SlideShare a Scribd company logo
1 of 30
ECSA	
  Cyber	
  Security	
  Conference	
  2011	
  
Some	
  hands-­‐on	
  threat	
  demonstra.ons	
  
	
  
Cyber	
  Security	
  2011	
  (13-­‐Dec-­‐2011)	
  
	
  
	
  
	
  
Filip	
  Maertens	
  
Avydian	
  Cyber	
  Defense	
  




                                                      Cyber	
  Defense	
  Group	
  
Agenda	
  

➤  Demo	
  1:	
  The	
  Curious	
  Case	
  of	
  Benjamin	
  BuGon	
  
➤  Demo	
  2:	
  Thanks	
  for	
  the	
  free	
  Wi-­‐Fi	
  
➤  Demo	
  3:	
  Hm.	
  Now,	
  I	
  need	
  free	
  Wi-­‐Fi	
  	
  
➤  Demo	
  4:	
  Social	
  Engineering	
  on	
  social	
  networks	
  
➤  Demo	
  5:	
  IntercepTng	
  GSM	
  networks	
  




                                                                         Cyber	
  Defense	
  Group	
  
About	
  the	
  speaker	
  

➤  Cybercrime	
  invesTgator	
  and	
  tacTcal	
  cyber	
  security	
  advisor	
  
➤  Head	
  of	
  Cyber-­‐Security	
  at	
  European	
  Corporate	
  Security	
  AssociaTon	
  
➤  CISSP,	
  CISM,	
  CISA,	
  CPO,	
  CFE	
  …	
  and	
  CCSP	
  (“cer.fied	
  common	
  sense	
  prac..oner”)	
  
➤  MSc.	
  InformaTon	
  Risk	
  and	
  BSc.	
  InformaTon	
  OperaTons	
  
➤  Mobile	
  aficionado	
  (building	
  mobile	
  channels	
  for	
  Fortune	
  500	
  banks)	
  




                                                                                                            Cyber	
  Defense	
  Group	
  
Demo	
  1	
  –	
  The	
  Curious	
  Case	
  of	
  Benjamin	
  BuBon	
  
                                    	
  
             (or	
  how	
  curiosity	
  killed	
  the	
  cat)	
  




                                                                          Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  PreparaDon	
  

➤  Prepare	
  a	
  USB	
  with	
  a	
  maliciously	
  cra[ed	
  file	
  and	
  
   drop	
  it	
  somewhere.	
  	
  Then	
  wait.	
  
➤  ExploitaTon	
  of	
  human	
  weakness	
  
➤  ExploitaTon	
  of	
  system	
  weakness	
  




                                                                                 Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  PreparaDon	
  (2/2)	
  

➤  Make	
  a	
  good	
  payload:	
  
      ➤  Obfuscated	
  key-­‐logger	
  	
  
      ➤  Adobe	
  Acrobat	
  Reader	
  10.x	
  
         0day	
  exploit	
  (PDF)	
  


➤  Once	
  the	
  Acrobat	
  is	
  
   exploited,	
  our	
  key-­‐logger	
  is	
  
   silently	
  installed	
  



                                                  Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  ExecuDon	
  (Step	
  1)	
  




                                                   Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  ExecuDon	
  (Step	
  2)	
  

Live	
  Demo:	
  Silent	
  install	
  of	
  key-­‐logger	
  




                                                               Cyber	
  Defense	
  Group	
  
Defending	
  against	
  the	
  aBack	
  

➤  Don’t	
  take	
  candy	
  from	
  a	
  stranger:	
  
      ➤  Always	
  approach	
  unknown	
  storage	
  hardware	
  
         with	
  great	
  cauTon	
  
      ➤  Do	
  not	
  open	
  files	
  (seriously)	
  
      ➤  …	
  and	
  if	
  you	
  must,	
  open	
  it	
  in	
  an	
  isolated	
  test	
  
         environment	
  


➤  PracTce	
  sound	
  personal	
  system	
  security	
  
   pracTces	
  


                                                                                            Cyber	
  Defense	
  Group	
  
Demo	
  2	
  –	
  Thanks	
  for	
  the	
  free	
  Wi-­‐Fi!	
  
