SlideShare a Scribd company logo
1 of 19
Drive-by Healing

Can Hacking Techniques Be Used For
              Good?
Aims
• Discover if a malicious hacking technique could
  be used for good

• Investigate Drive-by Downloads, and adapt them
  to deliver updates instead of malware

• Attempt to create a Wi-Fi Hotspot system that
  triggers a Drive-by Healing process to update the
  computer silently
                      Drive-by Healing        Andrew Cronin
What Good Can Hacking Do?
• Find holes in software
  – Without abusing them
• Give-aways
  – Money, Software, Vouchers
• Fix Software
  – Updates




                      Drive-by Healing   Andrew Cronin
Drive-by Healing
• Drive-by Downloads
  – One of the biggest problems on the Internet
  – Just loading a page can infect
  – Payloads:
     • Trojans
     • Botnets
     • Other viruses




                       Drive-by Healing           Andrew Cronin
Drive-by Healing
• Healing
  – To make better, to make sound or healthy.
• How can computers be healed?
  – Hardware repairs
  – Software repairs
     •   Patches
     •   Updates
     •   Anti-virus
     •   New software

                        Drive-by Healing        Andrew Cronin
Project Method
•   Researching Wi-Fi Hotspots
•   Researching Drive-by Downloads
•   Firmware Flashing
•   Captive Portal
•   Virtual Machine & Heap Spraying




                       Drive-by Healing   Andrew Cronin
Hotspots
• Used in establishments and businesses all over
• Wi-Fi Industry big business
   – Advertising
   – Paid for services
• DD-WRT Open source firmware can re-create
  Hotspots
• Captive Portals block internet access until terms
  are agreed


                         Drive-by Healing     Andrew Cronin
Drive-by Downloads
• Written in JavaScript
   – Employs Heap Spraying to
     deliver payload
      • Using Shellcode and NOPs
        allocated in arrays
• Requires an exploit to initiate
  payload




                          Drive-by Healing   Andrew Cronin
Legal Issues
• Drive-by Downloads
   – Put data on computers
   – Activate programs and code
      • All Without users knowledge and consent
   – Illegal
• Gaining consent is vital




                         Drive-by Healing         Andrew Cronin
Firmware Flashing
• DD-WRT Firmware uploaded to a Linksys
  E2000 Router after the Router was flashed

• Flashing is required to flush out the old
  firmware




                       Drive-by Healing       Andrew Cronin
Hotspot Services on DD-WRT Firmware
             Drive-by Healing         Andrew Cronin
Captive Portal
• The DD-WRT Firmware has Hotspot services

• CoovaChilli was chosen (connects to ChiliSpot)

• Attempts to Create Captive Portal system for
  Drive-by Download code with Ubuntu system




                      Drive-by Healing       Andrew Cronin
Virtual Machine
• VMWare Player

• Windows XP SP3

• IECollections – Allows
  multiple versions of
  Internet Explorer to run
  simultaneously


                      Drive-by Healing   Andrew Cronin
Heap Spraying
Sample code from ‘Corelan’ site and debuggers to
  test:
• Windbg
• Immunity Debugger
  – Mona.py




                     Drive-by Healing       Andrew Cronin
Heap Spraying
Heap Spray generator page
• For script kiddies
• Tested with Windows
  Calculator




                     Drive-by Healing   Andrew Cronin
Conclusion
There were three different issues that arose
  regarding the Wi-Fi Hotspot:
• Age of systems available was on average 4-5
  years old
• Only complex Linux based systems available
  requiring extra hardware
• Open source projects lacked support making
  install and configuration difficult


                     Drive-by Healing      Andrew Cronin
Conclusion
Other problems concerning the Drive-by Healing
  project included:
• Exploits, being malicious, can be self-
  incriminating, therefore informative articles were
  impossible to find
• Project attempted an ambitious idea that had
  unforeseen complexities



                       Drive-by Healing       Andrew Cronin
Future Work
Wi-Fi Hotspot
• Possible NoCatSplash on DD-WRT
• Other Router, WRT54G
Drive-by Download
• Exploit from Scratch (avoiding script kiddie
  dangers)
• Research into update commands
• Education on the importance of updates

                       Drive-by Healing          Andrew Cronin
QUESTIONS???


               Drive-by Healing   Andrew Cronin

More Related Content

What's hot

Programs you need!
Programs you need!Programs you need!
Programs you need!
dshinkfield
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 

What's hot (20)

Programs you need!
Programs you need!Programs you need!
Programs you need!
 
