SlideShare a Scribd company logo
1 of 22
Download to read offline
Hacker in the Wires
Phil Polstra
Bloomsburg University of Pennsylvania
@ppolstra
http://philpolstra.com
What is this talk about?
● A hacking device that lives on a gigabit Ethernet wire
● Device is a CatchWire from WAW Technologies
● Running
● Multiple command & control / exfiltration options
– Network on which it is installed
– Remote control via IEEE 802.15.4/ZigBee
– Cellular network
Why should you care?
● CatchWire running Deck Linux is
● Small
● Flexible
● Can be networked to integrate into sophisticated pentests
● Easily installed
– Data center: get all the packets
– LAN segment: target part of the organization
– Inline to single PC: laser focus
– Unused desk: bypass all perimeter defenses
Who am I?
● Professor at Bloomsburg University teaching digital
forensics & information security
● Author: Linux Forensics & HPTWLPD
● Programming from age 8
● Hacking hardware from age 12
● Also known to fly, build planes, and do other aviation stuff
● Course author for PentesterAcademy.com and others
Roadmap
● Introduction to the CatchWire
● Introduction to The Deck Linux
● Attacks from CatchWire or BeagleBone Black (BBB)
● CatchWire specific attacks
● Future Directions
Meet the CatchWire
● Formerly Little Universal Netwwork Appliance (LUNA)
● Like BeagleBone Black (BBB) except:
● Two gigabit Ethernet interfaces
● Power over Ethernet (PoE)
● Integerated FTDI USB to UART
● No HDMI or GPIO headers
CatchWire: Block Diagram
CatchWire: Hardware
CatchWire: Hardware (cont.)
● Base OS
● Built on Ubuntu 14.04
● Optimized for pentesting with the BBB, CatchWire, and similar
● Use as dropbox or hacking console
● Over 4000 packages pre-installed (fluff free)
● MeshDeck
● Adds remote control via 802.15.4/ZigBee networking
● Allows coordinated attacks with multiple remote drones
● AirDeck
● Combined with the MeshDeck to allow airborne drone or router
● 4Deck
● Forensic add-on that automatically write blocks USB mass storage devices (udev rules-based)
● Udeck (USB-based attacks)
● This is what my other talk (tomorrow) is about
Powering the CatchWire
● PoE
● Best choice when available
● Power can be passed through using jumpers
●
DC adapter
● USB power
● Can be via a USB charger (2A or greater)
● From PC, but not when Ethernet in use
– USB specification limits power to 500 mA for USB 2.0
Initial Configuration
● Obtain image from http://facstaff.bloomu.edu/ppolstra
● Create microSD card using provided script (16 GB+)
● Install microSD card into CatchWire
● Remove screws from microUSB socket side & slide out
● Connect to PC via USB
● Log in as ubuntu/temppwd
● Add/configure software as needed
Booting via USB power from PC
Selecting a Network Configuration
● Default is to bridge two Ethernet ports
● These can be split
cd /boot/uboot/dtbs
cp am335x-luna-demac.dtb am335x-luna.dtb
Comment out all lines in /etc/udev/rules.d/70-persistent-net.rules
● Going back
● Uncomment lines in 70-persistent-net-rules
● cp am335x-luna-switch.dtb over am335x-luna.dtb
Install the MeshDeck?
● MeshDeck allows remote control / exfiltration
● Range up to 2 miles (3.2 km) without gateways/extenders
● Out-of-band communication for most targets
● Easy integration into multi-device pentest
● Star network via IEEE 802.15.4 (Xbee series 1 adapters)
● Mesh network via ZigBee (Xbee series 2 or ZB adapters)
● Requires USB Xbee adapter
● See DC21 talk and/or Hacking & Penetration Testing with Low Power
Devices for details
● Permits access to CatchWire when Ethernet blocked
Demo: Exploiting an Old Friend
Let's Get Sniffing!
● CatchWire is installed inline for a LAN segment
● FTP server is running on a machine in this segment
● Capture all traffic to/from the host and pipe to egrep to get
login
tcpdump -n host 192.168.1.120 -v -A | egrep '(USER )|
(PASS )'
Demo: Sniffing Passwords
I Want To Use Wireshark
● You can use WireShark on your workstation to display packets
passing through the CatchWire
●
Must enable root login first
● In /etc/ssh/sshd_config change “PermitRootLogin without-password“
to “PermitRootLogin yes”
● This can generate a lot of traffic, so you should probably use
tcpdump filters!
ssh root@catchwire "/usr/sbin/tcpdump -s0 -w - " | wireshark -k -i -
Demo: Using CatchWire with WireShark
Other Possibilities
● Use MeshDeck to announce CatchWire IP address
● Use MeshDeck to toggle and/or focus sniffing
● Don't just sniff, inject some packets
● Use MeshDeck to communicate cracked passwords to other
hacking drones running Deck Linux
● Try some online password cracking with Hydra
● Social engineering
● Add stickers from IT deparment to CatchWire
● Sell it as a network extender or performance booster
Questions?
● Demo Labs Saturday 12:00 – 14:00
● PentesterAcademy booth (??, ask if I'm not there)
● Sign up for a chance to win one of two gift sets which include:
– Hacking and Penetration Testing with Low Power Devices
– Linux Forensics
– CatchWire appliance

