Year of the #WiFiCactus

DefCamp
DefCampDefCamp
Y e a r o f t h e
# W i F i C A C T U S
ABOUT ME Who am I?
Hardware and software obsessed. BS in
Computer Science. Freelance cybersphere
consultant. Maker and hacker.
Runner, Gamer (Fortnite FTW), Traveler
Forever curious.
@d4rkm4tter
palshack.org
THANK YOU!!
This project wouldn’t have been possible without all of
the support from the community, my friends, family and
all of you!! You are what inspires me to continually
improve and build bigger!!!
CONTENTS What We Will Talk About
Part 1 What is the #WiFiCactus
Part 2 New features and mods
Part 3 Effect of upgrades
Part 4 The Year of The WiFiCactus
Part 5 The data
Part 6 The future
Part 7 Conclusion
The WiFiCactus Description
The #WiFiCactus is a wireless monitoring tool that is capable of collecting wireless data from up to 50 WiFi
channels at the same time. It can gather entire communications including ones that happen across multiple
channels. It is mobile and has over 3 hours of battery life. It uses Kismet Wireless for the primary monitoring
software. It is made up of 25 Hak5 Pineapple Tetras
The #WiFiCactus is a wireless monitoring tool that is capable
of collecting wireless data from up to 50 WiFi channels at the
same time. It can gather entire communications including ones
that happen across multiple channels. It is mobile and has over
3 hours of battery life. It uses Kismet Wireless for the primary
monitoring software. It is made up of 25 Hak5 Pineapple Tetras
The WiFiCactus Photo Gallery
New Features New for DC26
Moved to gigabit switches to increase the
throughput from the Tetras to the Intel NUC
Upgraded Switches
Lead acid batteries are cheap but a terrible solution for a
mobile project you put on your back. Switched to Lithium
Ion to increase the run time to 3 hours from 45 minutes
and reduce the weight nearly 16 Kg (35 lbs).
Thanks @glytech!!
Upgraded Batteries
New FeaturesNew for DC26
Increase Rigidity
Beta Testing Diplexer
Upgraded the switch and Intel NUC
mount to increase the rigidity and
mobility of the rig.
Added a 16 antenna to 2 diplexer
supplied by Alftel. This device reduces
the number of required antennas .
44
568
Results of
Upgrades
A new problem was uncovered, lack of storage
space. The amount of data gathered was much
greater than anticipated and managing data
became a new bottleneck.
DC BH 2017 DC BH 2018
1,290%
Results of Upgrades Theoretical and Actual
Theoretical 125 MB/s maximum throughput
to the Intel NUC which translates into 450
GB/h
Caught over 200 GB in 8 hours during
Blackhat. Actual data capture depends on
the utilization of the environment.
Maximum Tetra throughput is theoretically
312.5 MB/s which would require more
bandwidth to achieve. Future work pending
on this front.
LOCATIONS Year of the WiFiCactus
Saintcon DefCon China
Bahamas
DefCamp (Romania)
ShmooconOakland/SF
NYC
DEF CON
Colorado
CactusCon
Places Visited Year of the WiFiCactus
Defcamp – Located in Bucharest,
Romania - November 2017
Places Visited Year of the WiFiCactus
Shmoocon – Located in
Washington DC – January 2018
Places Visited Year of the WiFiCactus
Hak5 Headquarters – Located in
Oakland, CA – March 2018
Places Visited Year of the WiFiCactus
DEF CON China BETA – Located in
Beijing, China – May 2018
Places Visited Year of the WiFiCactus
BlackHat / DEF CON– Located in
Las Vegas – May 2018
2018201720162015
Total Data
Collected
The raw amount of data gathered by year. Total project
data is now over 1 TB.
100’s MB
10’s GB
100’s GB
TB
Data Gathered
2017 vs 2018
Total data gathered over the last year.
Results are in GB.
7.41
37.1
21.5
84.3
96.1
479
83.4
27.9
5.96
116DC China
Defcamp
DEF CON
20182017
Oakland
Shmoo
Saintcon
CactusCon
BlackHat
Year of the #WiFiCactus
Technology Hardware
2 x 24 Core Intel Xeon Platinum Processors
96 GB of DDR ECC RAM
512 GB NVME Drive
1 TB SATA SSD
6 TB Seagate 7200 RPM
Windows 10 with Ubuntu WSL
Analysis Hardware
Analysis Techniques
Live data view and replay of existing PCAPs.
Offers comprehensive search and linking. Can
be daunting with large amounts of data.
Kismet Dashboard
The go to method for packet analysis. Useful
for inspection and filtering of the data.
Miserable with files larger than a few 100 MB.
Wireshark
Analysis Techniques
The command line Swiss army knife for packet
analysis. Uses Wireshark filters but can output
to a wide variety of formats.
tshark
Elastic Stack, formerly ELK Stack is a datastore
and visualization tool that is popular for a wide
array of uses including traffic analysis. Thank
you Spencer (@_bin_sh) for bailing me out!
Elastic Stack
AnalysisTechniques
Network Miner
A fantastic PCAP forensic analysis tool. This
tool allows you to deep dive quickly into PCAP
files and discover files, credentials, sessions, IP
address and more.
THANK YOU Network Miner Team!!
AnalysisTechniques
Graphistry
ViFi / Neo4J
Amazing web based graphing software that
supports millions of edges. Beautiful way to
interpret data. Uses accelerated graphics to
allow for interaction with the data.
THANK YOU GRAPHISTRY!!
Custom application to read PCAP files and
import them into Neo4J which is a visualization
software. Shout out to @sundhaug92 for letting
me beta test his software!
Useful for things
like quickly finding
handshakes,
beacons, higher
layer information
and summary
statistics.
Example
Wireshark Cases
This was an interesting
find with Network Miner
Network Miner
SRC: https://www.symantec.com/content/dam/symantec/docs/data-sheets/proxysg-s200-s400-s500-en.pdf
An interesting find from
DefCamp 8
Network Miner
An interesting find from
DefCamp 8
Network Miner
Utilizing data
caught from DC 24
to preform device
tracking
Graphistry
Utilizing data
caught from DC 24
to preform device
tracking
Graphistry
Utilizing data
caught from DC 24
to preform device
tracking
Graphistry
More interesting finds
here.
ViFi / NEO4J
Live Demos WE’LL DO IT LIVE!!
Kismet Dashboard using live data.01
Graphistry on really big data
04
Wireshark on big PCAP files02
Elastic Stack goodness
03 Network Miner on PCAP
05
The Future Don’t get your hopes too high
Automated analysis pipeline for real-time
feedback.
01 PCAP tool release so you can do this too04
More storage capacity02
Adding more wireless technologies.
Especially LTE and 5G. Anyone interested
in funding research?
05
UnRAID NAS and VMs for processing03
Real-time summary statistics sync using
4G or other out of band method.
06
Thank you
DEFCAMP!!
@d4rkm4tter
palshack.org
twitch.tv/a_darkmatter
github.com/mspicer
1 of 35

