Schedule

Schedule

Tuesday, April 28

1430240400 Tech News Today
1430244000 MacBreak Weekly
1430253000 Security Now
1430262000 Tech News 2Night
1430265600 All About Android

Wednesday, April 29

1430321400 FLOSS Weekly
1430326800 Tech News Today
1430330400 Windows Weekly
1430337600 This Week in Google
1430348400 Tech News 2Night
1430350200 Android App Arena
1430355600 Ham Nation

Thursday, April 30

1430413200 Tech News Today
1430416800 Know How...
1430422200 Marketing Mavericks
1430427600 Home Theater Geeks
1430434800 Tech News 2Night
1430436600 The Giz Wiz

Friday, May 1

1430499600 Tech News Today
1430503200 This Week in Law
1430514000 Before You Buy
1430521200 Tech News 2Night

Saturday, May 2

1430589600 The Tech Guy

Sunday, May 3

1430676000 The Tech Guy
1430690400 This Week in Tech

Monday, May 4

1430758800 Tech News Today
1430762400 Triangulation
1430767800 iPad Today
1430775000 Coding 101
1430780400 Tech News 2Night

Tuesday, May 5

1430845200 Tech News Today
1430848800 MacBreak Weekly
1430857800 Security Now
1430866800 Tech News 2Night
1430870400 All About Android

Wednesday, May 6

1430926200 FLOSS Weekly
1430931600 Tech News Today
1430935200 Windows Weekly
1430942400 This Week in Google
1430953200 Tech News 2Night
1430955000 Android App Arena
1430960400 Ham Nation

Thursday, May 7

1431018000 Tech News Today
1431021600 Know How...
1431027000 Marketing Mavericks
1431032400 Home Theater Geeks
1431039600 Tech News 2Night
1431041400 The Giz Wiz

Most Recent Episodes

iPad Today

Apple Watch vs. the iPad

Triangulation

Luria Petrucci, AKA Cali Lewis talks about her latest project Geeks Life and more.

Coding 101

Internal Iterators, SMART Dynamically typed variables, and HHVM vs. ASP.NET.

Tech News Today

Google announced a new initiative today: The Patent Purchase Promotion.

This Week in Tech

Hands on the Apple Watch, Tesla battery, tractor EULAs, and more.

The Tech Guy
The Tech Guy 1182 April 26th, 2015

Managing your cell data, soundbars, top Android phones, and more.

The Tech Guy
The Tech Guy 1181 April 25th, 2015

Leo Laporte's first impressions of the Apple Watch.

Tech News 2Night

Quick tips for feeling better about your facebook usage.

Before You Buy

Leo Laporte unboxes the Apple Watch.

This Week in Enterprise Tech

Facebook vs. Spammers and Twitter vs. Trolls.

Know How... 102

Intro to Linux, RC Suspension, & ARP Cache Poisoning Attack

July 17 2014

We talk about the new Raspberry Pi B+, expert guest Aaron Newcomb goes over the different flavors of linux, learn how a remote control car suspension works, and put your black hat on for ARP Cache Poisoning Attack.

News Topic
Raspberry Pi B+ Announced

Linux 101

Aaron Newcomb shows the different flavors of Linux.

Remote Control Car Suspension

Coil Overs and Ball Bearings explained

The ARP Cache Poisoning Attack

The ARP Cache Poisoning Attack
ARP = "Address Resolution Protocol"
MAC = "Media Access Control"

Most of us think that our computers are identified by their IP address.
- However, on an ethernet network, they're actually identified by their MAC address (Media Access Control)
- A MAC is a 6-byte Hexideximal string that looks like, "00:11:aa:bb:cc:dd"

When we connect a computer to a network, it needs to become aware of all the other devices on the network, and all the other devices on the network need to become aware of the device.
- That's what ARP does: It correlates an IP address to a MAC address so that we can find a computer on the network with a particular IP address

Here's how it works:
* Computer A needs to send a file to Computer B
* Computer A knows that Computer B has the IP address of 192.168.1.2
* Computer A does an ARP Broadcast saying, "Hey! Who has the IP address 192.168.1.2?"
* Computer B hears the broadcast and responds, "I Do! 00:00:00:aa:aa:aa"
* Computer A know knows how to send the file to Computer B

Here's how access to the Internet Works:
* Computer A connects to the Network and receives a DHCP address of 192.168.1.3 with a gateway of 192.168.1.1
* It wants to sent data through the gateway to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router(gateway) responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff
* Computer A sends data through the gateway at aa:bb:cc:dd:ee:ff

** Important to note is that all the devices will CACHE that response: so they all know which IPs belong to which MAC addresses.

Here's how a CACHE Poisoning Attack Works:
* Computer A wants to send data to the Internet, so it does an ARP Broadcast saying, "Hey! Which of you is the gateway at 192.168.1.1?"
* The router responds, "I'm 192.168.1.1 aa:bb:cc:dd:ee:ff"
* The attacking computer takes note that the gateway is at aa:bb:cc:dd:ee
* The attacking computer responds CONTINUOUSLY "I'm 192.168.1.1 22:22:22:22:22:22"
* Computer A sends data through WHAT IT THINKS is the gateway at 22:22:22:22:22:22
* The attacking computer receives the data, sniffs it, then sends it on to the REAL gateway at aa:bb:cc:dd:ee:ff

Using Cain and Abel
1. Download and Install Cain and Abel
2. You may need to disable global taskoffloading (netsh int ip set global taskoffload=disable)
3. Run the Sniffer
4. Switch to the Sniffer tab and hit the "+" icon to add a range scan (Use the IP range you're a part of)
5. Switch to the "ARP" tab at the bottom of the screen
6. Hit the "+" icon to Select your router and the client that you want to poison (or multiple clients)
7. Hit the "ARP" icon in the top bar to start the attack
8. Run Wireshark for more clear information

Connect with us!
Don't forget to check out our large library of projects at www.twit.tv/kh.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj, @Cranky_Hippo and @Anelf3
-Check out our transcripts.