The global and independent platform for the SAP community.

Future? It was already on yesterday!

Do you know this too? You stumble upon a topic, think it's science fiction - and one day realize that the future has long since become reality...
Raimund Genes, Trend Micro
December 1, 2016
Content:
It Security
avatar
This text has been automatically translated from German to English.

Today's EWLANInfrastructures operate at 2.4 and 5 GHz - a frequency range in which water interacts with electromagnetic waves. Anyone with an old microwave oven that, when switched on, emits the WLAN-The people who have problems with reception can tell you a thing or two about it.

But how does something like this become a security problem? Through the clever, but hardly imaginable use of applications. But one after the other...

The human body consists of more than 50 percent water. We humans also interact with the WLAN. These "disturbances" are by far not as massive as with old microwaves, but measurable!

If one combines the information of several AntennasThe railgun in the Schwarzenegger film Eraser is not so far-fetched. So the "railgun" in the Schwarzenegger film "Eraser" is not so far-fetched.

Recent research even allows to distinguish gestures with arm or fingers in space - just remember Tom Cruise in "Minority Report"!

Scanning through walls and detecting movements in electromagnetic fields are nothing new: For example, police can use them to gain information about people taken hostage without entering the room.

Even if the systems are more sophisticated and emit waves: The principle is the same.

See through walls

But the possibilities go much further: current research shows how to determine the PIN on a mobile device just by evaluating generally available information at a WLAN-Router.

Modern variants use several Antennas, the signal reception strength can be read out easily (CSI - Channel Strength Information). If a mobile device is connected to the Router connected, there are minimal changes in the reception strengths during (PIN) entry: due to the movement of the hand in the room where it is connected to the WLAN-waves interacts, and by the minimally changed orientation of the device.

If the changes in reception strength are correlated, there is a probability of up to 81.8 percent of recognizing a ten-digit PIN that has been entered - without any compromise of the terminal device itself. This is where the purely academic approach to a future threat becomes an actual problem!

For a potential attacker, it is not even necessary to have a public Hotspot in a cafƩ. He simply sets a so-called rogue Access Point on, under an existing or a generic name ("WLAN", "freeWiFi"...).

The process can even be automated to the point where the rogue Access Point automatically checks according to which WiFi-name devices, and also offers these names. This leads to devices (often without any user interaction) offering such Nets use automatically.

Security: always new, always exciting

The danger in the use of public Hotspots So it is no longer just that the Communication can be intercepted. Meanwhile, local inputs can also be evaluated on the device.

So, especially for critical applications, it is advisable to rely on additional mechanisms such as a fingerprint. Such scenarios are one reason why IT-Security is so interesting and will probably remain so.

Threats are always coming from new and sometimes completely unexpected directions - as IT-As security managers, we must identify these risks, develop appropriate countermeasures, and implement them.

In the specific case, it is recommended to confirm previous "Best Practices". The access of devices to public Hotspots has risk potential. In the past, it was the possibility of Communication Today, there is also the additional risk that PINs and other entries can be intercepted.

Depending on the criticality of the Data thus another scenario that should play a role in risk considerations.

Download as PDF only for members. Please create an account Here

avatar
Raimund Genes, Trend Micro

Raimund Genes was CTO at Trend Micro.


Write a comment

Work on SAP Basis is crucial for successful S/4 conversion. This gives the so-called Competence Center strategic importance among SAP's existing customers. Regardless of the operating model of an S/4 Hana, topics such as automation, monitoring, security, application lifecycle management, and data management are the basis for the operative S/4 operation. For the second time already, E3 Magazine is hosting a summit in Salzburg for the SAP community to get comprehensive information on all aspects of S/4 Hana groundwork. With an exhibition, expert presentations, and plenty to talk about, we again expect numerous existing customers, partners, and experts in Salzburg. E3 Magazine invites you to Salzburg for learning and exchange of ideas on June 5 and 6, 2024.

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Tickets

Early Bird Ticket - Available until 29.03.2024
EUR 440 excl. VAT
Regular ticket
EUR 590 excl. VAT

Secure your Early Bird ticket now!

Venue

Event Room, Hotel Hilton Heidelberg,
KurfĆ¼rstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.