Author Topic: Bypassing Antamedia payment system  (Read 7930 times)

0 Members and 2 Guests are viewing this topic.

Offline Feyd

  • /dev/null
  • *
  • Posts: 18
  • Cookies: -1
  • The spice must flow
    • View Profile
Re: Bypassing Antamedia payment system
« Reply #15 on: July 29, 2013, 05:09:38 pm »
This is not local cracking, GPU's have nothing to do with it.
Poor old online cracking against a probably already overloaded box.
If the software is any good it will also limits the attempts.
Yeah.. I guess that is very true. It will have to be online.
Well in that case we can probably rule out brute force :)

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: Bypassing Antamedia payment system
« Reply #16 on: July 29, 2013, 05:29:03 pm »
Your only option there is to send deautentication floods if your in physical range , this would make reconnecting for this person impossible.
Keep in mind that sending deauthentication floods would also make it impossible for you to connect with a spoofed MAC address, since you are deauthing that MAC address.

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Bypassing Antamedia payment system
« Reply #17 on: July 29, 2013, 05:42:06 pm »
Keep in mind that sending deauthentication floods would also make it impossible for you to connect with a spoofed MAC address, since you are deauthing that MAC address.

Lol your right :P
Well lets rule that one out aswell.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

xC

  • Guest
Re: Bypassing Antamedia payment system
« Reply #18 on: July 29, 2013, 07:55:41 pm »
Well, if you have to enter credentials into the browser after connecting to the hotspot it may have some pre-authentication functions still available for such an attack. I however don't know anything about the software as it may just redirect everything to the console.

Offline m0l0ko

  • Peasant
  • *
  • Posts: 129
  • Cookies: -4
    • View Profile
Re: Bypassing Antamedia payment system
« Reply #19 on: August 01, 2013, 12:26:02 pm »
So has anyone got any ideas? I'm thinking I can ARP spoof an IP who is logged in with a ticket, then the router will think I'm logged in with a ticket. Besides that I don't have any ideas.

Offline Xires

  • Noob Eater
  • Administrator
  • Knight
  • *
  • Posts: 379
  • Cookies: 149
    • View Profile
    • Feed The Trolls - Xires
Re: Bypassing Antamedia payment system
« Reply #20 on: August 01, 2013, 02:52:13 pm »
Years ago(2005), I was contracted to create a solution similar to these.  The method that I used was simply to route all outgoing traffic to the device itself.  Running a webserver on the device, I provided a page that would request a code.  Submission of an appropriate code would trigger a CGI to add a rule to the top of the firewall allowing the submitter to jump the reroute rule.  The rule added would include the submitter's MAC address so the IP was unimportant.  After a configured amount of time, the system would expire old MACs and remove the associated rules.  This meant that to continue use of the system, you had to submit a new code which would re-add you.  Since the system expired MACs from a timestamp'd list counting only newest entries, a side-effect was that you could 'refresh' your time with every code submission.  The time did NOT stack, so I didn't have to worry about someone purchasing 3 items separately at a location and obtaining 3 codes to use successively which would allow them 72 hours of continuous usage.  Again, the aforementioned method did NOT work, so the shop owner was secured from such an attempt.

The only way to 'bypass' the firewall was to spoof one's MAC address to that of another existing user.  The problem with this method, however, is that the other user had to have active time left and that means potential traffic confusion if the target is still there.  However, if they are not there and they still have active time before expiration, then spoofing their MAC would work.  Of course, once that rule was expired, another purchase would need to be made OR another target MAC would have to be spoofed.  This could result in a very unstable connection, particularly if the router's configured expire time was 1 hour or less.

Overall, the system that I came up with was extremely simple and I only later discovered its elegance.  Because it is so simple, the same concept is easily reproduced on many, many different devices of similar purpose.



It should also be mentioned that commercially-supported devices often need maintenance.  As such, a commercial entity *may* decide to provide a bypass rule which matches a specific set of MAC addresses.  Because MAC addresses are generated per-device, the first few octets represent the producing company, model, series, etc.  As such, a maintenance device could match half-open MAC rule which would define a required model, but leave the specific NIC ID as a wildcard.  Doing so would permit any maintenance personnel with an appropriately supplied device use of the system for free.  Thus, a hacker *could* feasibly spoof a MAC address that matches a maintenance ID and may find a loophole through the system.  This is only a possibility, not a definitive approach.
« Last Edit: August 01, 2013, 02:58:37 pm by Xires »
-Xires