White Hat Hacking: Doing Wrong to Do Right

Over a month ago, Triton Technologies was given a challenge.

The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming.

Security Penetration: Break Their Wireless Network

We had been trying to acquire this company for years and we knew their shortcomings, insecurity and data protection management. So we set out to do what we’ve been asked to do, break their wireless network.

So in order to protect something, you need to know what weapons your enemy is going to use. If you don’t know, you can’t protect against it and the battle is lost.

Here’s What We Did

Step 1. We acquired multiple Raspberry Pi 3 minicomputers with dedicated external wireless antennas. We installed Kali Linux and Aircrack-ng and linked them all through a cellular VPN to our Amazon cluster.

Step 2. Over a period of days, we captured thousands of packets that were transmitted by or their wireless access points. Utilizing known methods of breach and capture, we captured gigabytes of usable data.

Step 3. Utilizing our Amazon cluster of dedicated CPUs, we uploaded our packet capture data and began to crunch the code to retrieve the wireless information.

Step 4. And we waited. And waited.

Mission Accomplished

We came in over a long holiday weekend and found that the cracking utility found the password. So we drove out to the client, them unaware and we locked into their wireless network gaining access to their entire infrastructure.

A few days later we had a meeting with the client, presented our findings, and they have changed to us their managed IT services.

The Need for White Hat Hacking

What we did was known as white hat hacking, utilizing known methods of security penetration in a controlled environment to prevent any kind of serious breach in the future. This is extremely encouraged by our clients in order to test their defenses and test the reliability and dependability of their hardware and services.

Only Strong As The Weakest Security

Over a period of a few days, we discovered a lazy password methodology, unpatched systems, and that the firmware for the wireless access points was never upgraded beyond their defaults, all making their defeat easier than expected. It also reinforces the fact of having complex and long passwords within systems. You cannot control such as wireless access points or cellular devices. We cannot harp enough that complexity will help in security.

We replaced their wireless access points with ubiquity and are now monitoring their entire infrastructure on a minute by minute basis. Contact us to learn the weakness in your current system and what we can do to help.

Why We Recommend Ubiquiti Wireless Access

Wifi isn’t complicated. What is complicated is people.

For a long time, most small business would go out to their local office supply store, purchase a router, create wifi and give it no password so their patrons could access it without an issue. Those days are long gone. Businesses need to scale and the wireless network technology has arrived to allow it.

Good Wifi: A Product and a (Quick) Story

Ubiquiti Wireless Access with Triton Technologies logo.

We recommend a brand called Ubiquiti. Never heard of them? They are the secret for many MSPs and IT consultants. Their technology is simple to install, simple to manage, and easy to deploy.

A prime example is a hotel we did in Massachusetts. Over 90 access points, 6 switches, 2 gateways, 1 load balancer and we got the install done in a day. Literally. All the changes, tweaks and configurations were done within 7 hours with only 30 minutes downtime programming the switches. It was truly a great feat to see.

With their technology it is also cloud based, so any network changes, from their login portal, firmware updates and more are done entirely over a web browser. It is a joy to access and modify the settings.

Why is Wifi Important for a Business Owner?

Wifi brings customers. From hospitals, hotels, restaurants, and more, wifi is an integral part of their business. The longer a client can sit at a restaurant, the more they order, the greater the profit. For motels and hotels, to get the luxurious conference contracts, businesses need to get great wifi and services like Ubiquiti can provide that service quickly with a minimum of fuss.

What makes them so great?

  1. No licensing costs. You bought it, you own it and can operate it until you replace it.
  2. Easy to install. Industry standard design, compact design and easy to install hardware kits.
  3. Cloud manageable. Just log into a single website and access thousands of sites at the click of a mouse.
  4. Low cost. Their access points are easily under a $100 price point.
  5. Accessories. Literally hundreds of easy to access accessory devices such as external mounts, antennas and more.
  6. Simple technology. The interface is clean, no fluff, no ads: just easy to read and understand menus and interface.

With hundreds of deployments, from the single access point or thousands of units throughout Worcester, we recommend the Ubiquiti line of wireless technology.

Let’s help you get it installed at your business.