Hacker unscrambles web-coded traffic

Comment on this story
iol scitech dec 6 pc hack pic www.sxc.hu

Las Vegas - A hacking expert has launched a $200 (about R1600) password-cracking tool that makes it easy to decipher Internet traffic sent through a widely used method for securing businesses communications.

Moxie Marlinspike, one of the world's top encryption experts, unveiled the tool on Saturday during a presentation at the Def Con hacking conference in Las Vegas.

Marlinspike said he developed the service, CloudCracker.com, by taking advantage of a vulnerability he discovered in a widely used virtual private network technology known as point-to-point tunnelling protocol.

Virtual private networks, or VPNs, scramble traffic as it travels between a PC and its final destination so that the data is useless to hackers if they eavesdrop on those communications.

But Marlinspike provides clients with a tool that analyses captured data streams and creates a data file that they upload to his website. He then runs that through code-cracking computer programs that figure out a password that will unscramble the protected communications. He delivers that to clients within 24 hours.

With access to web traffic, hackers could potentially steal passwords to financial accounts, read business emails and learn business secrets.

Marlinspike said he will not screen clients to determine whether they are using CloudCracker for illegal purposes, although his ultimate intent is help computer users by pressuring operating systems makers to make their software safer.

“What we're trying to do is force people to use more secure VPN technology in the products they are building,” he said.

Marlinspike said that small to mid-sized businesses and consumers typically use VPN software with the point-to-point tunnelling protocol.

Large corporations typically supply their employees with VPN software from Cisco Systems, whose communications cannot be cracked by CloudCracker.com, he said.

Marlinspike has worked for Twitter since the end of last year when the mobile blogging service acquired a company he co-founded, Whisper Systems. Marlinspike said that CloudCracker.com was a personal project and has nothing to do with Twitter.

Hackers and security experts present research on a wide range of vulnerabilities in products ranging from computers and networking equipment to locks, drones and air-traffic control systems at the annual Def Con gathering.

They often publicise their work in an effort to warn the public about security risks and pressure manufacturers to address the problems. - Reuters

Hungry for more scitech news? Sign up for our daily newsletter

sign up

Comment Guidelines

  1. Please read our comment guidelines.
  2. Login and register, if you haven’ t already.
  3. Write your comment in the block below and click (Post As)
  4. Has a comment offended you? Hover your mouse over the comment and wait until a small triangle appears on the right-hand side. Click triangle () and select "Flag as inappropriate". Our moderators will take action if need be.

  5. Verified email addresses: All users on Independent Media news sites are now required to have a verified email address before being allowed to comment on articles. You are only required to verify your email address once to have full access to commenting on articles. For more information please read our comment guidelines