                                               	
  
(or,	
  if	
  something	
  looks	
  to	
  be	
  good	
  to	
  be	
  true…	
  it	
  usually	
  is)	
  




                                                                                                Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  PreparaDon	
  

➤  Prepare	
  a	
  rogue	
  access	
  point:	
  
      ➤  Deny	
  access	
  to	
  exis.ng	
  Access	
  Point	
  
      ➤  Set	
  up	
  your	
  own	
  Access	
  Point	
  (with	
  sslstrip)	
  
      ➤  Intercept	
  all	
  traffic	
  going	
  over	
  the	
  wire	
  


➤  ExploitaTon	
  of	
  human	
  weakness	
  
➤  ExploitaTon	
  of	
  system	
  weakness	
  



                                                                                 Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  ExecuDon	
  

Live	
  Demo:	
  Capture	
  usernames	
  +	
  passwords	
  of	
  a	
  user	
  




                                                                                 Cyber	
  Defense	
  Group	
  
Defending	
  against	
  the	
  aBack	
  

➤  Never	
  assume	
  (“it	
  makes	
  an	
  ass	
  of	
  u	
  and	
  me”):	
  
      ➤  Always	
  ask	
  for	
  the	
  SSID	
  of	
  the	
  Hotel	
  or	
  public	
  area	
  
         	
  

➤  Be	
  vigilant	
  /	
  aware	
  of	
  abnormal	
  behavior:	
  
      ➤  Someone	
  in	
  a	
  parked	
  car	
  with	
  a	
  laptop	
  
      ➤  Unusual	
  slow	
  Internet	
  access	
  
      ➤  Abnormal	
  traceroute	
  paths	
  
      ➤  Abnormal	
  SSL	
  cerTficates	
  presented	
  (or	
  broken	
  cerTficates)	
  
      ➤  Automated	
  connects	
  aren’t	
  automated	
  any	
  more	
  


                                                                                                 Cyber	
  Defense	
  Group	
  
Demo	
  3	
  –	
  Hm.	
  Now,	
  I	
  need	
  free	
  Wi-­‐Fi!	
  
                           	
  
 (wireless	
  hacking	
  for	
  fun	
  and	
  profit)	
  




                                                                     Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  PreparaDon	
  

➤  Set	
  up	
  a	
  Linux	
  machine	
  with	
  a	
  wireless	
  card	
  
➤  Put	
  network	
  card	
  in	
  promiscuous	
  mode,	
  so	
  it	
  
   starts	
  to	
  listen	
  to	
  all	
  wireless	
  traffic	
  around	
  you	
  
➤  Capture	
  all	
  traffic	
  and	
  do	
  this	
  unTl	
  you	
  have	
  
   capture	
  a	
  WPA	
  Handshake	
  session.	
  
➤  Decode	
  the	
  passphrase	
  (PSK)	
  by	
  doing	
  offline	
  
   cracking.	
  




                                                                                   Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  ExecuDon	
  

Live	
  Demo:	
  Hack	
  an	
  Access	
  Point	
  (WPA2-­‐PSK)	
  




                                                                     Cyber	
  Defense	
  Group	
  
Defending	
  against	
  the	
  aBack	
  

➤  Don’t	
  use	
  Pre-­‐Shared	
  Key	
  protecTon:	
  
      ➤  But	
  if	
  you	
  have	
  no	
  choice,	
  make	
  it	
  extremely	
  long	
  (	
  >	
  35	
  chars)	
  
      ➤  Change	
  the	
  PSK	
  every	
  month	
  or	
  quarter	
  
      ➤  Change	
  the	
  SSID	
  to	
  a	
  non-­‐default	
  SSID	
  
      ➤  Don’t	
  use	
  WPA2-­‐TKIP,	
  but	
  WPA2-­‐AES	
  

➤  Monitor	
  your	
  Internet	
  usage	
  to	
  check	
  for	
  excessive	
  
   bandwidth	
  usage.	
  
➤  Have	
  a	
  firewall	
  between	
  the	
  AP	
  and	
  your	
  network.	
  


