Click for Walker Click for YF Listing Service Click for Burger Click for Cross Click for Glendinning

Internet security onboard

Discussion in 'General Yachting Discussion' started by Marmot, Mar 15, 2011.

You need to be registered and signed in to view this content.
  1. Marmot

    Marmot Senior Member

    Joined:
    May 20, 2007
    Messages:
    3,311
    Location:
    9114 S. Central Ave
    have any readers had problems or suspected intruders on the yacht's wireless network or even unauthorised attempts to access the boat's server?

    Am collecting anecdotal information and anyone who would rather not go public can PM me.

    Thanks, M
  2. PropBet

    PropBet Senior Member

    Joined:
    Apr 21, 2007
    Messages:
    1,216
    Location:
    Is Everything!
    Don't know of specific attempts to access (I'm sure there have been some somewhere along the line), but everything that is wireless is secured with the following methods:
    WPA or WAP encryption (128bit)
    We *DO NOT* broadcast our SSID's
    We use MAC Address filtering for all machines that access the network wireless.

    Somebody technically savvy enough could technically see there is a network in range (should they be close enough) however would have a rather tough time connecting to the network, and or browsing any machines on the network.

    It'd be easier to walk into the laz and plug in to the RJ45 on the bench.
  3. Marmot

    Marmot Senior Member

    Joined:
    May 20, 2007
    Messages:
    3,311
    Location:
    9114 S. Central Ave
    And that is what most other people think, too. You might be amazed how simple it can be though.
  4. K1W1

    K1W1 Senior Member

    Joined:
    Sep 30, 2005
    Messages:
    7,393
    Location:
    My Office
  5. carelm

    carelm Senior Member

    Joined:
    Feb 5, 2011
    Messages:
    403
    Location:
    fairfax va
    At a minimum you need a fairly robust firewall and encrypting of your wireless router. It might be helpful to have a traffic analyzer to figure out what IPs are pinging your system. Some years ago McAfee had this on their anti-virus software package and I used it to block out IP groups. It was interesting to note that the analyzer pointed to former East Bloc countries and China. The best security though, is to turn off your network when you don't need it.
  6. NYCAP123

    NYCAP123 Senior Member

    Joined:
    Mar 14, 2008
    Messages:
    11,205
    Location:
    Long Island, NY
    Just saw something on TV the other night about a guy in a highrise on Florida's gulf coast who got arrested for distributing child porn. Turned out his wireless was hacked by a guy on a boat in a marina 200 yards away.
  7. PropBet

    PropBet Senior Member

    Joined:
    Apr 21, 2007
    Messages:
    1,216
    Location:
    Is Everything!
    I know the exact steps and process(es) needed considering I spent much of my life in the technology field. Specifically networking.

    Can someone get on our network if they had the skills and know-how? Of course. Sit out there long enough to grab enough packets to brute force a 128bit WPA key and you're in.

    Do I worry about people leeching or gaining access to other machines on the network? No. Not really.

    If I was worried about it, I'd implement the *ONLY* 100% true and effective security for computers. Unplug them, and put them on the shelf.

    Anything plugged in to the wall and connected, is at liability of being hacked. In the truest sense, there is no absolute. The steps we take, simply slow down the smart ones, and stop the dummies.
  8. YachtForums

    YachtForums Administrator

    Joined:
    Dec 22, 2002
    Messages:
    20,375
    Location:
    South Florida
    Kismet.
  9. PropBet

    PropBet Senior Member

    Joined:
    Apr 21, 2007
    Messages:
    1,216
    Location:
    Is Everything!
    A beautifully sharpened knife that will cut in both directions.

    Tripwire and Ntop are two other utilities I use regularly.
  10. YachtForums

    YachtForums Administrator

    Joined:
    Dec 22, 2002
    Messages:
    20,375
    Location:
    South Florida
    LOL! That too, but I was referring to Kismet Intrusion Detection Systems for wireless networks. ;)
  11. Energizer

    Energizer New Member

    Joined:
    Nov 20, 2005
    Messages:
    13
    Location:
    Florida
    WEP and WPA are both easily crackable; less than 5 minutes -- with scripts, one can obtain near-instant (<30 seconds) access to such access point. WPA2 is reasonable crackable with very short passwords or common rainbow table passwords. WPA2 is not reasonably crackable with long and random (non-human) passwords.

    MAC address filtering is useless because not broadcasting your SSID is also useless. The common tool airodump-ng uses the network card in monitor mode; the MAC address of all connected users are shown even on "hidden" wifi-routers.

