Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Researcher To Demonstrate Flaws In Wireless Warehouse Networks

Trustwave pen tester says 802.11 FHSS networks aren't as safe as many companies think

A security researcher at next week's Black Hat Europe will demonstrate a simple, low-cost method for hacking wireless networks commonly used in shipping and warehousing facilities.

Rob Havelt, practice manager for penetration testing at Trustwave's SpiderLabs unit, will demonstrate how easy it is to attack legacy 802.11 FHSS networks, which are often seen as inherently secure because so few off-the-shelf tools are available for remote eavesdropping.

The 802.11 FHSS technology has been outmoded in most wireless applications, but it is still commonly used in warehousing facilities because it works so well with inventory management equipment, such as handheld bar-code scanners and printers.

"Penetrating an 802.11 FHSS network is mistakenly believed to be financially and technologically out of reach for the common hacker, costing thousands of dollars and requiring a high skill set," Trustwave says. However, using easy-to-obtain tools, such as GNURadio and the USRP, Havelt will present code and techniques to penetrate such networks at a low cost, the company says.

"This demonstration will prove particularly important for those organizations that discount the risk 802.11 FHSS networks pose to security," Trustwave says. "These access points, generally connected to the corporate LAN, if compromised, could expose personally identifiable information, such as Social Security numbers and/or cardholder data."

Often, no controls are in place between these networks and corporate LAN environments, leaving a large hole for hackers to penetrate, according to the company.

"This demonstration will prove to naysayers that these legacy wireless networks need to be reviewed for security issues and included in the scope for compliance with the Payment Card Industry Data Security Standard if the entity stores, processes, or transmits cardholder data," adds Robert McCullen, chairman and CEO of Trustwave. "We've seen security firms ignore the need to scope these types of networks, giving erroneous advice to their clients and providing a false sense of security."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-11
Windows WalletService Elevation of Privilege Vulnerability
PUBLISHED: 2021-05-11
Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31170.
PUBLISHED: 2021-05-11
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
PUBLISHED: 2021-05-11
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
PUBLISHED: 2021-05-11
Windows Media Foundation Core Remote Code Execution Vulnerability