arisuchan    [ tech / cult / art ]   [ λ / Δ ]   [ psy ]   [ ru ]   [ random ]   [ meta ]   [ all ]    info / stickers     temporarily disabledtemporarily disabled

/cyb/ - cyberpunk and cybersecurity

low life. high tech. anonymity. privacy. security.
Name
Email
Subject
Comment

formatting options

File
Password (For file deletion.)

Help me fix this shit. https://legacy.arisuchan.jp/q/res/2703.html#2703

Kalyx ######


File: 1556478958798.jpg (58.9 KB, 541x297, i_cfad7fc51cee37f0_html_m2….jpg)

 No.3915

ok so, pure hypotethical situation.

A group of attacker activists, whose actions are based on principles every good cyberpunker on this board would share, have to perform a sabotage.


At a certain time in a certain building, let's say a school or an office, oblivious people will enter in a computer room, then every person will take a computer and they will do stuff on the browser requiring an internet connection for an hour or so. A group of attackers composed by a dozen of individuals (of which one or two are in the computer room, supposingly doing stuff on the browser with the oblivious people, while the others are still in the building but outside the room) wants to stop them from doing those things on the browser. They know the wifi password, but the computers in the room are connected via LAN (even if with the same connection).
If they manage to sabotate the activity on the browser, the oblivious people will be happy or indifferent, and the room's tecnichan is very stupid so he won't probably be able to restore the connection if that's more troublesome than restarting the router (but even if he restores it, slowing down the operation with multiple disconnections would already be a victory).
The group of attackers would prefer to have the possibility to leave a message or a symbol, but if that's impossible with informatic methods it's not a big problem because they can still use meatspace-based methods for that.
There may be the possibility to access one of the computers in the room before the oblivious people enter, but the attackers don't have administration rights (Windows 10) and this is not something on which they can count 100%, so if possible the plan should work also without this eventuality.
Obviously if the attackers don't expose themselves too much it would be better.

How lain thinks the attackers should act in order to reach their objectives?

 No.3916

Bro if you are trying to get out of taking your final on the computers in the school computer lab just pull the fire alarm or call in a (not going to say it but you know what I mean). You are way overthinking whatever it is, number one rule of being /cyb/-activist is KISS. Keep it fucking simple stupid.

If you are committed to this 'l33t haxor' mentality and you already have the password? Just go into the router settings, and find where the manual firmware upgrade settings are. Just look up like any generic tutorial on flashing a router with Openwrt or DDwrt firmware. Only difference is, at the stage of the process where you actually do the flashing, just upload some random garbage file in place of the actual firmware. There will be a section in the tutorials that say 'if you do this step wrong you will brick the router', if you upload random garbage onto them and then do exactly what it tells you not to do in that step for you specific model? boom, you bricked their router, sure as hell won't be able to fix that quickly.

 No.3918

already tought about the fire alarm, but sadly at this point it's such an overused thing that nobody evacuates when it starts.

Instead, thanks a lot for the tip about the router!

 No.3919

anyway, really, it's not about getting out during an exam. It's a serious thing, so the problem is also that if something of common use is broken permanently or for a long time that can anger the people against the activists, making the whole thing counter-productive, since the aim is agitprop.
Anyway i'm asking here mainly for technical consulence, the political part about the right way to claim the sabotage, make it suitable for long-term work on the territory, etc. is already clear enough in the minds of the activists.

 No.3920

>>3915
Do you know if the LAN is running IPV4, IPV6 or both? If it is at least running IPV4, and you have the wifi password, look into ARP spoofing, which can be used to spoof the default gateway to clients on a network. This can easily fuck up a network if you can get a computer on the network that can send the spoofed packets (ie connect your laptop to wifi)

ARP spoofing tricks clients on the network into resolving the LAN's gateway to another client instead of the actual gateway. All traffic destined out of the network is first sent to the gateway to send it out of the network, so ARP spoofing can be used to spy on a network and gain credentials (by having your computer stand in as the gateway and sniff all packets going to and from you and the outside server), or to stop all outbound traffic (spoofing the gateway to random addresses, so no packets reach the actual gateway)

If it is only running IPV6, ARP spoofing was mostly patched out (as the ARP protocol was superceded by IPV6's NDP (neighbor discovery protocol)) but it may still be possible for Alice to spoof. Look into NDP spoofing.

If you are on Windows on your attacking computer, use Netcut. If you are on linux, use Tuxcut.

TuxCut link: http://a-atalla.github.io/tuxcut/
NDP Wikipedia: https://en.wikipedia.org/wiki/Neighbor_Discovery_Protocol
ARP Wikipedia: https://en.wikipedia.org/wiki/Address_Resolution_Protocol

I don't know much about NDP spoofing. Sorry.



[Return] [Go to top] [ Catalog ] [Post a Reply]
Delete Post [ ]