Recommended

BETTER Session, Excercise 1 @ EO Joint Big Data Hackathon by
BETTER Session, Excercise 1 @ EO Joint Big Data HackathonBETTER Session, Excercise 1 @ EO Joint Big Data Hackathon
BETTER Session, Excercise 1 @ EO Joint Big Data HackathonPRBETTER
58 views27 slides
Combating Cyberattacks through Network Agility and Automation by
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationSagi Brody
87 views23 slides
XDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem by
XDF 2019 Xilinx Accelerated Database and Data Analytics EcosystemXDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
XDF 2019 Xilinx Accelerated Database and Data Analytics EcosystemDan Eaton
1K views102 slides
Revolution Analytics: a 5-minute history by
Revolution Analytics: a 5-minute historyRevolution Analytics: a 5-minute history
Revolution Analytics: a 5-minute historyRevolution Analytics
9.5K views13 slides
Customer Case Study: How Novel Compute Technology Transforms Medical and Life... by
Customer Case Study: How Novel Compute Technology Transforms Medical and Life...Customer Case Study: How Novel Compute Technology Transforms Medical and Life...
Customer Case Study: How Novel Compute Technology Transforms Medical and Life...Amazon Web Services
138 views26 slides
NetApp Insight Las Vegas Top 5 Breakout Sessions by
NetApp Insight Las Vegas Top 5 Breakout SessionsNetApp Insight Las Vegas Top 5 Breakout Sessions
NetApp Insight Las Vegas Top 5 Breakout SessionsNetApp Insight
3.8K views7 slides