                                                                                                                      Cyber	
  Defense	
  Group	
  
Demo	
  4	
  –	
  Social	
  Engineering	
  on	
  Social	
  Networks	
  
                                    	
  
 (trying	
  to	
  score	
  a	
  date	
  with	
  Sophie	
  Draufster)	
  




                                                                           Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  PreparaDon	
  

➤  Back	
  in	
  2010:	
  Sophie	
  Draufster	
  was	
  born	
  on	
  
   Facebook	
  and	
  LinkedIn	
  
➤  Reason	
  for	
  existence:	
  Social	
  engineering	
  of	
  
   execuTves	
  of	
  large	
  consulTng	
  firms	
  
➤  Results:	
  
      ➤  Facebook	
  Friends:	
  105	
  
      ➤  LinkedIn	
  Requests:	
  133	
  
      ➤  Divulging	
  of	
  confidenTal	
  informaTon:	
  73	
  
      ➤  Explicit	
  date	
  requests:	
  33	
  



                                                                         Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  Results	
  




                                     Cyber	
  Defense	
  Group	
  
Defending	
  against	
  the	
  aBack	
  

➤  Be	
  vigilant	
  and	
  know	
  who	
  you	
  are	
  talking	
  to:	
  
      ➤  Why	
  would	
  a	
  (gorgeous	
  looking)	
  stranger	
  befriend	
  you	
  ?	
  
      ➤  Never	
  post	
  /	
  talk	
  /	
  tweet	
  /	
  …	
  classified	
  business	
  
      ➤  Be	
  trained	
  to	
  detect	
  social	
  engineering	
  aGacks	
  (paranoia	
  
         can’t	
  hurt)	
  



➤  Claim	
  your	
  own	
  idenTty	
  (before	
  someone	
  else	
  does)	
  
➤  Social	
  networks	
  only	
  for	
  offline	
  trusted	
  friends	
  


                                                                                              Cyber	
  Defense	
  Group	
  
Demo	
  5	
  –	
  IntercepDng	
  GSM	
  networks	
  
                              	
  
(build	
  your	
  own	
  tacTcal	
  intercepTon	
  device)	
  




                                                                 Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  PreparaDon	
  
                                                                                                       Trixie	
  
➤  Become	
  your	
  own	
  operator:	
                               R/TFX900	
                      Priceless	
  
                                                                           175	
  USD	
  
       ➤  Universal	
  So[ware	
  Radio	
  Peripheral	
  
       ➤  GNUradio	
  Project	
  
       ➤  OpenBTS	
  /	
  OpenBSC	
  /	
  SMSqueue	
           USRP	
  
                                                               800	
  USD	
  
       ➤  OsmocomBB	
  
       ➤  Asterisk	
  
                                                                      52	
  Mhz	
  
➤  Under	
  1,500	
  USD	
  you	
  cover	
  up	
  to	
                   37	
  USD	
  

   300	
  m	
  of	
  GSM	
  signal	
  (indoor)	
  +	
  2	
  
   channels	
  (850/900/1800/1900).	
  

                                                                                            Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  Background	
  (1/2)	
  

➤  GSMA	
  is	
  not	
  too	
  worried,	
  though	
  :	
  

     “	
  …	
  intercept	
  approach	
  has	
  underesDmated	
  its	
  pracTcal	
  complexity	
  
     A	
  hacker	
  would	
  need	
  a	
  radio	
  receiver	
  system	
  and	
  the	
  signal	
  processing	
  
	
          so]ware	
  necessary	
  to	
  process	
  the	
  raw	
  radio	
  data.	
  CSMA,	
  Aug	
  2009	
  

      ✓  UnderesDmated	
  complexity:	
  Ability	
  to	
  decrypt	
  A5	
  family	
  in	
  (near)	
  real	
  Tme	
  (2009)	
  
      ✓  UnderesDmated	
  complexity:	
  IMSI	
  catching,	
  bypass	
  A3/A8,	
  …	
  (2010)	
  
      ✓  Radio	
  receiver	
  system:	
  USRP	
  /	
  USRP2	
  +	
  GNUradio	
  +	
  OpenBTS	
  (you	
  know,	
  the	
  so]ware)	
  

                                                                                                                       Cyber	
  Defense	
  Group	
  
The	
  ABack	
  -­‐	
  Background	
  (2/2)	
  

 If	
  it	
  looks	
  like	
  a	
  duck	
   ,	
  walks	
  like	
  a	
  duck	
        ,	
  talks	
  like	
  a	
  duck	
              =	
     it’s	
  a	
  duck	
  !	
  




