SlideShare a Scribd company logo
1 of 39
SKIM JOB:
SKIMMING YOUR WAY IN
BY: BRETT DEWALL / @XBADBIDDYX
INTRODUCTION
• BRETT DEWALL (OSCP, OSWP, GWAPT)
• GRADUATED FROM ST. CLOUD STATE UNIVERSITY (MINNESOTA)
• BACHELORS OF SCIENCE – INFORMATION SYSTEMS
• STAFF SPECIALIST - WHITE OAK SECURITY
• SPARE TIME:
• SPOON FLOWER DYNASTY
• CAR ENTHUSIAST
• BUG BOUNTIES / RESEARCH
• PARTICIPATED IN DEFCON SECTF – 2015
• 3RD PLACE
• HAS PERFORMED OVER 50 ONSITE SOCIAL ENGINEERING ENGAGEMENTS
WHAT AM I TALKING ABOUT
• INTRODUCTION
• RFID OVERVIEW
• CURRENT RFID SOCIAL ENGINEERING ATTACKS
• SKIM JOB
• QUESTIONS
RFID Overview
• WHAT IS RFID?
• RADIO-FREQUENCY IDENTIFICATION
• WIRELESS SYSTEM (TAG & READER)
• USES?
• TONS! (SUPPLY CHAIN VISIBILITY, TRACKING, ACCESS CONTROL, ETC..)
• IS THIS TALK SPECIFIC TO A RFID TECHNOLOGY?
• YES! SPECIFICALLY HID PROX PRODUCTS (125KHZ – LOW FREQUENCY)
CURRENT RFID SOCIAL ENGINEERING ATTACKS
• PROXMARK3
• BISHOP FOX – LONG RANGE READER
• BLEKEY / ESPKEY
PROXMARK3
• DEVELOPED BY JONATHAN WESTHUES
• SNIFFING, READING, CLONING OF RFID TAGS
• COMMUNITY DRIVEN – OPENSOURCE!
• MODES
• CONNECTED
• STANDALONE
PROXMARK3 CONT.
• PROS
• SUPPORTS MULTIPLE RFID TECHNOLOGIES
• OPEN SOURCE
• BRUTEFORCE
• READ, WRITE, AND CLONE
• CONS
• READ RANGE VERY LIMITED – 1-2 INCHES
BISHOP FOX – LONG RANGE READER
• ROBERT FRANCIS PRESENTED “LIVE FREE OR RFID HARD” AT DEFCON 21
• DESIGNED TO READ 125KHZ LOW-FREQUENCY RFID CARDS
• LONG RANGE - UP TO 36 INCHES
BISHOP FOX – LONG RANGE READER CONT.
• PROS
• LONG RANGE
• OPEN SOURCE
• EASY TO USE
• STANDALONE
• CONS
• READER ONLY
• EXPENSIVE
• REQUIRES PHYSICAL INTERACTION
BLEKEY / ESPKEY
• ERIC EVENCHICK & MARK BASEGGIO PRESENTED THE BLEKEY AT DEFCON 23
• DESIGNED TO BE INSTALLED IN LESS THAN 60 SECONDS (IDEAL SITUATION)
• INSTALLED IN-LINE WITH THE RFID READER
• UNIVERSAL SUPPORT
• WIRELESS LAN COMMUNICATION
BLEKEY / ESPKEY CONT.
• PROS
• SMALL FORM FACTOR
• ATTACKS THE PHYSICAL DEVICE
• CAN STORE MULTIPLE RFID CARDS (THOUSANDS)
• CONS
• CUTS THE WIRE SHEATH WHEN INSTALLING (PREMATURE FAILURE?)
• NEED TO GAIN ACCESS TO WIRING TO INSTALL
PREVIOUS TECHNOLOGIES RECAP
• NONE OF THESE DEVICES ARE BAD
• THEY ALL WORK IN THEIR OWN WAY
• THIS IS NOT TO DETER ANYONE FROM USING THEM
SKIM JOB
SKIM JOB – WHY?
• WANTED TO ELIMINATE THE EMPLOYEE INTERACTION
• SOMETIMES NOT ABLE TO GET NEAR A BADGE
• PROJECT TIMEFRAME (SHORT DURATION)
• RFID ENABLED DOORS ARE BECOMING THE NORM FOR EMPLOYEES
ACCESSING BUILDINGS
SKIM JOB – WHY? CONT.
• DIDN’T WANT TO DAMAGE THE READER WIRING
• BLEKEY / ESPKEY
• QUICK TO DEPLOY
• TRYING TO TAKE AN IDEA AND MAKE IT REAL
SKIM JOB…. SO WHAT IS IT?
• 100% STANDALONE DEPLOYABLE TOOL
• ”SMART” OR SOMEWHAT I GUESS
• EQUIPMENT INCLUDES:
• PROXMARK3
• VOLTAGE CONTROLLED USB HUB
• RASPBERRY PI ZERO WIRELESS
• CUSTOM WOUND ANTENNA
• POLYCASE ENCLOSURE
• HAND MADE USB CABLES
SKIM JOB – SMART?
• HOW IS THIS TOOL SMART?
• OVERLAYING A RFID READER ON TOP OF A RFID READER DOESN’T
WORK
• CAN WE CUT POWER ON THE FLY?
• VOLTAGE CONTROLLED USB HUB (THANK YOU SWITCHDOC LABS)
