed to be financially and technologically out of reach for the common hacker, costing thousands of dollars and requiring a high skill set," Trustwave says. However, using easy-to-obtain tools, such as GNURadio and the USRP, Havelt will present code and techniques to penetrate such networks at a low cost, the company says.

"This demonstration will prove particularly important for those organizations that discount the risk 802.11 FHSS networks pose to security," Trustwave says. "These access points, generally connected to the corporate LAN, if compromised, could expose personally identifiable information, such as Social Security numbers and/or cardholder data."

Often, no controls are in place between these networks and corporate LAN environments, leaving a large hole for hackers to penetrate, according to the company.

"This demonstration will prove to naysayers that these legacy wireless networks need to be reviewed for security issues and included in the scope for compliance with the Payment Card Industry Data Security Standard if the entity stores, processes, or transmits cardholder data," adds Robert McCullen, chairman and CEO of Trustwave. "We've seen security firms ignore the need to scope these types of networks, giving erroneous advice to their clients and providing a false sense of security."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.