                                                                                                                                                      ?	
  


MCC=206,	
  MNC=020	
                  Handset	
  registers	
  to	
  who	
  ?	
   This	
  is	
  where	
  you	
  do	
  “Hello”	
  
                                                                                                                                             Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  ExecuDon	
  

Disclaimer	
  –	
  Only	
  used	
  for	
  test	
  and	
  protocol	
  analysis	
  purposes.	
  No	
  
real	
  operator	
  MMC	
  or	
  MNC	
  data,	
  frequencies	
  and	
  spectrum	
  used.	
  
No	
  operator	
  BTS,	
  BSC	
  or	
  HLR	
  infrastructure	
  is	
  (ab)used.	
  
	
  
Live	
  Demo:	
  IntercepDon	
  of	
  SMS	
  
Live	
  Demo:	
  IntercepDon	
  of	
  Voice	
  Call	
  




                                                                                                       Cyber	
  Defense	
  Group	
  
The	
  ABack	
  –	
  Summary	
  

                              OTP	
  over	
  SMS	
  
                                Insecure	
  	
  




                                     Making	
  calls	
  
                                      Insecure	
  	
  



                                                           Cyber	
  Defense	
  Group	
  
Defending	
  against	
  the	
  aBack	
  

➤  Sudden	
  and/or	
  repeated	
  network	
  signal	
  loss	
  
➤  Sudden	
  3G	
  data	
  loss	
  (where	
  it	
  is	
  abnormal)	
  
➤  Cryptographic	
  voice	
  streaming	
  over	
  3G	
  (A5.3)	
  
➤  Sudden	
  downgrade	
  from	
  A5.1	
  to	
  A5.0/A5.2	
  


➤  …	
  but	
  passive	
  intercepTon	
  =>	
  undetectable	
  from	
  handheld	
  




                                                                                      Cyber	
  Defense	
  Group	
  
Taking	
  it	
  to	
  an	
  non-­‐defendable	
  level	
  




                                                            Cyber	
  Defense	
  Group	
  
ECSA	
  Cyber	
  Security	
  Conference	
  2011	
  
Some	
  hands-­‐on	
  threat	
  demonstra.ons	
  
	
  
Cyber	
  Security	
  2011	
  (13-­‐Dec-­‐2011)	
  
	
  
	
  
	
  
Filip	
  Maertens	
  
filip.maertens@avydian.com	
  




                                                      Cyber	
  Defense	
  Group	
  

More Related Content

Similar to ECSA Cyber Security Conference 2011 Hands-On Threat Demos

A tale of a rouge router firmware
A tale of a rouge router firmwareA tale of a rouge router firmware
A tale of a rouge router firmwareBijay Senihang
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)Sri Prasanna
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?Rob Gillen
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gearshawn_merdinger
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - RoutersLogicaltrust pl
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Security Weekly
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy WepPraveen Kumar Sinha
 
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Greg Foss
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsDan Houser
 

Similar to ECSA Cyber Security Conference 2011 Hands-On Threat Demos (20)

Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Hacker tool talk: kismet
Hacker tool talk: kismetHacker tool talk: kismet
Hacker tool talk: kismet
 
A tale of a rouge router firmware
A tale of a rouge router firmwareA tale of a rouge router firmware
A tale of a rouge router firmware
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
Pentesting
PentestingPentesting
Pentesting
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Howto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  WepHowto Crack  Or Hack  A Wireless Network With Wired Equivalent Privacy  Wep
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
 
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 

More from Filip Maertens

Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsFilip Maertens
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014Filip Maertens
 
Startups.be Tech Days 2014
Startups.be Tech Days 2014Startups.be Tech Days 2014
Startups.be Tech Days 2014Filip Maertens
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceFilip Maertens
 
On Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & OutlooksOn Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & OutlooksFilip Maertens
 