• REMOTELY CONTROL THE DEVICE
• WIFI NETWORK – INITIAL ACCESS
• WEB SERVER- PROJECT EXECUTION / LOG VIEWER / RFID SIMULATOR
SKIM JOB – SMART?
SKIM JOB – FORM ITERATIONS
• RASPBERRY PI ZERO WITHOUT WIFI
• NEEDED A SEPARATE USB ADAPTER
• RASPBERRY PI ZERO WITH A WIFI HAT
• RASPBERRY PI ZERO WIRELESS (CURRENT)
SKIM JOB - EQUIPMENT
• RASPBERRY PI ZERO WIRELESS
• THE ”BRAINS”
• TONS OF CAPABILITIES FOR FUTURE IMPLEMENTATION
• PROXMARK3 RDV2 KIT
• RFID READER
• EASY INTERFACE
• DETACHABLE ANTENNA
SKIM JOB - EQUIPMENT
• SWITCHDOC USB POWERCONTROL BOARD
• CUT THE POWER REMOTELY VIA VOLTAGE SIGNAL
• LIPO BATTERY
• GIVE ME SOME JUICE!
• ADAFRUIT POWERBOOST
• SUPPLY THE JUICE
• POLYBASE COVER
• CONCEAL THE COMPONENTS
SKIM JOB - COST
• RASPBERRY PI ZERO W - $10.00
• PROXMARK3 RDV2 - $115.00
• SWITCHDOC POWERCONTROL USB BOARD - $15.99
• ADAFRUIT POWERBOOST - $9.95
• LIPO BATTERY - $14.95
• POLYCASE - $10.31
• MISC ITEMS (USB CONNECTORS / CABLES) - $15.00
• TOTAL: $191.20
SKIM JOB – PUTTING IT TOGETHER
• LOW FREQUENCY ANTENNA CREATION
• CREATED A NAIL SQUARE THE SIZE OF THE POLYCASE COVER
• UTILIZED PROXMARK3 TO “TUNE” THE ANTENNA
SKIM JOB – PUTTING IT TOGETHER
SKIM JOB – PUTTING IT TOGETHER
SKIM JOB – HOW IT WORKS
The
Schematics
SKIM JOB – HOW DOES IT WORK?
• RASPBERRY PI ZERO – “THE BRAIN”
• CONTROLLER OF ALL THE THINGS
• WIFI NETWORK
• PYTHON SCRIPT
• PROXMARK3 – “THE READER”
• RFID MAGIC
• SWITCHDOC USB POWERCONTROL BOARD – “SWITCHABLE
POWER”
• CUTS POWER THROUGH VOLTAGE OUTPUT
SKIM JOB – IN USE
SKIM JOB – IN USE
SKIM JOB - VIDEO
• VIDEO
TROUBLES
• NOT A “SOLDERING” EXPERT (50$ MISTAKE)
• RESULTED IN A BROKEN USB HUB
• PAD BEING RIPPED OFF OF BOARD
• NEEDED TO CREATE MULTIPLE SHORTENED USB CABLES
• CONDENSING THE ENTIRE PROJECT
• SLIMMING ALL OF THE ELECTRONICS
TROUBLES CONT.
• TIME
• WAS PUT ON THE BACK BURNER FOR MULTIPLE YEARS
• LIFE, FAMILY, OTHER HOBBIES
• IDENTIFYING CASES TO USE
• 3D PRINT?
FUTURE WORK
• CONDENSE
• MAKE EVERYTHING SMALLER
• FASTER “BRAIN”
• RASPBERRY PI ALTERNATIVES
• RFID MODULES
• MORE CONVINCING COVER
• OPEN FOR IDEAS!
FUTURE WORK CONT.
• LED LIGHTS
• SIMULATE A REAL RFID READER
• WEB SERVER
• CENTRAL COMMAND CENTER
• CURRENTLY IN PROGRESS
SUGGESTIONS
• ANY SUGGESTIONS / QUESTIONS / FEEDBACK
• PLEASE REACH OUT!
• HACKERS HELPING HACKERS
• EVERYTHING TALKED ABOUT IS AVAILABLE VIA GITHUB
SHOUTOUTS
• @W3S.H4RD3N
• @OCTETSTREAM
• DONQUIXOTE
• SLEESTAKOVERFLOW
• WHITE OAK SECURITY GROUP
THANKS!
• CONTACT:
• BRETT DEWALL
• BRETT.DEWALL@WHITEOAKSECURITY.COM
• @XBADBIDDYX
• LINKEDIN
• HTTPS://WWW.LINKEDIN.COM/IN/BRETT-DEWALL-912A8139
• GITHUB
• HTTPS://GITHUB.COM/WHITEOAKSECURITY/SKIMJOB
QUESTIONS
?
REFERENCES
• HTTPS://PROXMARK.COM/
• HTTPS://RESOURCES.BISHOPFOX.COM/RESOURCES/TOOLS/RFID-HACKING/ATTACK-
TOOLS/
• HTTPS://FRITZING.ORG/
• A BEACON ANALYSIS-BASED RFID READER ANTI-COLLISION PROTOCOL FOR DENSE READER
ENVIRONMENTS
• ALI ASSARIANA, AHMAD KHADEMZADEHB, MEHDI HOSSEINZADEHC, SAEED SETAYESHIE
• HTTPS://PASSIVE-COMPONENTS.EU/WHAT-IS-RFID-HOW-RFID-WORKS-RFID-EXPLAINED-
IN-DETAIL/

