52
luc-
8y

Network-connected train displays, failing and displaying their IP address, on a train that has WiFi on board. That's just begging to be hacked.

Comments
  • 5
    Pleeeeeeaaaaaase do it
  • 5
    Bad quality but still.. Been like this for a week now. 😂
  • 7
    Just do it ®
  • 3
    Well do it and quit talking about it. Change your mac address and hostname first though
  • 4
    For the love of God, please networking I hope you done your job and have separated public from private
  • 0
    @inpothet probably only beable to change the message anyway
  • 3
    That's not a publicly routeable address, so unless you can somehow get into their internal network it won't do you any good. Not "begging to be hacked" anymore than having any of it connected to the internet is.
  • 3
    @olback On that pic I only see the internal network address...nothing that could be used anyways
  • 4
    So what if it has wifi on bored. It's probably controlled via ethernet and a box in the control room or on a protected network that isn't broadcasting it's SSID
  • 1
    @jacobgc yeah then listen and wait for the network to do something
  • 1
    @jckimble I have an inconspicuous hostname of the other gender and a MAC rotator (some Debian package does that automatically in the background) for a reason ;)
  • 2
    @jacobgc not broadcasting ssid is not an issue if there's a control system connected. airmon-ng -i wlan0
  • 1
    @darksideplease @luc- networks that don't broadcast an SSID can still and most likely will be password protected
  • 2
  • 0
    @darksideplease who sits on a train/subway system long enough to brute force it...
  • 2
    @Admim one again, the aircrack-ng tools make it easy as pie to capture a handshake and brute it offline. No handshake happening because the devices are connected already? You can disconnect them without knowing the password (a flaw of WPA2).
  • 1
    @luc- glad smart people stated this. If it's in the air we can play with it. Now I'm pretty sure the flaw you're referring to isn't present in a RADIUS setup, but kinda doubt they're going through that much trouble on a train
  • 2
    @josh1238 deauthorization is possible on Anything wireless. If its wired you would need another way in
  • 0
    @jckimble not exactly. E.g. you can always insert a TCP FIN but TLS will (nowadays) notice that the connection was closed incorrectly. Wireless you can jam, but with authenticated disconnect messages you can't spoof them anymore.
Add Comment