FLYSE Kick Off Event Presentation
FLYSE Kick Off Event PresentationFLYSE Kick Off Event Presentation
FLYSE Kick Off Event PresentationFilip Maertens
 
TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013Filip Maertens
 
Mobile Premier Awards 2013
Mobile Premier Awards 2013Mobile Premier Awards 2013
Mobile Premier Awards 2013Filip Maertens
 
LeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition PitchLeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition PitchFilip Maertens
 
VOKA BRYO Keynote Speech
VOKA BRYO Keynote SpeechVOKA BRYO Keynote Speech
VOKA BRYO Keynote SpeechFilip Maertens
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Filip Maertens
 
Media Marketing Days 2011
Media Marketing Days 2011Media Marketing Days 2011
Media Marketing Days 2011Filip Maertens
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security PresentationFilip Maertens
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 

More from Filip Maertens (18)

Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensors
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Startups.be Tech Days 2014
Startups.be Tech Days 2014Startups.be Tech Days 2014
Startups.be Tech Days 2014
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 Conference
 
On Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & OutlooksOn Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & Outlooks
 
On Leadership
On LeadershipOn Leadership
On Leadership
 
FLYSE Kick Off Event Presentation
FLYSE Kick Off Event PresentationFLYSE Kick Off Event Presentation
FLYSE Kick Off Event Presentation
 
TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013
 
Mobile Premier Awards 2013
Mobile Premier Awards 2013Mobile Premier Awards 2013
Mobile Premier Awards 2013
 
LeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition PitchLeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition Pitch
 
VOKA BRYO Keynote Speech
VOKA BRYO Keynote SpeechVOKA BRYO Keynote Speech
VOKA BRYO Keynote Speech
 
Fail Con 2012
Fail Con 2012Fail Con 2012
Fail Con 2012
 
Apps Marathon 2012
Apps Marathon 2012Apps Marathon 2012
Apps Marathon 2012
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7
 
Media Marketing Days 2011
Media Marketing Days 2011Media Marketing Days 2011
Media Marketing Days 2011
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

