New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere

Short for Remote Authentication Dial-In User Service, RADIUS harkens back to the days of dial-in Internet and network access through public switched telephone networks. It has remained the de facto standard for lightweight authentication ever since and is supported in virtually all switches, routers, access points, and VPN concentrators shipped in the past two decades.

Source: New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere | Ars Technica

How DARPA Trucked Its Massive Radio Frequency Testbed Across The United States

Colosseum may look like a data center, but in reality, it’s a massive radio-frequency emulation testbed that DARPA built for its Spectrum Collaboration Challenge (SC2). SC2 has been a three-year competition to demonstrate the validity of using artificial intelligences to work together in order to use wireless spectrum more efficiently than operating on pre-allocated bands would be.

Source: The Forklift Ballet: How DARPA Trucked Its Massive Radio Frequency Testbed Across The United States IEEE Spectrum – IEEE Spectrum

Why big ISPs aren’t happy about Google’s plans for encrypted DNS

Widespread adoption of DoH would limit ISPs’ ability to both monitor and modify customer queries. It wouldn’t necessarily eliminate this ability, since ISPs could still use these techniques for customers who use the ISP’s own DNS servers. But if customers switched to third-party DNS servers—either from Google or one of its various competitors—then ISPs would no longer have an easy way to tell which sites customers were accessing.

Source: Why big ISPs aren’t happy about Google’s plans for encrypted DNS | Ars Technica

How malformed packets caused CenturyLink’s 37-hour, nationwide outage

The switching module sent these malformed packets “as network management instructions to a line module,” and the packets “were delivered to all connected nodes,” the FCC said. Each node that received the packet then “retransmitted the packet to all its connected nodes.”

Source: How malformed packets caused CenturyLink’s 37-hour, nationwide outage | Ars Technica

But the outage continued because “the malformed packets continued to replicate and transit the network, generating more packets as they echoed from node to node,” the FCC wrote. Just after midnight, at least 20 hours after the problem began, CenturyLink engineers “began instructing nodes to no longer acknowledge the malformed packets.” They also “disabled the proprietary management channel, preventing it from further transmitting the malformed packets.”

A DIY Internet Network Has Drastically Expanded Its Coverage in NYC

Initially, the mesh network was powered by a single “Supernode” antenna and hardware array located at 375 Pearl Street in Manhattan. This gigabit fiber-fed antenna connects 300 buildings, where members have mounted routers on a rooftop or near a window. These local “nodes” in turn connect to an internet exchange point—without the need for a traditional ISP.

Source: A DIY Internet Network Has Drastically Expanded Its Coverage in NYC – VICE

Linux PCs, servers, gadgets can be crashed by ‘Ping of Death’ network packets

With CVE-2019-11477, a string of TCP SACK responses will cause the Linux kernel to unexpectedly hit an internal data structure limit, triggering a fatal panic. The others affecting Linux will force the system to consume resources, thus slowing it down, as Red Hat explained in its technical summary today.

Source: Sad SACK: Linux PCs, servers, gadgets can be crashed by ‘Ping of Death’ network packets • The Register

Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi

That’s why this bug is so cool and provides an opportunity to exploit devices literally with zero-click interaction at any state of wireless connection (even when a device isn’t connected to any network). For example, one can do RCE in just powered-on Samsung Chromebook. So just to summarize:

  1. It doesn’t require any user interaction.
  2. It can be triggered every 5 minutes in case of GNU/Linux operating system.
  3. It doesn’t require the knowledge of a Wi-Fi network name or passphrase/key.
  4. It can be triggered even when a device isn’t connected to any Wi-Fi network, just powered on.

Source: Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi: from zero knowledge to zero-click RCE – Embedi

In this research, I used ALFA networks wireless adapter in the monitor mode, which is based on Realtek 8187 wireless chipset. The exploit can be implemented with python Scapy framework. For some reason, Ubuntu GNU/Linux distrubution isn’t good enough to inject Wi-Fi frames fast, so it is better to use Kali.