Schedule

Schedule

Wednesday, September 17

1411002000 Ham Nation

Thursday, September 18

1411059600 Tech News Today
1411063200 Know How...
1411066800 The Social Hour
1411072200 Coding 101
1411075800 Home Theater Geeks
1411081200 Tech News 2Night
1411083000 The Giz Wiz
1411092000 OMGcraft

Friday, September 19

1411146000 Tech News Today
1411149600 This Week in Law
1411156800 Android App Arena
1411167600 Tech News 2Night

Saturday, September 20

1411236000 The Tech Guy

Sunday, September 21

1411322400 The Tech Guy
1411336800 This Week in Tech

Monday, September 22

1411405200 Tech News Today
1411408800 Triangulation
1411414200 iPad Today
1411426800 Tech News 2Night
1411428600 Marketing Mavericks

Tuesday, September 23

1411491600 Tech News Today
1411495200 MacBreak Weekly
1411502400 Security Now
1411509600 Before You Buy
1411513200 Tech News 2Night
1411516800 All About Android
1411525800 Padre's Corner

Wednesday, September 24

1411572600 FLOSS Weekly
1411578000 Tech News Today
1411581600 Windows Weekly
1411588800 This Week in Google
1411599600 Tech News 2Night
1411601400 redditUP
1411606800 Ham Nation

Thursday, September 25

1411664400 Tech News Today
1411668000 Know How...
1411671600 The Social Hour
1411677000 Coding 101
1411680600 Home Theater Geeks
1411686000 Tech News 2Night
1411687800 The Giz Wiz
1411696800 OMGcraft

Friday, September 26

1411750800 Tech News Today
1411754400 This Week in Law
1411761600 Android App Arena
1411772400 Tech News 2Night

Saturday, September 27

1411840800 The Tech Guy

Most Recent Episodes

Tech News 2Night

Chinese Hackers infiltrate military transportation.

This Week in Google

Google changes stance on cellular net neutrality

iFive for the iPhone

iPhone pre-orders break records, NFC for Apple Pay only.

Windows Weekly
Episode #380: Call of Minecraft September 17th, 2014

Windows 9 leak-a-palooza, Layoffs at Microsoft and the Surface Pro 3 sells out (cough).

FLOSS Weekly
Episode #309: Sqitch September 17th, 2014

Sqitch is a database change management application

Tech News Today

Apple's latest iOS version 8 released today.

Padre's Corner

Cancer Bees, Clean Coal, Ranting on Comcast, and a romp through TechTV.

Before You Buy

Leo Laporte reviews the Moto 360 Android Wear watch.

All About Android

Does everything point back to Android Silver, that oft rumored and never confirmed project?

Security Now
Episode #473: Google vs. SHA-1 September 16th, 2014

Steve Gibson analyzes Google on deprecating SHA-1.

Know How... 102

Intro to Linux, RC Suspension, & ARP Cache Poisoning Attack

July 17 2014

We talk about the new Raspberry Pi B+, expert guest Aaron Newcomb goes over the different flavors of linux, learn how a remote control car suspension works, and put your black hat on for ARP Cache Poisoning Attack.

News Topic
Raspberry Pi B+ Announced

Linux 101

Aaron Newcomb shows the different flavors of Linux.

Remote Control Car Suspension

Coil Overs and Ball Bearings explained

The ARP Cache Poisoning Attack

The ARP Cache Poisoning Attack
ARP = "Address Resolution Protocol"
MAC = "Media Access Control"

Most of us think that our computers are identified by their IP address.
- However, on an ethernet network, they're actually identified by their MAC address (Media Access Control)
- A MAC is a 6-byte Hexideximal string that looks like, "00:11:aa:bb:cc:dd"

When we connect a computer to a network, it needs to become aware of all the other devices on the network, and all the other devices on the network need to become aware of the device.
- That's what ARP does: It correlates an IP address to a MAC address so that we can find a computer on the network with a particular IP address

Here's how it works:
* Computer A needs to send a file to Computer B
* Computer A knows that Computer B has the IP address of 192.168.1.2
* Computer A does an ARP Broadcast saying, "Hey! Who has the IP address 192.168.1.2?"
* Computer B hears the broadcast and responds, "I Do! 00:00:00:aa:aa:aa"
* Computer A know knows how to send the file to Computer B

Here's how access to the Internet Works:
* Computer A connects to the Network and receives a DHCP address of 192.168.1.3 with a gateway of 192.168.1.1
* It wants to sent data through the gateway to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router(gateway) responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff
* Computer A sends data through the gateway at aa:bb:cc:dd:ee:ff

** Important to note is that all the devices will CACHE that response: so they all know which IPs belong to which MAC addresses.

Here's how a CACHE Poisoning Attack Works:
* Computer A wants to send data to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff"
* The attacking computer takes note that the gateway is at aa:bb:cc:dd:ee
* The attacking computer responds CONTINUOUSLY "I'm 192.168.1.1 22:22:22:22:22:22"
* Computer A sends data through WHAT IT THINKS is the gateway at 22:22:22:22:22:22
* The attacking computer receives the data, sniffs it, then sends it on to the REAL gateway at aa:bb:cc:dd:ee:ff

Using Cain and Abel
1. Download and Install Cain and Abel
2. You may need to disable global taskoffloading (netsh int ip set global taskoffload=disable)
3. Run the Sniffer
4. Switch to the Sniffer tab and hit the "+" icon to add a range scan (Use the IP range you're a part of)
5. Switch to the "ARP" tab at the bottom of the screen
6. Hit the "+" icon to Select your router and the client that you want to poison (or multiple clients)
7. Hit the "ARP" icon in the top bar to start the attack
8. Run Wireshark for more clear information

Connect with us!
Don't forget to check out our large library of projects at www.twit.tv/kh.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj, @Cranky_Hippo and @Anelf3
-Check out our transcripts.