ECSA Cyber Security Conference 2011 Hands-On Threat Demos

  • 1. ECSA  Cyber  Security  Conference  2011   Some  hands-­‐on  threat  demonstra.ons     Cyber  Security  2011  (13-­‐Dec-­‐2011)         Filip  Maertens   Avydian  Cyber  Defense   Cyber  Defense  Group  
  • 2. Agenda   ➤  Demo  1:  The  Curious  Case  of  Benjamin  BuGon   ➤  Demo  2:  Thanks  for  the  free  Wi-­‐Fi   ➤  Demo  3:  Hm.  Now,  I  need  free  Wi-­‐Fi     ➤  Demo  4:  Social  Engineering  on  social  networks   ➤  Demo  5:  IntercepTng  GSM  networks   Cyber  Defense  Group  
  • 3. About  the  speaker   ➤  Cybercrime  invesTgator  and  tacTcal  cyber  security  advisor   ➤  Head  of  Cyber-­‐Security  at  European  Corporate  Security  AssociaTon   ➤  CISSP,  CISM,  CISA,  CPO,  CFE  …  and  CCSP  (“cer.fied  common  sense  prac..oner”)   ➤  MSc.  InformaTon  Risk  and  BSc.  InformaTon  OperaTons   ➤  Mobile  aficionado  (building  mobile  channels  for  Fortune  500  banks)   Cyber  Defense  Group  
  • 4. Demo  1  –  The  Curious  Case  of  Benjamin  BuBon     (or  how  curiosity  killed  the  cat)   Cyber  Defense  Group  
  • 5. The  ABack  -­‐  PreparaDon   ➤  Prepare  a  USB  with  a  maliciously  cra[ed  file  and   drop  it  somewhere.    Then  wait.   ➤  ExploitaTon  of  human  weakness   ➤  ExploitaTon  of  system  weakness   Cyber  Defense  Group  
  • 6. The  ABack  –  PreparaDon  (2/2)   ➤  Make  a  good  payload:   ➤  Obfuscated  key-­‐logger     ➤  Adobe  Acrobat  Reader  10.x   0day  exploit  (PDF)   ➤  Once  the  Acrobat  is   exploited,  our  key-­‐logger  is   silently  installed   Cyber  Defense  Group  
  • 7. The  ABack  –  ExecuDon  (Step  1)   Cyber  Defense  Group  
  • 8. The  ABack  –  ExecuDon  (Step  2)   Live  Demo:  Silent  install  of  key-­‐logger   Cyber  Defense  Group  
  • 9. Defending  against  the  aBack   ➤  Don’t  take  candy  from  a  stranger:   ➤  Always  approach  unknown  storage  hardware   with  great  cauTon   ➤  Do  not  open  files  (seriously)   ➤  …  and  if  you  must,  open  it  in  an  isolated  test   environment   ➤  PracTce  sound  personal  system  security   pracTces   Cyber  Defense  Group  
  • 10. Demo  2  –  Thanks  for  the  free  Wi-­‐Fi!     (or,  if  something  looks  to  be  good  to  be  true…  it  usually  is)   Cyber  Defense  Group  
  • 11. The  ABack  -­‐  PreparaDon   ➤  Prepare  a  rogue  access  point:   ➤  Deny  access  to  exis.ng  Access  Point   ➤  Set  up  your  own  Access  Point  (with  sslstrip)   ➤  Intercept  all  traffic  going  over  the  wire   ➤  ExploitaTon  of  human  weakness   ➤  ExploitaTon  of  system  weakness   Cyber  Defense  Group  
  • 12. The  ABack  –  ExecuDon   Live  Demo:  Capture  usernames  +  passwords  of  a  user   Cyber  Defense  Group  
  • 13. Defending  against  the  aBack   ➤  Never  assume  (“it  makes  an  ass  of  u  and  me”):   ➤  Always  ask  for  the  SSID  of  the  Hotel  or  public  area     ➤  Be  vigilant  /  aware  of  abnormal  behavior:   ➤  Someone  in  a  parked  car  with  a  laptop   ➤  Unusual  slow  Internet  access   ➤  Abnormal  traceroute  paths   ➤  Abnormal  SSL  cerTficates  presented  (or  broken  cerTficates)   ➤  Automated  connects  aren’t  automated  any  more   Cyber  Defense  Group  
  • 14. Demo  3  –  Hm.  Now,  I  need  free  Wi-­‐Fi!     (wireless  hacking  for  fun  and  profit)   Cyber  Defense  Group  
  • 15. The  ABack  -­‐  PreparaDon   ➤  Set  up  a  Linux  machine  with  a  wireless  card   ➤  Put  network  card  in  promiscuous  mode,  so  it   starts  to  listen  to  all  wireless  traffic  around  you   ➤  Capture  all  traffic  and  do  this  unTl  you  have   capture  a  WPA  Handshake  session.   ➤  Decode  the  passphrase  (PSK)  by  doing  offline   cracking.   Cyber  Defense  Group  
  • 16. The  ABack  –  ExecuDon   Live  Demo:  Hack  an  Access  Point  (WPA2-­‐PSK)   Cyber  Defense  Group  