More Related Content

Similar to Year of the #WiFiCactus

Internet of things (IoT) and big data- r.nabati by
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatinabati
848 views94 slides
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer by
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerFelipe Prado
104 views30 slides
NOVA IMS Microsoft on Innovation by
NOVA IMS Microsoft on InnovationNOVA IMS Microsoft on Innovation
NOVA IMS Microsoft on InnovationNelson Luciano
81 views48 slides
Accelerating TensorFlow with RDMA for high-performance deep learning by
Accelerating TensorFlow with RDMA for high-performance deep learningAccelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learningDataWorks Summit
3.5K views44 slides
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17 by
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Mark Goldstein
899 views84 slides

Similar to Year of the #WiFiCactus(20)

Internet of things (IoT) and big data- r.nabati by nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
nabati848 views
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer by Felipe Prado
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
Felipe Prado104 views
NOVA IMS Microsoft on Innovation by Nelson Luciano
NOVA IMS Microsoft on InnovationNOVA IMS Microsoft on Innovation
NOVA IMS Microsoft on Innovation
Nelson Luciano81 views
Accelerating TensorFlow with RDMA for high-performance deep learning by DataWorks Summit
Accelerating TensorFlow with RDMA for high-performance deep learningAccelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learning
DataWorks Summit3.5K views
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17 by Mark Goldstein
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Mark Goldstein899 views
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and... by Haidee McMahon
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Haidee McMahon340 views
最新の HPC 技術を生かした AI・ビッグデータインフラの東工大 TSUBAME3.0 及び産総研 ABCI by NVIDIA Japan
最新の HPC 技術を生かした AI・ビッグデータインフラの東工大 TSUBAME3.0 及び産総研 ABCI最新の HPC 技術を生かした AI・ビッグデータインフラの東工大 TSUBAME3.0 及び産総研 ABCI
最新の HPC 技術を生かした AI・ビッグデータインフラの東工大 TSUBAME3.0 及び産総研 ABCI
NVIDIA Japan10.7K views
Clouds, Grids and Data by Guy Coates
Clouds, Grids and DataClouds, Grids and Data
Clouds, Grids and Data
Guy Coates606 views
Observing Intraday Indicators Using Real-Time Tick Data on Apache Superset an... by DataWorks Summit
Observing Intraday Indicators Using Real-Time Tick Data on Apache Superset an...Observing Intraday Indicators Using Real-Time Tick Data on Apache Superset an...
Observing Intraday Indicators Using Real-Time Tick Data on Apache Superset an...
DataWorks Summit1.1K views
Stephen Cantrell, kdb+ Developer at Kx Systems “Kdb+: How Wall Street Tech c... by Dataconomy Media
Stephen Cantrell, kdb+ Developer at Kx Systems  “Kdb+: How Wall Street Tech c...Stephen Cantrell, kdb+ Developer at Kx Systems  “Kdb+: How Wall Street Tech c...
Stephen Cantrell, kdb+ Developer at Kx Systems “Kdb+: How Wall Street Tech c...
Dataconomy Media671 views
OpenPackProcessingAccelearation by Craig Nuzzo
OpenPackProcessingAccelearationOpenPackProcessingAccelearation
OpenPackProcessingAccelearation
Craig Nuzzo164 views
End-to-End Big Data AI with Analytics Zoo by Jason Dai
End-to-End Big Data AI with Analytics ZooEnd-to-End Big Data AI with Analytics Zoo
End-to-End Big Data AI with Analytics Zoo
Jason Dai261 views
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr by Georg Knon
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Georg Knon534 views
Democratizing Data Science on Kubernetes by John Archer
Democratizing Data Science on Kubernetes Democratizing Data Science on Kubernetes
Democratizing Data Science on Kubernetes
John Archer3.8K views
Developing high frequency indicators using real time tick data on apache supe... by Zekeriya Besiroglu
Developing high frequency indicators using real time tick data on apache supe...Developing high frequency indicators using real time tick data on apache supe...
Developing high frequency indicators using real time tick data on apache supe...
Zekeriya Besiroglu1.4K views
Converged IO for HP ProLiant Gen8 by IT Brand Pulse
Converged IO for HP ProLiant Gen8Converged IO for HP ProLiant Gen8
Converged IO for HP ProLiant Gen8
IT Brand Pulse882 views