More Related Content

What's hot

Tmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hackluTmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hacklu
Steph Cliche
 

What's hot (20)

Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Tmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hackluTmplab hostile wrt-5-hacklu
Tmplab hostile wrt-5-hacklu
 
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
 
PPPoE With Mikrotik and Radius
PPPoE With Mikrotik and RadiusPPPoE With Mikrotik and Radius
PPPoE With Mikrotik and Radius
 
VXLAN and FRRouting
VXLAN and FRRoutingVXLAN and FRRouting
VXLAN and FRRouting
 
ESP8266 and IOT
ESP8266 and IOTESP8266 and IOT
ESP8266 and IOT
 
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet DevicesIETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
 
Intro to Packet Analysis - pfSense Hangout May 2014
Intro to Packet Analysis - pfSense Hangout May 2014Intro to Packet Analysis - pfSense Hangout May 2014
Intro to Packet Analysis - pfSense Hangout May 2014
 
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
 
pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018
pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018
pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018
 
Networking Layer Basics - ChinaNetCloud Training
Networking Layer Basics - ChinaNetCloud TrainingNetworking Layer Basics - ChinaNetCloud Training
Networking Layer Basics - ChinaNetCloud Training
 
IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015IPv6 Basics - pfSense Hangout July 2015
IPv6 Basics - pfSense Hangout July 2015
 
Mikrotik® MPLS/VPN Lab Part 1
Mikrotik® MPLS/VPN Lab Part 1Mikrotik® MPLS/VPN Lab Part 1
Mikrotik® MPLS/VPN Lab Part 1
 
Site-to-Site VPNs - pfSense Hangout November 2015
Site-to-Site VPNs - pfSense Hangout November 2015Site-to-Site VPNs - pfSense Hangout November 2015
Site-to-Site VPNs - pfSense Hangout November 2015
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
Network scanning
Network scanningNetwork scanning
Network scanning
 

Similar to DEF CON 23 - Phil Polstra - hacker in the wires

Similar to DEF CON 23 - Phil Polstra - hacker in the wires (20)

DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi
 
Home Automation Using RPI
Home Automation Using  RPIHome Automation Using  RPI
Home Automation Using RPI
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri
 
Shall we play a game
Shall we play a gameShall we play a game
Shall we play a game
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Don't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFiDon't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFi
 
Firewall
FirewallFirewall
Firewall
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Thotcon2013
Thotcon2013Thotcon2013
Thotcon2013
 
Firewall
FirewallFirewall
Firewall
 
CNIT 140: Flashing Firmware
CNIT 140: Flashing FirmwareCNIT 140: Flashing Firmware
CNIT 140: Flashing Firmware
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
 