More Related Content

Similar to Skim Job Presentation

SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsAleksandr Timorin
 
Use open source and rapid prototyping to put magic in magical products in IoT
Use open source and rapid prototyping to put magic in magical products in IoTUse open source and rapid prototyping to put magic in magical products in IoT
Use open source and rapid prototyping to put magic in magical products in IoTMoe Tanabian
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
BRAIN COMPUTER INTERFACE.pptx
BRAIN COMPUTER INTERFACE.pptxBRAIN COMPUTER INTERFACE.pptx
BRAIN COMPUTER INTERFACE.pptxMukilKrishna4
 
NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017Ilissa Miller
 
A Blockchain Quest - Hacker House
A Blockchain Quest - Hacker HouseA Blockchain Quest - Hacker House
A Blockchain Quest - Hacker HouseCrypto Dashie
 
Autonomous robotics based on simple sensor inputs.
Autonomous robotics based on simplesensor inputs.Autonomous robotics based on simplesensor inputs.
Autonomous robotics based on simple sensor inputs. sathish sak
 
2016 COSCUP SDN Introduction
2016 COSCUP SDN Introduction2016 COSCUP SDN Introduction
2016 COSCUP SDN IntroductionYi Tseng
 
Dummies guide to WISPS
Dummies guide to WISPSDummies guide to WISPS
Dummies guide to WISPSBill Buchan
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Embedded systems basics 8051 - project approach
Embedded systems basics 8051 - project approach Embedded systems basics 8051 - project approach
Embedded systems basics 8051 - project approach hybrald industries
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Brian Proctor - GICSP, CISSP, CRISC
 
SIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - BarcelonaSIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - BarcelonaNicolas Lesconnec
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOAYSHA S KABEER
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat Security Conference
 

