The Black Hat conference and its post-event, DefCon,
"We're showing malware we created called Jinx," says Itzik Kotler, manager of the security operations center at Radware and a presenter at Black Hat, which runs through Aug. 7. Kotler describes Jinx as attack code that can be used to take over the machines of victims using versions of Mozilla's Firefox browser that pre-date Firefox 3, Mozilla's latest release. (You might want to upgrade now if you haven't already.)
"It's the first proof-of-concept of such malware, with no code injection, no interfering with the kernel," says Kotler, adding the Jinx exploit code will be published for all to see. He hinted Radware is working on similar Jinx-like malware aimed at Microsoft Internet Explorer.
Why all the effort? "We believe people need to be prepared for this. There's a popular demand for Web 2.0, but it's a bad situation in that we've given huge power to browsers, but these browsers often have logic flaws that allow these attacks," Kotler says.
For vendor AirTight Networks, which makes wireless LAN (WLAN) intrusion-prevention systems, its focus is how some wireless LAN vendors may not be implementing the IEEE's new 802.11w security standard correctly.
The 802.11w standard (Cisco calls it "management frame protection") is supposed to make WLANs resistant to denial-of-service (DoS) attacks. But AirTight will show how it's possible with some implementations of 802.11w in vendor equipment to conjure up an attack that hits WLAN access points with malformed packets, not bringing them down but triggering a disconnection response in their WLAN clients.
"This attack involves a special packet which has the effect of disconnecting the endpoint," says Pravin Bhagwat, chief technology officer at AirTight, which dubs this the "autoimmunity disorder in WLANs."
The WLAN DoS attack, which involves tampering with the MAC address at Layer 7 by sending a continuous stream of injected packets at intervals of about 30 seconds, basically results in the WLAN access point being exploited as the vector for disabling WLAN endpoints.
Some of the WLAN equipment that will be shown to be vulnerable to this attack includes that of D-Link, Cisco, Buffalo and open source Madwifi. Either these vendors aren't implementing 802.11w correctly or the standard will need to be improved to prevent the "autoimmune disorder" in WLANs, according to AirTight.
All About the Rootkit
Cisco gear will also get pounded in another session with Core Security Technologies, which is expected to show how it's possible to install a rootkit on the Cisco IOS. A rootkit is code designed to hide from detection so someone can control processes without being noticed.
"This does assume you have access to the Cisco device because you are the administrator or somehow broke in," says Ivan Arce, chief technology officer at Core Security.
The Cisco IOS rootkit would give an attacker the ability to do things such as change how traffic passes through a Cisco device. "People don't understand it's possible to have a rootkit on IOS," says Arce, adding that Cisco is aware of the research and earlier this year issued an advisory on it.