Alright guys, so I'm staying at a hotel right now, not gonna say which one. I've basically done some security testing, they have a couple of critical open ports, FTP, and SSH open, unfiltered, able to be fucked over. I've tried packet sniffing on their network, to see if they encrypt their traffic at all, and of course they don't... Which is incredibly stupid seeing as this is a huge hotel, and there is a potential treasure trove of information waiting for a person with malicious intent to come along. I feel like going down to the office, and asking to speak with the hotel manager, and give them some tips on how they can improve their security. As I'm sure their reception desk uses the same wifi, so if they scan credit cards or what not, and transmit them over the wifi.... Well I'm sure you will know what can happen. However I took a look at their TOS regarding internet usage, and it looks like what I'm doing is Illegal, even though I have non-malicious intent. I am not sniffing their network anymore, and not attempting to break into their open ports. However being in the US on vacation, and not being a US citizen, I don't really feel like putting myself in danger. So what do GC, this is a multi-billion dollar hotel chain, that has very critical security flaws just out in the open. I've done this sort of thing before and have been threatened to be arrested and tried in court. The main difference is that I wasn't at the actual location, and was hiding myself. Anyone telling me to go malicious: Suck a dick.
Yea I'm pretty sure that's what I'm goingg to do; What I'm worried about is them then checking through their internet logs, and finding out who was doing the packet sniffing and port scanning. @HSO: Lol, than when I'm on my way to the airport, they could place a warrant for my arrest and I could get pulled over at customs.
I would argue that opening wireshark, and zenmap isn't really having any powers.... But hey, to each their own.
Too bad each hotel under this chain will have different internal networks, as they aren't hosted on the same data center. Lear moar pl0x than reply here
But for real just ignore it, they are not paying you to secure their network so it is not your problem. Maybe say you will offer some security tips if your stay is free
I've reported security holes to websites before just because I felt like it, and I've been paid before. Same thing could happen this time.
It works quite well, get a little good at Social Engineering, and you can almost convince admins to toss you a little denero for reporting them vulns :3
If their network security is as loose as you say it is, it's unlikely they are logging any sort of network traffic (costs a lot of $ for a setup like that). I would say e-mail them after you get home, with some evidence you gathered showing the weaknesses. Maybe wait a while so they don't know you were just at the hotel. Open ports or not, I still highly doubt that they are transmitting unencrypted credit card data. Keep in mind that for inbound network connections to function, a port needs to be open. For example having SSH open still means that they can only connect to an SSH daemon and must go through SSH authentication to do anything.
Same as Sun Stoner, I just left my job at a hotel, we had roaches infesting our LL employee areas, it was fuggin disgusting. They are probably too cheap to care...it's sad, but the hotel business is dirty.
[quote name='"Thewastedyouth"']I thought this thread was gunna be about peepholes where people can watch sex through the wall![/quote] honestly i did too