    Once connected it is further easy to exploit the router firmware and obtain admin access, turn off intrusion detection, turn off firewall or allow inbound routing or DMZ. Since many users rely on the wifi or LAN firewall, once inside it is easy to browse files on back up servers, sniff POP3 emails, chat, unencrypted website traffic, or use firebug to hijack active SSL connections to keep an eye on a user's online bank accounts, encrypted email (gmail), brokerage accounts (where its usually easy to do ACH transfers), or just monitor trading activity and purchase stock options accordingly if its a big fish.
  12. NYCAP123

    NYCAP123 Senior Member

    Joined:
    Mar 14, 2008
    Messages:
    11,205
    Location:
    Long Island, NY
    Interesting, and makes me glad I do no banking on line. Dare I ask what happens when people access their accounts via I-phone?
  13. wscott52

    wscott52 Senior Member

    Joined:
    Jul 30, 2007
    Messages:
    298
    Location:
    SE Florida
    WPA2 with a high strength password, like one from here:https://www.grc.com/passwords.htm, is pretty much uncrackable. MAC address filtering and disabling SSID broadcasts are both more nuisance factors than anything else. I use them to try and drive a war driver somewhere else. If he knows he's getting a signal from a yacht worth tens of millions he might be willing to put up with the annoyance. The best thing to do is not use wifi at all and have every networked computer connected by Ethernet and a serious hardware firewall between the onboard network and it's Internet access.

    ps

    I have a home wifi network protected by a wpa2 encrypted router using a grc hexadecimal password because I like being able to carry my laptop around the house and have a wifi enabled printer but then I'm not worth hundreds of millions of dollars.
  14. lovinlifenc

    lovinlifenc Member

    Joined:
    Mar 28, 2010
    Messages:
    135
    Location:
    Wilmington NC
    I have a program that can hack wep and wpa passwords. The longest it has taken was about 12 hours, and that was a very strong Key. With access to the network, I can usually access the machines and routers attached to it without any problems.

    The best setup would be to have a DMZ. A wireless router, which also connects to your internet connection, then another router behind it with a firewall set up properly to prevent any unwanted access from the outside. Any machines that aren't wireless should be plugged into the firewall router. You can set up rules that would allow access to specific mac addresses through the firewall. Most wireless routers can be set up so that the only communication allowed from the wireless clients is to the wireless router itself, and the clients can't actually see or ping one another.

    I would run zone alarm on any machines connecting to the wireless side of the network for firewall protection on the actual computers, too.. I do consulting, and would be happy to advise you on a more specific configuration.
  15. wscott52

    wscott52 Senior Member

    Joined:
    Jul 30, 2007
    Messages:
    298
    Location:
    SE Florida
    You're not cracking WPA2-AES/CCMP networks with a strong 63 bit random ASCII or 64 bit random hexadecimal key.
  16. K1W1

    K1W1 Senior Member

    Joined:
    Sep 30, 2005
    Messages:
    7,393
    Location:
    My Office
    Hi,

    I am using WPA-PSK [TKIP] + WPA2-PSK [AES] on my wireless setup at home and in the office.

    How do I tell if I am relying on the AES or the TKIP part of it?
  17. PropBet

    PropBet Senior Member

    Joined:
    Apr 21, 2007
    Messages:
    1,216
    Location:
    Is Everything!
    Like I said earlier, you're not going to keep everyone out. Especially those tech savvy. If you want to keep them out, turn everything off and unplug it. That is the *only* secure network.

    There are a few sensible things you can do to slow down the wardrivers and passers by looking for a free connection. WPA, strong passwords, and a properly built network segmented for internal and external traffic, along with a few monitoring tools.
  18. wscott52

    wscott52 Senior Member

    Joined:
    Jul 30, 2007
    Messages:
    298
    Location:
    SE Florida

    Why?




    Must make message longer.
  19. K1W1

    K1W1 Senior Member

    Joined:
    Sep 30, 2005
    Messages:
    7,393
    Location:
    My Office
    Hi,

    Because that is the last of the 4 options offered under the Wireless Security Tab.

    The names I posted were copied and pasted off the routers homepage.
  20. Energizer

    Energizer New Member

    Joined:
    Nov 20, 2005
    Messages:
    13
    Location:
    Florida
    Using iPhone on 2G, or "E", is not secure because attacker can create his own cellphone tower/radio right next to the user and control the phone to connect to him. 3G is not yet vulnerable. 3G is sufficiently encrypted, and there are no known useful attacks. 4G also safe. iPhone over wireless subject to the before situation: anything less than wpa2 with a very long password is essentially wide open for the determined attacker. A person on a yacht is instant high value target, ruling out the idea that an attacker will just move on if there are difficult obstacles. Getting insider information or corporate credit card number etc is worth months of high CPU temps. I would venture to guess that there are active hackers poking at yachts in all ports, everywhere. What else would nerds do near a beach...

    K1W1, you can probably right click on some connection symbol and see details. Otherwise you could use airodump-ng to see the state of the packets emitted around you.