dumbass@leminal.space
on 22 Nov 2024 14:21
nextcollapse
I’m not gonna read the article so I can believe they teleported through the WiFi to escape.
Telorand@reddthat.com
on 22 Nov 2024 16:00
nextcollapse
It’s a way cooler picture than the reality, which is probably that they hacked a laptop on a different network that could access the target endpoint.
I dunno, I won’t read it either, because I want to believe in your vision.
card797@champserver.net
on 22 Nov 2024 16:31
collapse
Thanks, dumbass.
jia_tan@lemmy.blahaj.zone
on 22 Nov 2024 18:22
collapse
TLDR: they hacked a less secure network in range of their target network, then SSHed into a laptop on the less secure network and used it to hack the target network. Possibly even daisy chained less secure networks. The point of this was to not sit in a suspicious car next to your target while you brute force their wifi password (they have been caught previously).
My question is: how do you get caught while hacking wpa2? I’m not an expert, but I assume you can get the data you need to do an offline bruteforce just by driving by and sitting at a red light a few times, which is not suspicious at all even if you have a laptop out. Or did they try to hack wpa3? If so, I assume it’s trivial to detect online bruteforce attempts and stop responding to them, or even just whitelist MAC addresses?
PhilipTheBucket@ponder.cat
on 22 Nov 2024 18:32
nextcollapse
Maybe they detected the compromise on the secure network, and only after some forensics did they work out that it came from a compromised laptop in a neighboring building.
“If a target is important enough, they’re willing to send people in person. But you don’t have to do that if you can come up with an alternative like what we’re seeing here,” Hultquist says.
threaded - newest
I’m not gonna read the article so I can believe they teleported through the WiFi to escape.
It’s a way cooler picture than the reality, which is probably that they hacked a laptop on a different network that could access the target endpoint.
I dunno, I won’t read it either, because I want to believe in your vision.
Thanks, dumbass.
TLDR: they hacked a less secure network in range of their target network, then SSHed into a laptop on the less secure network and used it to hack the target network. Possibly even daisy chained less secure networks. The point of this was to not sit in a suspicious car next to your target while you brute force their wifi password (they have been caught previously).
My question is: how do you get caught while hacking wpa2? I’m not an expert, but I assume you can get the data you need to do an offline bruteforce just by driving by and sitting at a red light a few times, which is not suspicious at all even if you have a laptop out. Or did they try to hack wpa3? If so, I assume it’s trivial to detect online bruteforce attempts and stop responding to them, or even just whitelist MAC addresses?
Maybe they detected the compromise on the secure network, and only after some forensics did they work out that it came from a compromised laptop in a neighboring building.
“If a target is important enough, they’re willing to send people in person. But you don’t have to do that if you can come up with an alternative like what we’re seeing here,” Hultquist says.
From the article