More from DefCamp

Remote Yacht Hacking by
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
1.7K views89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
974 views167 slides
The Charter of Trust by
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
560 views24 slides
Internet Balkanization: Why Are We Raising Borders Online? by
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
309 views22 slides
Bridging the gap between CyberSecurity R&D and UX by
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
260 views13 slides
Secure and privacy-preserving data transmission and processing using homomorp... by
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
470 views102 slides

More from DefCamp(20)

Remote Yacht Hacking by DefCamp
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp974 views
The Charter of Trust by DefCamp
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp560 views
Internet Balkanization: Why Are We Raising Borders Online? by DefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp309 views
Bridging the gap between CyberSecurity R&D and UX by DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp260 views
Secure and privacy-preserving data transmission and processing using homomorp... by DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp470 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker by DefCamp
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp269 views
Economical Denial of Sustainability in the Cloud (EDOS) by DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp254 views
Trust, but verify – Bypassing MFA by DefCamp
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp323 views
Threat Hunting: From Platitudes to Practical Application by DefCamp
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp218 views
Building application security with 0 money down by DefCamp
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp179 views
Implementation of information security techniques on modern android based Kio... by DefCamp
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp215 views
Lattice based Merkle for post-quantum epoch by DefCamp
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp241 views
The challenge of building a secure and safe digital environment in healthcare by DefCamp
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp323 views
Timing attacks against web applications: Are they still practical? by DefCamp
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp258 views
Tor .onions: The Good, The Rotten and The Misconfigured by DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp817 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t... by DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp294 views
We will charge you. How to [b]reach vendor’s network using EV charging station. by DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp443 views
Connect & Inspire Cyber Security by DefCamp
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp290 views
The lions and the watering hole by DefCamp
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp225 views

Recently uploaded

Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
35 views38 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
98 views46 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
247 views13 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
224 views7 slides
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
141 views29 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
437 views30 slides

Recently uploaded(20)

Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue224 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue141 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10146 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue265 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue162 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views