Similar to Skim Job Presentation (20)

SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
DigitalCreationLita
DigitalCreationLitaDigitalCreationLita
DigitalCreationLita
 
Use open source and rapid prototyping to put magic in magical products in IoT
Use open source and rapid prototyping to put magic in magical products in IoTUse open source and rapid prototyping to put magic in magical products in IoT
Use open source and rapid prototyping to put magic in magical products in IoT
 
Ap6562
Ap6562Ap6562
Ap6562
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
BRAIN COMPUTER INTERFACE.pptx
BRAIN COMPUTER INTERFACE.pptxBRAIN COMPUTER INTERFACE.pptx
BRAIN COMPUTER INTERFACE.pptx
 
NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017
 
A Blockchain Quest - Hacker House
A Blockchain Quest - Hacker HouseA Blockchain Quest - Hacker House
A Blockchain Quest - Hacker House
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
PLAN Tech Day 2016
PLAN Tech Day 2016PLAN Tech Day 2016
PLAN Tech Day 2016
 
Autonomous robotics based on simple sensor inputs.
Autonomous robotics based on simplesensor inputs.Autonomous robotics based on simplesensor inputs.
Autonomous robotics based on simple sensor inputs.
 
2016 COSCUP SDN Introduction
2016 COSCUP SDN Introduction2016 COSCUP SDN Introduction
2016 COSCUP SDN Introduction
 
Dummies guide to WISPS
Dummies guide to WISPSDummies guide to WISPS
Dummies guide to WISPS
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Embedded systems basics 8051 - project approach
Embedded systems basics 8051 - project approach Embedded systems basics 8051 - project approach
Embedded systems basics 8051 - project approach
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
SIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - BarcelonaSIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - Barcelona
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
 
Iot
IotIot
Iot
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Skim Job Presentation