Docker - Hack Salem! - November 2014
Docker - Hack Salem! - November 2014Docker - Hack Salem! - November 2014
Docker - Hack Salem! - November 2014
 
Leaping the chasm from proprietary to open: A survivor's guide
Leaping the chasm from proprietary to open: A survivor's guideLeaping the chasm from proprietary to open: A survivor's guide
Leaping the chasm from proprietary to open: A survivor's guide
 
Software Packaging/Scripting
Software Packaging/ScriptingSoftware Packaging/Scripting
Software Packaging/Scripting
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security products07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security products
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Pentest Apocalypse
Pentest ApocalypsePentest Apocalypse
Pentest Apocalypse
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slides
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zone
 
Container Landscape -05.01.15
Container Landscape -05.01.15Container Landscape -05.01.15
Container Landscape -05.01.15
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShell
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
6421 b Module-08
6421 b Module-086421 b Module-08
6421 b Module-08
 

Viewers also liked (7)

Theme 8(suite)
Theme 8(suite)Theme 8(suite)
Theme 8(suite)
 
Tic educacion docencia aprendizaje
Tic educacion docencia aprendizajeTic educacion docencia aprendizaje
Tic educacion docencia aprendizaje
 
Reglamento estudiantil maleja
Reglamento estudiantil malejaReglamento estudiantil maleja
Reglamento estudiantil maleja
 
Tendencias En Educación
Tendencias En EducaciónTendencias En Educación
Tendencias En Educación
 
Metronapoli Services- Cisco
Metronapoli Services- CiscoMetronapoli Services- Cisco
Metronapoli Services- Cisco
 
EdiçãO 2 Fevereiro
EdiçãO 2   FevereiroEdiçãO 2   Fevereiro
EdiçãO 2 Fevereiro
 
Curso Plano de Continuidade de Negocios
Curso Plano de Continuidade de NegociosCurso Plano de Continuidade de Negocios
Curso Plano de Continuidade de Negocios
 

Similar to Drive By Healing

Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
Positive Hack Days
 
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Radu Vunvulea
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
PranavPatil822557
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
 

Similar to Drive By Healing (20)

Open Audit
Open AuditOpen Audit
Open Audit
 
Chrome and Android Operating Systems
Chrome and Android Operating SystemsChrome and Android Operating Systems
Chrome and Android Operating Systems
 
Creating your own private Download Center with Bintray
Creating your own private Download Center with Bintray Creating your own private Download Center with Bintray
Creating your own private Download Center with Bintray
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud Platforms
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
 
Mobile security
Mobile securityMobile security
Mobile security
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Virtualization
Virtualization Virtualization
Virtualization
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
Chrome O S
Chrome O SChrome O S
Chrome O S
 
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
 
Container DevOps in Azure
Container DevOps in AzureContainer DevOps in Azure
Container DevOps in Azure
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
Docker Enterprise Deployment Planning
Docker Enterprise Deployment PlanningDocker Enterprise Deployment Planning
Docker Enterprise Deployment Planning
 
Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...
 
Cloud Computing Basics for Small Business
Cloud Computing Basics for Small BusinessCloud Computing Basics for Small Business
Cloud Computing Basics for Small Business
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 

