Public hotspots are a pretty major hole. Say you connect to a free, wide-open hotspot. All the network knows about you is your MAC address and the IP address it gave you. The MAC address can tie you to a hardware vendor but thats about it. Technically, it’s a layer 2 routing address so isn’t generally transmitted past the gateway so it wouldn’t be known to the system being attacked.
Given that the IP leases will change quite often (through DHCP as well as the fact that users are transient) it’s pretty hard to track users down.
However, there are methods that can be used. I don’t think I’m violating any board rules here in discussing this as a) this is used to catch criminals and b) it’s by no means a how-to on avoiding detection.
First, your browser helpfully sends out some useful information about your machine. If you detect a break-in, often you can combine the web server logs to get an idea if the multiple different addresses found in your logs match the same browser (obviously, this works better for esoteric machine configurations, and only if the hole is via the HTTP service).
Secondly, it’s often possible to tie an IP address (from your intrusion detection logs say) to a particular hot-spot, and even a geographic area. If you find a pattern here, it focuses your investigation.
Thirdly, in my experience if somebody is breaking and entering they often come back. It’s not always convenient to sit outside a StarBucks to piggy-back off their WiFi. You only need the perp to connect from home, or their own ISP once and then you suddenly got much closer to finding them.
As an interesting aside, Microsoft used to embed in their Office documents a GUID based on pseudo-random values. A GUID - Globally Unique IDentifier - is used to provide a unique handle to a file or object, irrespective of the name or when it was created. What they didn’t mention (for a very long time) is that one of the values used in the GUID was the MAC address of the network card of that computer - if present. I have in the past traced “improper” documents back to a user and a machine by identifying the GUID and matching the MAC.
There are some other methods but I think discussing them is getting a bit closer to a how-to-avoid-detection.
So, in essence, it does make things harder for the good-guys but the knowledge, techniques and technology for catching people has also increased.
On a similar topic, having read the wealth of “Ask an xxx” threads on the SDMB, I was tempted to offer myself up as the subject of “Ask an ex-hacker”. If there is any interest I’ll start a thread.