Schedule

Schedule

Monday, December 22

1419292800 Tech News 2Night

Tuesday, December 23

1419357600 Tech News Today
1419361200 MacBreak Weekly
1419368400 Security Now
1419375600 Before You Buy
1419379200 Tech News 2Night
1419382800 All About Android
1419391800 Padre's Corner

Wednesday, December 24

1419444000 Tech News Today
1419447600 Windows Weekly
1419454800 This Week in Google
1419465600 Tech News 2Night

Thursday, December 25

1419530400 Tech News Today
1419534000 Know How...
1419537600 Marketing Mavericks
1419543000 Coding 101
1419546600 Home Theater Geeks
1419553800 The Giz Wiz

Friday, December 26

1419616800 Tech News Today
1419638400 Tech News 2Night

Saturday, December 27

1419706800 The Tech Guy

Sunday, December 28

1419793200 The Tech Guy
1419807600 This Week in Tech

Monday, December 29

1419876000 Tech News Today
1419879600 Triangulation
1419885000 iPad Today
1419897600 Tech News 2Night

Tuesday, December 30

1419962400 Tech News Today
1419966000 MacBreak Weekly
1419973200 Security Now
1419980400 Before You Buy
1419984000 Tech News 2Night
1419987600 All About Android
1419996600 Padre's Corner

Wednesday, December 31

1420043400 FLOSS Weekly
1420048800 Tech News Today
1420052400 Windows Weekly
1420059600 This Week in Google
1420070400 Tech News 2Night
1420072200 Android App Arena
1420077600 Ham Nation

Thursday, January 1

1420135200 Tech News Today
1420138800 Know How...
1420142400 Marketing Mavericks
1420147800 Coding 101

Most Recent Episodes

iPad Today
Episode #228: 2014 in Review December 22nd, 2014

iPad Air 2, iPad mini 3, bigger iPhones, iOS8

Triangulation
Episode #181: The Best of 2014 December 22nd, 2014

A collection of some of the best interview moments of 2014.

Tech News Today

We talk about women in technology with Elise Hu, Selena Larson, and Sarah Frier.

This Week in Tech

Cyber vandalism, the 'Year in Search,' Yahoo story time, and more.

The Tech Guy
The Tech Guy 1146 December 21st, 2014

iMac Fusion drive vs SSD.

The Tech Guy
The Tech Guy 1145 December 20th, 2014

Is North Korea responsible for the Sony hack?

Tech News 2Night

BBC says Apple mistreats factory workers.

This Week in Law

Photojournalist claims a blog infringes his copyright of the monkey selfie.

Tech News Today

The BBC has aired a new documentary slamming Apple

This Week in Computer Hardware

AMD Omega Driver, mechanical keys, and Broadwell NUC pics.

Know How... 102

Intro to Linux, RC Suspension, & ARP Cache Poisoning Attack

July 17 2014

We talk about the new Raspberry Pi B+, expert guest Aaron Newcomb goes over the different flavors of linux, learn how a remote control car suspension works, and put your black hat on for ARP Cache Poisoning Attack.

News Topic
Raspberry Pi B+ Announced

Linux 101

Aaron Newcomb shows the different flavors of Linux.

Remote Control Car Suspension

Coil Overs and Ball Bearings explained

The ARP Cache Poisoning Attack

The ARP Cache Poisoning Attack
ARP = "Address Resolution Protocol"
MAC = "Media Access Control"

Most of us think that our computers are identified by their IP address.
- However, on an ethernet network, they're actually identified by their MAC address (Media Access Control)
- A MAC is a 6-byte Hexideximal string that looks like, "00:11:aa:bb:cc:dd"

When we connect a computer to a network, it needs to become aware of all the other devices on the network, and all the other devices on the network need to become aware of the device.
- That's what ARP does: It correlates an IP address to a MAC address so that we can find a computer on the network with a particular IP address

Here's how it works:
* Computer A needs to send a file to Computer B
* Computer A knows that Computer B has the IP address of 192.168.1.2
* Computer A does an ARP Broadcast saying, "Hey! Who has the IP address 192.168.1.2?"
* Computer B hears the broadcast and responds, "I Do! 00:00:00:aa:aa:aa"
* Computer A know knows how to send the file to Computer B

Here's how access to the Internet Works:
* Computer A connects to the Network and receives a DHCP address of 192.168.1.3 with a gateway of 192.168.1.1
* It wants to sent data through the gateway to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router(gateway) responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff
* Computer A sends data through the gateway at aa:bb:cc:dd:ee:ff

** Important to note is that all the devices will CACHE that response: so they all know which IPs belong to which MAC addresses.

Here's how a CACHE Poisoning Attack Works:
* Computer A wants to send data to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff"
* The attacking computer takes note that the gateway is at aa:bb:cc:dd:ee
* The attacking computer responds CONTINUOUSLY "I'm 192.168.1.1 22:22:22:22:22:22"
* Computer A sends data through WHAT IT THINKS is the gateway at 22:22:22:22:22:22
* The attacking computer receives the data, sniffs it, then sends it on to the REAL gateway at aa:bb:cc:dd:ee:ff

Using Cain and Abel
1. Download and Install Cain and Abel
2. You may need to disable global taskoffloading (netsh int ip set global taskoffload=disable)
3. Run the Sniffer
4. Switch to the Sniffer tab and hit the "+" icon to add a range scan (Use the IP range you're a part of)
5. Switch to the "ARP" tab at the bottom of the screen
6. Hit the "+" icon to Select your router and the client that you want to poison (or multiple clients)
7. Hit the "ARP" icon in the top bar to start the attack
8. Run Wireshark for more clear information

Connect with us!
Don't forget to check out our large library of projects at www.twit.tv/kh.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj, @Cranky_Hippo and @Anelf3
-Check out our transcripts.