More from Felipe Prado

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

DEF CON 23 - Phil Polstra - hacker in the wires

  • 1. Hacker in the Wires Phil Polstra Bloomsburg University of Pennsylvania @ppolstra http://philpolstra.com
  • 2. What is this talk about? ● A hacking device that lives on a gigabit Ethernet wire ● Device is a CatchWire from WAW Technologies ● Running ● Multiple command & control / exfiltration options – Network on which it is installed – Remote control via IEEE 802.15.4/ZigBee – Cellular network
  • 3. Why should you care? ● CatchWire running Deck Linux is ● Small ● Flexible ● Can be networked to integrate into sophisticated pentests ● Easily installed – Data center: get all the packets – LAN segment: target part of the organization – Inline to single PC: laser focus – Unused desk: bypass all perimeter defenses
  • 4. Who am I? ● Professor at Bloomsburg University teaching digital forensics & information security ● Author: Linux Forensics & HPTWLPD ● Programming from age 8 ● Hacking hardware from age 12 ● Also known to fly, build planes, and do other aviation stuff ● Course author for PentesterAcademy.com and others
  • 5. Roadmap ● Introduction to the CatchWire ● Introduction to The Deck Linux ● Attacks from CatchWire or BeagleBone Black (BBB) ● CatchWire specific attacks ● Future Directions
  • 6. Meet the CatchWire ● Formerly Little Universal Netwwork Appliance (LUNA) ● Like BeagleBone Black (BBB) except: ● Two gigabit Ethernet interfaces ● Power over Ethernet (PoE) ● Integerated FTDI USB to UART ● No HDMI or GPIO headers
  • 10. ● Base OS ● Built on Ubuntu 14.04 ● Optimized for pentesting with the BBB, CatchWire, and similar ● Use as dropbox or hacking console ● Over 4000 packages pre-installed (fluff free) ● MeshDeck ● Adds remote control via 802.15.4/ZigBee networking ● Allows coordinated attacks with multiple remote drones ● AirDeck ● Combined with the MeshDeck to allow airborne drone or router ● 4Deck ● Forensic add-on that automatically write blocks USB mass storage devices (udev rules-based) ● Udeck (USB-based attacks) ● This is what my other talk (tomorrow) is about
  • 11. Powering the CatchWire ● PoE ● Best choice when available ● Power can be passed through using jumpers ● DC adapter ● USB power ● Can be via a USB charger (2A or greater) ● From PC, but not when Ethernet in use – USB specification limits power to 500 mA for USB 2.0
  • 12. Initial Configuration ● Obtain image from http://facstaff.bloomu.edu/ppolstra ● Create microSD card using provided script (16 GB+) ● Install microSD card into CatchWire ● Remove screws from microUSB socket side & slide out ● Connect to PC via USB ● Log in as ubuntu/temppwd ● Add/configure software as needed
  • 13. Booting via USB power from PC
  • 14. Selecting a Network Configuration ● Default is to bridge two Ethernet ports ● These can be split cd /boot/uboot/dtbs cp am335x-luna-demac.dtb am335x-luna.dtb Comment out all lines in /etc/udev/rules.d/70-persistent-net.rules ● Going back ● Uncomment lines in 70-persistent-net-rules ● cp am335x-luna-switch.dtb over am335x-luna.dtb
  • 15. Install the MeshDeck? ● MeshDeck allows remote control / exfiltration ● Range up to 2 miles (3.2 km) without gateways/extenders ● Out-of-band communication for most targets ● Easy integration into multi-device pentest ● Star network via IEEE 802.15.4 (Xbee series 1 adapters) ● Mesh network via ZigBee (Xbee series 2 or ZB adapters) ● Requires USB Xbee adapter ● See DC21 talk and/or Hacking & Penetration Testing with Low Power Devices for details ● Permits access to CatchWire when Ethernet blocked
  • 16. Demo: Exploiting an Old Friend
  • 17. Let's Get Sniffing! ● CatchWire is installed inline for a LAN segment ● FTP server is running on a machine in this segment ● Capture all traffic to/from the host and pipe to egrep to get login tcpdump -n host 192.168.1.120 -v -A | egrep '(USER )| (PASS )'
  • 19. I Want To Use Wireshark ● You can use WireShark on your workstation to display packets passing through the CatchWire ● Must enable root login first ● In /etc/ssh/sshd_config change “PermitRootLogin without-password“ to “PermitRootLogin yes” ● This can generate a lot of traffic, so you should probably use tcpdump filters! ssh root@catchwire "/usr/sbin/tcpdump -s0 -w - " | wireshark -k -i -
  • 20. Demo: Using CatchWire with WireShark
  • 21. Other Possibilities ● Use MeshDeck to announce CatchWire IP address ● Use MeshDeck to toggle and/or focus sniffing ● Don't just sniff, inject some packets ● Use MeshDeck to communicate cracked passwords to other hacking drones running Deck Linux ● Try some online password cracking with Hydra ● Social engineering ● Add stickers from IT deparment to CatchWire ● Sell it as a network extender or performance booster
  • 22. Questions? ● Demo Labs Saturday 12:00 – 14:00 ● PentesterAcademy booth (??, ask if I'm not there) ● Sign up for a chance to win one of two gift sets which include: – Hacking and Penetration Testing with Low Power Devices – Linux Forensics – CatchWire appliance