  • 1. SKIM JOB: SKIMMING YOUR WAY IN BY: BRETT DEWALL / @XBADBIDDYX
  • 2. INTRODUCTION • BRETT DEWALL (OSCP, OSWP, GWAPT) • GRADUATED FROM ST. CLOUD STATE UNIVERSITY (MINNESOTA) • BACHELORS OF SCIENCE – INFORMATION SYSTEMS • STAFF SPECIALIST - WHITE OAK SECURITY • SPARE TIME: • SPOON FLOWER DYNASTY • CAR ENTHUSIAST • BUG BOUNTIES / RESEARCH • PARTICIPATED IN DEFCON SECTF – 2015 • 3RD PLACE • HAS PERFORMED OVER 50 ONSITE SOCIAL ENGINEERING ENGAGEMENTS
  • 3. WHAT AM I TALKING ABOUT • INTRODUCTION • RFID OVERVIEW • CURRENT RFID SOCIAL ENGINEERING ATTACKS • SKIM JOB • QUESTIONS
  • 4. RFID Overview • WHAT IS RFID? • RADIO-FREQUENCY IDENTIFICATION • WIRELESS SYSTEM (TAG & READER) • USES? • TONS! (SUPPLY CHAIN VISIBILITY, TRACKING, ACCESS CONTROL, ETC..) • IS THIS TALK SPECIFIC TO A RFID TECHNOLOGY? • YES! SPECIFICALLY HID PROX PRODUCTS (125KHZ – LOW FREQUENCY)
  • 5. CURRENT RFID SOCIAL ENGINEERING ATTACKS • PROXMARK3 • BISHOP FOX – LONG RANGE READER • BLEKEY / ESPKEY
  • 6. PROXMARK3 • DEVELOPED BY JONATHAN WESTHUES • SNIFFING, READING, CLONING OF RFID TAGS • COMMUNITY DRIVEN – OPENSOURCE! • MODES • CONNECTED • STANDALONE
  • 7. PROXMARK3 CONT. • PROS • SUPPORTS MULTIPLE RFID TECHNOLOGIES • OPEN SOURCE • BRUTEFORCE • READ, WRITE, AND CLONE • CONS • READ RANGE VERY LIMITED – 1-2 INCHES
  • 8. BISHOP FOX – LONG RANGE READER • ROBERT FRANCIS PRESENTED “LIVE FREE OR RFID HARD” AT DEFCON 21 • DESIGNED TO READ 125KHZ LOW-FREQUENCY RFID CARDS • LONG RANGE - UP TO 36 INCHES
  • 9. BISHOP FOX – LONG RANGE READER CONT. • PROS • LONG RANGE • OPEN SOURCE • EASY TO USE • STANDALONE • CONS • READER ONLY • EXPENSIVE • REQUIRES PHYSICAL INTERACTION
  • 10. BLEKEY / ESPKEY • ERIC EVENCHICK & MARK BASEGGIO PRESENTED THE BLEKEY AT DEFCON 23 • DESIGNED TO BE INSTALLED IN LESS THAN 60 SECONDS (IDEAL SITUATION) • INSTALLED IN-LINE WITH THE RFID READER • UNIVERSAL SUPPORT • WIRELESS LAN COMMUNICATION
  • 11. BLEKEY / ESPKEY CONT. • PROS • SMALL FORM FACTOR • ATTACKS THE PHYSICAL DEVICE • CAN STORE MULTIPLE RFID CARDS (THOUSANDS) • CONS • CUTS THE WIRE SHEATH WHEN INSTALLING (PREMATURE FAILURE?) • NEED TO GAIN ACCESS TO WIRING TO INSTALL
  • 12. PREVIOUS TECHNOLOGIES RECAP • NONE OF THESE DEVICES ARE BAD • THEY ALL WORK IN THEIR OWN WAY • THIS IS NOT TO DETER ANYONE FROM USING THEM
  • 14. SKIM JOB – WHY? • WANTED TO ELIMINATE THE EMPLOYEE INTERACTION • SOMETIMES NOT ABLE TO GET NEAR A BADGE • PROJECT TIMEFRAME (SHORT DURATION) • RFID ENABLED DOORS ARE BECOMING THE NORM FOR EMPLOYEES ACCESSING BUILDINGS
  • 15. SKIM JOB – WHY? CONT. • DIDN’T WANT TO DAMAGE THE READER WIRING • BLEKEY / ESPKEY • QUICK TO DEPLOY • TRYING TO TAKE AN IDEA AND MAKE IT REAL
  • 16. SKIM JOB…. SO WHAT IS IT? • 100% STANDALONE DEPLOYABLE TOOL • ”SMART” OR SOMEWHAT I GUESS • EQUIPMENT INCLUDES: • PROXMARK3 • VOLTAGE CONTROLLED USB HUB • RASPBERRY PI ZERO WIRELESS • CUSTOM WOUND ANTENNA • POLYCASE ENCLOSURE • HAND MADE USB CABLES
  • 17. SKIM JOB – SMART? • HOW IS THIS TOOL SMART? • OVERLAYING A RFID READER ON TOP OF A RFID READER DOESN’T WORK • CAN WE CUT POWER ON THE FLY? • VOLTAGE CONTROLLED USB HUB (THANK YOU SWITCHDOC LABS) • REMOTELY CONTROL THE DEVICE • WIFI NETWORK – INITIAL ACCESS • WEB SERVER- PROJECT EXECUTION / LOG VIEWER / RFID SIMULATOR