Drive By Healing

  • 1. Drive-by Healing Can Hacking Techniques Be Used For Good?
  • 2. Aims • Discover if a malicious hacking technique could be used for good • Investigate Drive-by Downloads, and adapt them to deliver updates instead of malware • Attempt to create a Wi-Fi Hotspot system that triggers a Drive-by Healing process to update the computer silently Drive-by Healing Andrew Cronin
  • 3. What Good Can Hacking Do? • Find holes in software – Without abusing them • Give-aways – Money, Software, Vouchers • Fix Software – Updates Drive-by Healing Andrew Cronin
  • 4. Drive-by Healing • Drive-by Downloads – One of the biggest problems on the Internet – Just loading a page can infect – Payloads: • Trojans • Botnets • Other viruses Drive-by Healing Andrew Cronin
  • 5. Drive-by Healing • Healing – To make better, to make sound or healthy. • How can computers be healed? – Hardware repairs – Software repairs • Patches • Updates • Anti-virus • New software Drive-by Healing Andrew Cronin
  • 6. Project Method • Researching Wi-Fi Hotspots • Researching Drive-by Downloads • Firmware Flashing • Captive Portal • Virtual Machine & Heap Spraying Drive-by Healing Andrew Cronin
  • 7. Hotspots • Used in establishments and businesses all over • Wi-Fi Industry big business – Advertising – Paid for services • DD-WRT Open source firmware can re-create Hotspots • Captive Portals block internet access until terms are agreed Drive-by Healing Andrew Cronin
  • 8. Drive-by Downloads • Written in JavaScript – Employs Heap Spraying to deliver payload • Using Shellcode and NOPs allocated in arrays • Requires an exploit to initiate payload Drive-by Healing Andrew Cronin
  • 9. Legal Issues • Drive-by Downloads – Put data on computers – Activate programs and code • All Without users knowledge and consent – Illegal • Gaining consent is vital Drive-by Healing Andrew Cronin
  • 10. Firmware Flashing • DD-WRT Firmware uploaded to a Linksys E2000 Router after the Router was flashed • Flashing is required to flush out the old firmware Drive-by Healing Andrew Cronin
  • 11. Hotspot Services on DD-WRT Firmware Drive-by Healing Andrew Cronin
  • 12. Captive Portal • The DD-WRT Firmware has Hotspot services • CoovaChilli was chosen (connects to ChiliSpot) • Attempts to Create Captive Portal system for Drive-by Download code with Ubuntu system Drive-by Healing Andrew Cronin
  • 13. Virtual Machine • VMWare Player • Windows XP SP3 • IECollections – Allows multiple versions of Internet Explorer to run simultaneously Drive-by Healing Andrew Cronin
  • 14. Heap Spraying Sample code from ‘Corelan’ site and debuggers to test: • Windbg • Immunity Debugger – Mona.py Drive-by Healing Andrew Cronin
  • 15. Heap Spraying Heap Spray generator page • For script kiddies • Tested with Windows Calculator Drive-by Healing Andrew Cronin
  • 16. Conclusion There were three different issues that arose regarding the Wi-Fi Hotspot: • Age of systems available was on average 4-5 years old • Only complex Linux based systems available requiring extra hardware • Open source projects lacked support making install and configuration difficult Drive-by Healing Andrew Cronin
  • 17. Conclusion Other problems concerning the Drive-by Healing project included: • Exploits, being malicious, can be self- incriminating, therefore informative articles were impossible to find • Project attempted an ambitious idea that had unforeseen complexities Drive-by Healing Andrew Cronin
  • 18. Future Work Wi-Fi Hotspot • Possible NoCatSplash on DD-WRT • Other Router, WRT54G Drive-by Download • Exploit from Scratch (avoiding script kiddie dangers) • Research into update commands • Education on the importance of updates Drive-by Healing Andrew Cronin
  • 19. QUESTIONS??? Drive-by Healing Andrew Cronin

Editor's Notes

  1. What is hacking? Why do it?Disrupting or damaging technologyCuriosity, Gain, ChallengeWhat is malware?Software made for malicious (bad, damaging) purposesHacking …??Breaking computers, Because they canWhy Do hackers hack?To understand to explore, Don’t press the big red button,To play, to push limits and boundariesFor Reward, fraud, theftIt’s a Game, Challenge (what can I break, get into?)Good Hacking.Hackers that send good things, Or do good (find vulnerability, without exploiting)Rather than break and steal.Find Holes = Software VulnerabilitiesSoftware = Useful programsFree Stuff = Vouchers or money, Things sent over internet
  2. Hacking technique,About.com – biggest problem on internetOne statement put to the users in this survey was; “You can’t get infected just by loading an infected website”(G Data 2011, p.13).The survey highlighted that over 48% of those questioned believed this statement to be true.Over 53% of these people were 18-24 years of age.Countries, Italy topped the survey as the country that believed this myth the most,closely followed by Germany.In comparison, the most disbelieving country was the USA, closely followed by the UK. Women were most likely to believe that computers cannot be infected by just loading an infected website, by a tiny majority.This survey shows that the Internet is perceived to be more trustworthy than it actually is. Most likely to believe this false statement live in Italy, are between ages of 18-24 and are women.
  3. Nicknamed the ‘Christian’ ProjectUpdates can: Reduce OS size Performance increase New features Over write infected system files to original purpose (disabling malware)
  4. Heap Spraying step took the longest!
  5. Walled Gardens also, Allow certain sites, e.g. Google search but stopped at results
  6. Heap Spraying is….Like buffer overflows More targeted NOPs Sledge is ….Exploits, Broswerplugins …
  7. A Legal Drive-by Download delivery systemFirst Idea – Drive-by Download Unleased anywhere on the net (NOT LEGAL)Second idea – Website (NOT LEGAL)Third Idea – WiFi Hotspot … Controlled audience, Consent from Captive portal (LEGAL) :D
  8. 90secs … ON … OFF … ON Reset Flushes out of firmware from NVRAM
  9. CoovaChilli Chosen, FailedConnected to chillispot
  10. Ubuntu LinuxLack of support Open source 5 yrs old Forums Dead
  11. IE 6 and 7 and 86 and 7 worked DEPData Execution PreventionOn or Off … depending on exploit
  12. Simple code For LoopArrayFor loopIn memory
  13. Encrypted by generator but still showed calc in memory
  14. Lots to do!!!!!