Abstract
At the Black Hat conference in August 2006, David Maynor and Jon “Johnny Cache” Ellch shocked the Mac community by demonstrating to the world something that hackers had known for a long time: the Mac could be hacked, easily. Maynor and Ellch, two security professionals with long-time careers in the security industry, were able to release what is known as a proof-of-concept attack by exploiting the wireless Atheros drivers built into the Mac operating system. Using a script called setup.sh, which turned a Mac computer (with its wireless card turned on) into an access point, an attacker could gain control of an unsuspecting Mac user’s laptop. Another hacker script, called bad_seed, could then be run from the host computer to exploit the vulnerability in the target computer’s wireless driver; this would give an attacker access to a Terminal session on the target computer running root (which is a “superuser” that is allowed full control of the computer). The exploit was not released, but it did provide proof that the Mac community was a long way away from an operating system immune to wireless attacks. While the Mac may be more resistant to attack, no system has every been truly immune.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Charles Edge and Daniel O’Donnell
About this chapter
Cite this chapter
Edge, C., O’Donnell, D. (2016). Securing a Wireless Network. In: Enterprise Mac Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1712-2_12
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1712-2_12
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1711-5
Online ISBN: 978-1-4842-1712-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)