Schedule

Schedule

Monday, October 20

1413824400 Tech News Today
1413828000 Triangulation
1413833400 iPad Today
1413846000 Tech News 2Night

Tuesday, October 21

1413910800 Tech News Today
1413914400 MacBreak Weekly
1413921600 Security Now
1413928800 Before You Buy
1413932400 Tech News 2Night
1413936000 All About Android
1413945000 Padre's Corner

Wednesday, October 22

1413991800 FLOSS Weekly
1413997200 Tech News Today
1414000800 Windows Weekly
1414008000 This Week in Google
1414018800 Tech News 2Night
1414026000 Ham Nation

Thursday, October 23

1414083600 Tech News Today
1414087200 Know How...
1414090800 Marketing Mavericks
1414096200 Coding 101
1414099800 Home Theater Geeks
1414105200 Tech News 2Night
1414107000 The Giz Wiz

Friday, October 24

1414170000 Tech News Today
1414173600 This Week in Law
1414180800 Android App Arena
1414191600 Tech News 2Night

Saturday, October 25

1414260000 The Tech Guy

Sunday, October 26

1414346400 The Tech Guy
1414360800 This Week in Tech

Monday, October 27

1414429200 Tech News Today
1414432800 Triangulation
1414438200 iPad Today
1414450800 Tech News 2Night

Tuesday, October 28

1414515600 Tech News Today
1414519200 MacBreak Weekly
1414526400 Security Now
1414533600 Before You Buy
1414537200 Tech News 2Night
1414540800 All About Android
1414549800 Padre's Corner

Wednesday, October 29

1414596600 FLOSS Weekly
1414602000 Tech News Today
1414605600 Windows Weekly
1414612800 This Week in Google
1414623600 Tech News 2Night
1414630800 Ham Nation

Most Recent Episodes

This Week in Tech
Episode #480: And. Roid. October 19th, 2014

Apple Pay, Twitter turmoil, cable chaos, and more.

The Tech Guy
The Tech Guy 1128 October 19th, 2014

OS X Yosemite, Android Lollipop, and more.

The Tech Guy
The Tech Guy 1127 October 18th, 2014

Could a neighbor's Wi-Fi affect my Wi-Fi reliability?

Tech News 2Night

Snapchat feeds will soon have ads.

This Week in Law
Episode #279: Blame Kevin October 17th, 2014

Should parents be responsible for what their kids do online?

Android App Arena
Episode #17: Alarm Clocks October 17th, 2014

Hands-on reviews of Timely, Sleep as Android, Alarmy (Sleep if U Can) and Androidify.

Tech News Today

A Guardian report yesterday slammed the anonymous messaging app Whisper for tracking users.

Know How...

Batteries, Tor Bundle, and Quadcopter Part One

This Week in Computer Hardware

Testing 4-Way SLI of GTX 980s and new tablets from Google and Apple.

The Giz Wiz

Halloween hair dying.

Know How... 102

Intro to Linux, RC Suspension, & ARP Cache Poisoning Attack

July 17 2014

We talk about the new Raspberry Pi B+, expert guest Aaron Newcomb goes over the different flavors of linux, learn how a remote control car suspension works, and put your black hat on for ARP Cache Poisoning Attack.

News Topic
Raspberry Pi B+ Announced

Linux 101

Aaron Newcomb shows the different flavors of Linux.

Remote Control Car Suspension

Coil Overs and Ball Bearings explained

The ARP Cache Poisoning Attack

The ARP Cache Poisoning Attack
ARP = "Address Resolution Protocol"
MAC = "Media Access Control"

Most of us think that our computers are identified by their IP address.
- However, on an ethernet network, they're actually identified by their MAC address (Media Access Control)
- A MAC is a 6-byte Hexideximal string that looks like, "00:11:aa:bb:cc:dd"

When we connect a computer to a network, it needs to become aware of all the other devices on the network, and all the other devices on the network need to become aware of the device.
- That's what ARP does: It correlates an IP address to a MAC address so that we can find a computer on the network with a particular IP address

Here's how it works:
* Computer A needs to send a file to Computer B
* Computer A knows that Computer B has the IP address of 192.168.1.2
* Computer A does an ARP Broadcast saying, "Hey! Who has the IP address 192.168.1.2?"
* Computer B hears the broadcast and responds, "I Do! 00:00:00:aa:aa:aa"
* Computer A know knows how to send the file to Computer B

Here's how access to the Internet Works:
* Computer A connects to the Network and receives a DHCP address of 192.168.1.3 with a gateway of 192.168.1.1
* It wants to sent data through the gateway to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router(gateway) responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff
* Computer A sends data through the gateway at aa:bb:cc:dd:ee:ff

** Important to note is that all the devices will CACHE that response: so they all know which IPs belong to which MAC addresses.

Here's how a CACHE Poisoning Attack Works:
* Computer A wants to send data to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff"
* The attacking computer takes note that the gateway is at aa:bb:cc:dd:ee
* The attacking computer responds CONTINUOUSLY "I'm 192.168.1.1 22:22:22:22:22:22"
* Computer A sends data through WHAT IT THINKS is the gateway at 22:22:22:22:22:22
* The attacking computer receives the data, sniffs it, then sends it on to the REAL gateway at aa:bb:cc:dd:ee:ff

Using Cain and Abel
1. Download and Install Cain and Abel
2. You may need to disable global taskoffloading (netsh int ip set global taskoffload=disable)
3. Run the Sniffer
4. Switch to the Sniffer tab and hit the "+" icon to add a range scan (Use the IP range you're a part of)
5. Switch to the "ARP" tab at the bottom of the screen
6. Hit the "+" icon to Select your router and the client that you want to poison (or multiple clients)
7. Hit the "ARP" icon in the top bar to start the attack
8. Run Wireshark for more clear information

Connect with us!
Don't forget to check out our large library of projects at www.twit.tv/kh.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj, @Cranky_Hippo and @Anelf3
-Check out our transcripts.