Hacker News new | past | comments | ask | show | jobs | submit login

Sounds like the attacker has to be on the local network (or presumably VPN) to use the exploit? If so that's a nontrivial hurdle in many cases.



Like a WiFi at a café or airport?


it should be mentioned that even with WPA2-PSK wifi you are vulnerable to arp spoofing


Public WiFi networks really should use client isolation. Sadly, many don't.


You can just go to a public place and run your own hotspot.


And use a name and SSID of some well-known public WiFi network. Then make a captive portal to force the user open an attacker-controlled page in a browser.


Even if client isolation is used, do you trust your local cafe’s WiFi AP?


I was thinking in enterprise contexts, but, yes, that's fair. Still, anybody doing anything important on public WiFi should be using a VPN.


How will a vpn protect the user if the target laptop is listening on a public wifi connection?


Actually maybe it wouldn't... I guess underneath the VPN it still has to be listening.


The author details the options. If can find an XSS on dells website it’s possible.


It looks to me like you could register any domain starting with "localhost" (eg. localhostevil.com) and it would work.

(apart from the download whitelist)




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: