How TunnelVision Can Bypass Your VPN and Break the Internet: Vulnerability Explained

Поделиться
HTML-код
  • Опубликовано: 12 окт 2024

Комментарии • 22

  • @lizziemoratti8353
    @lizziemoratti8353 4 месяца назад +4

    One of the authors of TunnelVision here. That was a great video and I wish we had the ability to make those clean animations!
    Something to note that this will primarily affect those who are connecting from untrusted networks (i.e. public wifi). Your bottom line explanation was great. Hope you'll do another video when we release the second blog post about the side channel when a provider uses firewall mitigations.

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      Thank you Lizzie! HUGE kudos for sharing your research with the rest of us! We learned a lot from your blog, video and github project (www.leviathansecurity.com/blog/tunnelvision). Agreed, the untrusted wifi attack vector is a major concern. We are looking forward to your future posts and release of ArcaneTrickster and will absolutely plan on a follow-up video.

  • @jasonnaftis3766
    @jasonnaftis3766 4 месяца назад +4

    You can always use a static ip address on devices on your home network.

    • @Cyberspatial
      @Cyberspatial  4 месяца назад +1

      I do that at home, except on enterprise networks gets much harder to manage. - Ricky

  • @FBGKaneki-qx3dk
    @FBGKaneki-qx3dk Месяц назад

    For some reason your videos are easy to understand than other videos 😂

  • @XxguaxinimxX.
    @XxguaxinimxX. 4 месяца назад +1

    Ok, I'm not gonna lie
    I clicked just for the Portal thumbnail 😂😂😂

  • @glennac
    @glennac 4 месяца назад +4

    So, according to the beginning on the video, the attacker has to be on your local network to do this? Or did I misunderstand the beginning? 🤔

    • @stevehenderson7168
      @stevehenderson7168 4 месяца назад +3

      Yes, you are correct -- the attacker needs to be on the same network/broadcast domain so they can intercept the DHCP request. This is hopefully unlikely inside our secure homes/offices, but presents a serious risk in public settings (e.g. hotel, airport, campus WIFI). Take care!

    • @Cyberspatial
      @Cyberspatial  4 месяца назад +5

      If your computer gets malware it can run a rogue DHCP server and mess up all your other devices.

  • @dragonsword343
    @dragonsword343 4 месяца назад

    I think the DHCP standard firewall is your best bet, unless the attacker can "convince" the network that it is somehow the home address itself; as per the latter two solutions (endpoint & network security): there's already prints that say the pen can conceal/manipulate the IP such that these security protocols don't recognize it. Speculatively, an industry could somehow how two distinct/autonomous servers, one of which is actually offline and not used for business at all, though somehow make its network configuration such that it is the main/live server, then use it as a honey pot for any pen- although this would presume the pen doesn't know which server is actually live, but some cloud trinkets could buy enough time for the honeypot to activate. Maybe someday DDOS won't be possible if somehow ALL IPs are traceable to its original hardware, but that's more sci fi for now perhaps...

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      Yes 100% -- restricting DHCP messages to only trusted servers with a firewall rule is a great solution. Just beware of any side effects when you need to get DHCP on new networks (you can disable the rule). You can find some how-to's here: github.com/cyberspatiallabs/TunnelVision

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      That's a great point about compromising your home gateway itself. If that happens there are a lot of bad things that can happen! All the reason to protect your routers and access points to ensure they are up to date on firmware, monitored, and physically secure. Your ideas on a shadow network and traceable addresses are really cool.

  • @aua_995
    @aua_995 4 месяца назад

    Gr8 demo 💯👍

  • @juanmontoya6622
    @juanmontoya6622 4 месяца назад

    Backdoors on Client VPNs?

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      Yes likely, depending on the VPN you're using.

  • @Unknown-tu7lg
    @Unknown-tu7lg 4 месяца назад +1

    I cannot afford a VPN anyways

    • @DayrusBPB
      @DayrusBPB 4 месяца назад

      It's $2-5/month, use it for public/unsecure wifi or if u have a business only.

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      If you aren't using a VPN you are still susceptible to.this type of attack.

    • @Unknown-tu7lg
      @Unknown-tu7lg 4 месяца назад

      @@Cyberspatial i turn off my wifi

  • @fencepanelist
    @fencepanelist 4 месяца назад +1

    Wow - music - boo

    • @Cyberspatial
      @Cyberspatial  4 месяца назад

      I've asked our team to just have music for the intro going forward 👍

  • @HideBuz
    @HideBuz 4 месяца назад

    It's just a mim attack.