Why I Don’t Like Airport WiFi

For years from airports, I’ve tweeted as much:

During a recent trip, I had to send a file out, so was forced to connect.

This is what happened in Chicago O’Hare (ORD):

1 – Boingo is a recognized hotspot provider, okay, I’ll connect to that.

Nope, it’s not working. Oh no, this file needs to go… I have to connect to…

2_Free_ORD_Wi-fi  Based on the shady name of this network, I bet I’m about to be MITM’d

3 – Yes I was

***

The Attack

It’s called a Man-in-the-Middle (MITM) attack.

The WiFi network I connected to is likely not affiliated or provided by the airport. Instead, it’s probably an antennae poking out of someone’s backpack.

Using a clever WiFi name, the attacker poses as a legitimate network > I connect to it > now all my traffic is run through the attacker’s computer first, before going out to the internet >as it goes by, the attacker grabs passwords, reads stuff, etc.

(I’ll better explain a MITM attack in the near future)

The Defence

Don’t go online at the airport.  It’s one of the most hostile network in the world.  This environment provides nefarious characters anonymous access to sharpen their skills.

If you must go online, avoid entering passwords, accessing sensitive data, and certainly no online banking.

Okay? Okay.

NOTE – this could be because I was already connected to Google+ , then I automatically attempted to reconnect and I was associated to the captive portal yet, although I was getting a suspicious certificate error, it’s because I was being redirected to the captive portal for login first, and that new IP didn’t resolve to “plus.google.com” that is my browser saying woah. Possibly.

 

 

Why I Like Airports

Watching the people. Everyone seems to have lowered their guard more than normal, and many have totally dropped them.

I wonder if it’s because an airport is such a protected and monitored place, so it feels safe to drop it.

I like walking through the crowds, thinking about how I’m so close to all these different people, and I will never see them again.

Maybe we even bumped into one another, exchanged words and a smile, then nothing ever more guaranteed.

You know the saying, “want to see someone’s true colours? Add stress”. Many people find travelling stressful, so that’s usually entertaining.

There’s the most delicious airport food, able to be eaten one-handed.

And I figure if I’m in an airport, I must be up to something good.

Always have loved airports.

Here’s the blog section.

Pretty good wingtip photo eh.

 

 

A Luxury Airline Amenity Kit

As about as fancy as these kits get.

Business class to Dubai, on Emirates Airline.

A full-sized toothbrush, a hair brush, missing is an eye mask.

A mirror, two creams (hand & face), and a bottle of perfume.

All with a signature scent, designed specifically for this flight bag.

(wasn’t me who flew, a friend brought it back for me, because I like Bulgari.)

 

 

Why Airport WiFi is the Most Hostile Network

I’ve harped on you for years via social media, “stay off airport WiFi, it’s dangerous and even the best guys don’t connect to it”.

When I travelled to Arizona two weeks ago, sitting at the terminal I was like, “okay fine, I have to wipe my phone soon anyway, and should demonstrate why I keep harping”.

I connect to the terminal’s free network.

Using an app on my phone, I scan the network.

1 – there are 573 devices connected to the network

2 – the brand of each device is displayed

3 – I can choose to see what each device is doing

4 – I can pick one device and track it! I assign it the name, “Test”

1 – listed are the IP (like an address) and MAC address (like a serial number) of all connected devices

2 – let’s see what’s happening with THYSSENKRUP-PC

3 – that’s his IP and MAC address, of his Intel PC

4 – the numbers on the left are his ports, and what traffic is going in/out on each  

* – this traveller has his business card taped to his laptop.

The Attack

A business traveller has connected both his phone and laptop, he’s working away. The attacker notes his brand of device, the device’s name, MAC and IP address, and what is happening on which ports.  Added bonus is the business card taped to the laptop.

The attacker does some social media mining, then a week later, the traveller gets a phone call.

“Jimmy hi! Karl from IT here. Look, there’s a bit of a meltdown happening at HQ, sorry but this is urgent, you were at Pearson airport last Tuesday, right?

You’re on a Blackberry, MAC address 00:1F:3B:Bo:D2:D3, and were connected to our Microsoft Exchange server, right?  Yup, look, we have a compromise here, and I’m going to need your access to your laptop…”

***

An elaborate example, because really, someone skilled now has enough information to breach Jimmy’s system, with neither the laptop lid business card, or a phone call.

The Defence

Use your phone (via USB, not Bluetooth) to connect to the internet.  Reduce the attack surface.

The Better Defence

Just don’t.

If you must, avoid entering any passwords, and certainly no banking or credit card numbers.

(see also: Protecting your Phone in an Uncertain Environment)

 

Label your Luggage Always

A few months back I was looking out the window, waiting for the plane to take off… oh what’s that?

That’s my suitcase not being loaded on board. Instead, it’s about to be driven away on that little truck.

Oh no.  “Excuse me”… “Hello?” By now the truck has started driving away, I stand up “HI LISTEN HI”.

I described what happened, and it was the pilot himself who leaped off the plane and ran after the truck.

It was only then that I started to worry… imagine if I was wrong, and I’d just held up the plane, while the pilot chased someone else’s bag.

But it wasn’t, and he returned with my luggage, and the passengers around me were all, “sharp eye” and “nice catch”.  I only felt relief.

That’s why I use that giant orange luggage tag,
a bright red strap, and a green lock; VDMs

VDM – Visual Distinguishing Mark

(as I’ve blogged before, only use TSA approved red diamond locks when travelling)