  • 17. Defending  against  the  aBack   ➤  Don’t  use  Pre-­‐Shared  Key  protecTon:   ➤  But  if  you  have  no  choice,  make  it  extremely  long  (  >  35  chars)   ➤  Change  the  PSK  every  month  or  quarter   ➤  Change  the  SSID  to  a  non-­‐default  SSID   ➤  Don’t  use  WPA2-­‐TKIP,  but  WPA2-­‐AES   ➤  Monitor  your  Internet  usage  to  check  for  excessive   bandwidth  usage.   ➤  Have  a  firewall  between  the  AP  and  your  network.   Cyber  Defense  Group  
  • 18. Demo  4  –  Social  Engineering  on  Social  Networks     (trying  to  score  a  date  with  Sophie  Draufster)   Cyber  Defense  Group  
  • 19. The  ABack  -­‐  PreparaDon   ➤  Back  in  2010:  Sophie  Draufster  was  born  on   Facebook  and  LinkedIn   ➤  Reason  for  existence:  Social  engineering  of   execuTves  of  large  consulTng  firms   ➤  Results:   ➤  Facebook  Friends:  105   ➤  LinkedIn  Requests:  133   ➤  Divulging  of  confidenTal  informaTon:  73   ➤  Explicit  date  requests:  33   Cyber  Defense  Group  
  • 20. The  ABack  -­‐  Results   Cyber  Defense  Group  
  • 21. Defending  against  the  aBack   ➤  Be  vigilant  and  know  who  you  are  talking  to:   ➤  Why  would  a  (gorgeous  looking)  stranger  befriend  you  ?   ➤  Never  post  /  talk  /  tweet  /  …  classified  business   ➤  Be  trained  to  detect  social  engineering  aGacks  (paranoia   can’t  hurt)   ➤  Claim  your  own  idenTty  (before  someone  else  does)   ➤  Social  networks  only  for  offline  trusted  friends   Cyber  Defense  Group  
  • 22. Demo  5  –  IntercepDng  GSM  networks     (build  your  own  tacTcal  intercepTon  device)   Cyber  Defense  Group  
  • 23. The  ABack  -­‐  PreparaDon   Trixie   ➤  Become  your  own  operator:   R/TFX900   Priceless   175  USD   ➤  Universal  So[ware  Radio  Peripheral   ➤  GNUradio  Project   ➤  OpenBTS  /  OpenBSC  /  SMSqueue   USRP   800  USD   ➤  OsmocomBB   ➤  Asterisk   52  Mhz   ➤  Under  1,500  USD  you  cover  up  to   37  USD   300  m  of  GSM  signal  (indoor)  +  2   channels  (850/900/1800/1900).   Cyber  Defense  Group  
  • 24. The  ABack  -­‐  Background  (1/2)   ➤  GSMA  is  not  too  worried,  though  :   “  …  intercept  approach  has  underesDmated  its  pracTcal  complexity   A  hacker  would  need  a  radio  receiver  system  and  the  signal  processing     so]ware  necessary  to  process  the  raw  radio  data.  CSMA,  Aug  2009   ✓  UnderesDmated  complexity:  Ability  to  decrypt  A5  family  in  (near)  real  Tme  (2009)   ✓  UnderesDmated  complexity:  IMSI  catching,  bypass  A3/A8,  …  (2010)   ✓  Radio  receiver  system:  USRP  /  USRP2  +  GNUradio  +  OpenBTS  (you  know,  the  so]ware)   Cyber  Defense  Group  
  • 25. The  ABack  -­‐  Background  (2/2)   If  it  looks  like  a  duck   ,  walks  like  a  duck   ,  talks  like  a  duck   =   it’s  a  duck  !   ?   MCC=206,  MNC=020   Handset  registers  to  who  ?   This  is  where  you  do  “Hello”   Cyber  Defense  Group  
  • 26. The  ABack  –  ExecuDon   Disclaimer  –  Only  used  for  test  and  protocol  analysis  purposes.  No   real  operator  MMC  or  MNC  data,  frequencies  and  spectrum  used.   No  operator  BTS,  BSC  or  HLR  infrastructure  is  (ab)used.     Live  Demo:  IntercepDon  of  SMS   Live  Demo:  IntercepDon  of  Voice  Call   Cyber  Defense  Group  
  • 27. The  ABack  –  Summary   OTP  over  SMS   Insecure     Making  calls   Insecure     Cyber  Defense  Group  
  • 28. Defending  against  the  aBack   ➤  Sudden  and/or  repeated  network  signal  loss   ➤  Sudden  3G  data  loss  (where  it  is  abnormal)   ➤  Cryptographic  voice  streaming  over  3G  (A5.3)   ➤  Sudden  downgrade  from  A5.1  to  A5.0/A5.2   ➤  …  but  passive  intercepTon  =>  undetectable  from  handheld   Cyber  Defense  Group  
  • 29. Taking  it  to  an  non-­‐defendable  level   Cyber  Defense  Group  
  • 30. ECSA  Cyber  Security  Conference  2011   Some  hands-­‐on  threat  demonstra.ons     Cyber  Security  2011  (13-­‐Dec-­‐2011)         Filip  Maertens   filip.maertens@avydian.com   Cyber  Defense  Group