  • 18. SKIM JOB – SMART?
  • 19. SKIM JOB – FORM ITERATIONS • RASPBERRY PI ZERO WITHOUT WIFI • NEEDED A SEPARATE USB ADAPTER • RASPBERRY PI ZERO WITH A WIFI HAT • RASPBERRY PI ZERO WIRELESS (CURRENT)
  • 20. SKIM JOB - EQUIPMENT • RASPBERRY PI ZERO WIRELESS • THE ”BRAINS” • TONS OF CAPABILITIES FOR FUTURE IMPLEMENTATION • PROXMARK3 RDV2 KIT • RFID READER • EASY INTERFACE • DETACHABLE ANTENNA
  • 21. SKIM JOB - EQUIPMENT • SWITCHDOC USB POWERCONTROL BOARD • CUT THE POWER REMOTELY VIA VOLTAGE SIGNAL • LIPO BATTERY • GIVE ME SOME JUICE! • ADAFRUIT POWERBOOST • SUPPLY THE JUICE • POLYBASE COVER • CONCEAL THE COMPONENTS
  • 22. SKIM JOB - COST • RASPBERRY PI ZERO W - $10.00 • PROXMARK3 RDV2 - $115.00 • SWITCHDOC POWERCONTROL USB BOARD - $15.99 • ADAFRUIT POWERBOOST - $9.95 • LIPO BATTERY - $14.95 • POLYCASE - $10.31 • MISC ITEMS (USB CONNECTORS / CABLES) - $15.00 • TOTAL: $191.20
  • 23. SKIM JOB – PUTTING IT TOGETHER • LOW FREQUENCY ANTENNA CREATION • CREATED A NAIL SQUARE THE SIZE OF THE POLYCASE COVER • UTILIZED PROXMARK3 TO “TUNE” THE ANTENNA
  • 24. SKIM JOB – PUTTING IT TOGETHER
  • 25. SKIM JOB – PUTTING IT TOGETHER
  • 26. SKIM JOB – HOW IT WORKS The Schematics
  • 27. SKIM JOB – HOW DOES IT WORK? • RASPBERRY PI ZERO – “THE BRAIN” • CONTROLLER OF ALL THE THINGS • WIFI NETWORK • PYTHON SCRIPT • PROXMARK3 – “THE READER” • RFID MAGIC • SWITCHDOC USB POWERCONTROL BOARD – “SWITCHABLE POWER” • CUTS POWER THROUGH VOLTAGE OUTPUT
  • 28. SKIM JOB – IN USE
  • 29. SKIM JOB – IN USE
  • 30. SKIM JOB - VIDEO • VIDEO
  • 31. TROUBLES • NOT A “SOLDERING” EXPERT (50$ MISTAKE) • RESULTED IN A BROKEN USB HUB • PAD BEING RIPPED OFF OF BOARD • NEEDED TO CREATE MULTIPLE SHORTENED USB CABLES • CONDENSING THE ENTIRE PROJECT • SLIMMING ALL OF THE ELECTRONICS
  • 32. TROUBLES CONT. • TIME • WAS PUT ON THE BACK BURNER FOR MULTIPLE YEARS • LIFE, FAMILY, OTHER HOBBIES • IDENTIFYING CASES TO USE • 3D PRINT?
  • 33. FUTURE WORK • CONDENSE • MAKE EVERYTHING SMALLER • FASTER “BRAIN” • RASPBERRY PI ALTERNATIVES • RFID MODULES • MORE CONVINCING COVER • OPEN FOR IDEAS!
  • 34. FUTURE WORK CONT. • LED LIGHTS • SIMULATE A REAL RFID READER • WEB SERVER • CENTRAL COMMAND CENTER • CURRENTLY IN PROGRESS
  • 35. SUGGESTIONS • ANY SUGGESTIONS / QUESTIONS / FEEDBACK • PLEASE REACH OUT! • HACKERS HELPING HACKERS • EVERYTHING TALKED ABOUT IS AVAILABLE VIA GITHUB
  • 36. SHOUTOUTS • @W3S.H4RD3N • @OCTETSTREAM • DONQUIXOTE • SLEESTAKOVERFLOW • WHITE OAK SECURITY GROUP
  • 37. THANKS! • CONTACT: • BRETT DEWALL • BRETT.DEWALL@WHITEOAKSECURITY.COM • @XBADBIDDYX • LINKEDIN • HTTPS://WWW.LINKEDIN.COM/IN/BRETT-DEWALL-912A8139 • GITHUB • HTTPS://GITHUB.COM/WHITEOAKSECURITY/SKIMJOB
  • 39. REFERENCES • HTTPS://PROXMARK.COM/ • HTTPS://RESOURCES.BISHOPFOX.COM/RESOURCES/TOOLS/RFID-HACKING/ATTACK- TOOLS/ • HTTPS://FRITZING.ORG/ • A BEACON ANALYSIS-BASED RFID READER ANTI-COLLISION PROTOCOL FOR DENSE READER ENVIRONMENTS • ALI ASSARIANA, AHMAD KHADEMZADEHB, MEHDI HOSSEINZADEHC, SAEED SETAYESHIE • HTTPS://PASSIVE-COMPONENTS.EU/WHAT-IS-RFID-HOW-RFID-WORKS-RFID-EXPLAINED- IN-DETAIL/