Year of the #WiFiCactus

  • 1. Y e a r o f t h e # W i F i C A C T U S
  • 2. ABOUT ME Who am I? Hardware and software obsessed. BS in Computer Science. Freelance cybersphere consultant. Maker and hacker. Runner, Gamer (Fortnite FTW), Traveler Forever curious. @d4rkm4tter palshack.org
  • 3. THANK YOU!! This project wouldn’t have been possible without all of the support from the community, my friends, family and all of you!! You are what inspires me to continually improve and build bigger!!!
  • 4. CONTENTS What We Will Talk About Part 1 What is the #WiFiCactus Part 2 New features and mods Part 3 Effect of upgrades Part 4 The Year of The WiFiCactus Part 5 The data Part 6 The future Part 7 Conclusion
  • 5. The WiFiCactus Description The #WiFiCactus is a wireless monitoring tool that is capable of collecting wireless data from up to 50 WiFi channels at the same time. It can gather entire communications including ones that happen across multiple channels. It is mobile and has over 3 hours of battery life. It uses Kismet Wireless for the primary monitoring software. It is made up of 25 Hak5 Pineapple Tetras
  • 6. The #WiFiCactus is a wireless monitoring tool that is capable of collecting wireless data from up to 50 WiFi channels at the same time. It can gather entire communications including ones that happen across multiple channels. It is mobile and has over 3 hours of battery life. It uses Kismet Wireless for the primary monitoring software. It is made up of 25 Hak5 Pineapple Tetras The WiFiCactus Photo Gallery
  • 7. New Features New for DC26 Moved to gigabit switches to increase the throughput from the Tetras to the Intel NUC Upgraded Switches Lead acid batteries are cheap but a terrible solution for a mobile project you put on your back. Switched to Lithium Ion to increase the run time to 3 hours from 45 minutes and reduce the weight nearly 16 Kg (35 lbs). Thanks @glytech!! Upgraded Batteries
  • 8. New FeaturesNew for DC26 Increase Rigidity Beta Testing Diplexer Upgraded the switch and Intel NUC mount to increase the rigidity and mobility of the rig. Added a 16 antenna to 2 diplexer supplied by Alftel. This device reduces the number of required antennas .
  • 9. 44 568 Results of Upgrades A new problem was uncovered, lack of storage space. The amount of data gathered was much greater than anticipated and managing data became a new bottleneck. DC BH 2017 DC BH 2018 1,290%
  • 10. Results of Upgrades Theoretical and Actual Theoretical 125 MB/s maximum throughput to the Intel NUC which translates into 450 GB/h Caught over 200 GB in 8 hours during Blackhat. Actual data capture depends on the utilization of the environment. Maximum Tetra throughput is theoretically 312.5 MB/s which would require more bandwidth to achieve. Future work pending on this front.
  • 11. LOCATIONS Year of the WiFiCactus Saintcon DefCon China Bahamas DefCamp (Romania) ShmooconOakland/SF NYC DEF CON Colorado CactusCon
  • 12. Places Visited Year of the WiFiCactus Defcamp – Located in Bucharest, Romania - November 2017
  • 13. Places Visited Year of the WiFiCactus Shmoocon – Located in Washington DC – January 2018
  • 14. Places Visited Year of the WiFiCactus Hak5 Headquarters – Located in Oakland, CA – March 2018
  • 15. Places Visited Year of the WiFiCactus DEF CON China BETA – Located in Beijing, China – May 2018
  • 16. Places Visited Year of the WiFiCactus BlackHat / DEF CON– Located in Las Vegas – May 2018
  • 17. 2018201720162015 Total Data Collected The raw amount of data gathered by year. Total project data is now over 1 TB. 100’s MB 10’s GB 100’s GB TB
  • 18. Data Gathered 2017 vs 2018 Total data gathered over the last year. Results are in GB. 7.41 37.1 21.5 84.3 96.1 479 83.4 27.9 5.96 116DC China Defcamp DEF CON 20182017 Oakland Shmoo Saintcon CactusCon BlackHat
  • 20. Technology Hardware 2 x 24 Core Intel Xeon Platinum Processors 96 GB of DDR ECC RAM 512 GB NVME Drive 1 TB SATA SSD 6 TB Seagate 7200 RPM Windows 10 with Ubuntu WSL Analysis Hardware
  • 21. Analysis Techniques Live data view and replay of existing PCAPs. Offers comprehensive search and linking. Can be daunting with large amounts of data. Kismet Dashboard The go to method for packet analysis. Useful for inspection and filtering of the data. Miserable with files larger than a few 100 MB. Wireshark
  • 22. Analysis Techniques The command line Swiss army knife for packet analysis. Uses Wireshark filters but can output to a wide variety of formats. tshark Elastic Stack, formerly ELK Stack is a datastore and visualization tool that is popular for a wide array of uses including traffic analysis. Thank you Spencer (@_bin_sh) for bailing me out! Elastic Stack
  • 23. AnalysisTechniques Network Miner A fantastic PCAP forensic analysis tool. This tool allows you to deep dive quickly into PCAP files and discover files, credentials, sessions, IP address and more. THANK YOU Network Miner Team!!
  • 24. AnalysisTechniques Graphistry ViFi / Neo4J Amazing web based graphing software that supports millions of edges. Beautiful way to interpret data. Uses accelerated graphics to allow for interaction with the data. THANK YOU GRAPHISTRY!! Custom application to read PCAP files and import them into Neo4J which is a visualization software. Shout out to @sundhaug92 for letting me beta test his software!
  • 25. Useful for things like quickly finding handshakes, beacons, higher layer information and summary statistics. Example Wireshark Cases
  • 26. This was an interesting find with Network Miner Network Miner SRC: https://www.symantec.com/content/dam/symantec/docs/data-sheets/proxysg-s200-s400-s500-en.pdf
  • 27. An interesting find from DefCamp 8 Network Miner
  • 28. An interesting find from DefCamp 8 Network Miner
  • 29. Utilizing data caught from DC 24 to preform device tracking Graphistry
  • 30. Utilizing data caught from DC 24 to preform device tracking Graphistry
  • 31. Utilizing data caught from DC 24 to preform device tracking Graphistry
  • 33. Live Demos WE’LL DO IT LIVE!! Kismet Dashboard using live data.01 Graphistry on really big data 04 Wireshark on big PCAP files02 Elastic Stack goodness 03 Network Miner on PCAP 05
  • 34. The Future Don’t get your hopes too high Automated analysis pipeline for real-time feedback. 01 PCAP tool release so you can do this too04 More storage capacity02 Adding more wireless technologies. Especially LTE and 5G. Anyone interested in funding research? 05 UnRAID NAS and VMs for processing03 Real-time summary statistics sync using 4G or other out of band method. 06