SlideShare a Scribd company logo
1 of 28
Download to read offline
Bugged&Files&
Is#Your#Document#Telling#on#You?#
Daniel#Crowley,#Damon#Smith#
•  Damon&Smith&
Who&are&we?&
•  Daniel&Crowley&
Files&that&trigger&outbound&traffic&when&parsed&
&
&Without&being&an&executable&format&
&Regardless&of&format&complexity&
&&&&&&Without&the&use&of&exploits&
&
&…and&the&implications&of&all&that&
What&is&this&talk&about?&
• Privacy&
– DRM&
– DLP&
– DeFanonymization&
• Security&
– NTLM&credential&capture/relay&
– CSRF&
• ”It’s&a&feature,&not&a&bug”&
Why&is&this&important?&
&
Demonstration&
•  RTF&
•  WMV&
• Office&formats&
– .docx&
– .pptx&
– .xlsx&
• PLS&playlists&
• Shortcut&(.lnk)&files&
• Desktop.ini&files&
• HTML&
What&formats&are&already&known&to&
allow&this?&
•  HTML&in&IE&
•  Linked&images&in&emails&opened&in&Outlook!&
Other&NTLM&trigger&silliness&
• Document&formats&
• Media&formats&
• Meeting/scheduling&related&formats&
&
What&did&our&work&focus&on?&
• Remote&image&
– No&warning,&no&NTLM&
• App.media.openPlayer()&
– Warning,&NTLM&possible&
• getURL()&
– Warning,&NTLM&possible&
PDF&
• Linked&document&on&UNC&share&
– Warning&(ignored),&NTLM&possible&
RTF&
• Remote&XML&stylesheets&
• Javascript&
SVG&(Scalable&Vector&Graphics)&
• All&these&formats&support&remote&media&
– Even&UNC&paths…&
M3U&/&PLS&/&ASX&
•  ID3&tag&
– LINK&frame&
– APIC&frame&
•  Not&supported&on&
any&major&player&we&
tested&!&
MP3&
•  URLANDEXIT&
•  Launches&default&browser&with&specified&URL&
•  DRM&functionality&abuse&
•  Subtitles&
•  Can&include&arbitrary&HTML&
ASF&(WMA/WMV/ASF)&
• HTTP&tracker&URLs&in&“announceFlist”&
– As&many&as&you&want&
• URL&seeds&allowed&in&“urlFlist”&
– Clients&can&implement&any&URL&handler&
• Must&support&one&or&both&of&HTTP&&&FTP&
– Not&universally&supported&
TORRENT&
• Free/Busy&URL&
– No&warning,&NTLM&possible&
– Requires&specific&actions&by&recipient&
VCF&(vCard&format)&
• VALARM&
– ATTACH&parameter&is&a&URL&
– AUDIO&and&PROCEDURE&alarm&types&
&
• ICS&is&the&iCalendar&format&
– Not&even&Calendar.app&will&let&you&accept&
PROCEDURE&!&
ICS&(iCalendar&format)&
• Email&
• Open&file&share&
• Watering&hole&
• P2P&distribution&
• Honeypot&
Delivery&methods&
• Dystopian&future&DRM&could&call&home&
– Probably&already&does&in&some&cases&
• Goes&beyond&deterrence&into&identification&
Digital&Rights&Management&
• Imagine&being&a&whistleblowerFtoFbe&
– In&a&fascist&country&
• The&document&you&exfiltrate&calls&home&
– From&your&work&computer&
– From&your&home&computer&
– From&your&friend’s&home&
– From&your&lawyer’s&office&
– From&a&journalist’s&office&
• You&get&disappeared&
&
Data&Loss&Prevention&
• Tor&Browser&only&routes&
browser&traffic&through&
Tor&
– External&programs&don’t&
route&through&Tor&
• You&don’t&control&that&
jihad&wiki&
– But&maybe&you&can&
upload&a&bugged&PDF&
DeFAnonymization&
• Windows&will&autoFauth&when&accessing&SMB&
• Files&can&in&some&cases&initiate&SMB&traffic&
– Embedding&remote&file://&resources&
– UNC&path&as&file&
– Javascript/other&active&content&
• NTLM&auth&can&be&cracked&or&relayed&
NTLM&Credential&Capture/Relay&
NTLM&overview&
Server&Client&
1.&Negotiate&
2.&Challenge&
3.&Authenticate&
NTLM&relay&overview&
Server&Client&
Attacker&
• Initiating&traffic&from&privileged&positions&is&fun&
– Exploit&router&vulns&
– Exploit&NAS/Printers&
– Exploit&IoT&devices&
CSRF&
• AV?&
– Too&many&formats&and&variations&
– Possibility&of&false&positives&
• Format&changes?&
– Too&much&inertia,&too&many&formats&
• ApplicationFlevel&firewalls?&
– Easy&for&RTF&
– Not&so&easy&for&M3U&
&
Possible&Mitigations&
•  Warnings?&
•  Proxychains&with&strict_chain&and&bad&proxy&
- Doesn’t&work&for&some&applications&
•  Egress&filtering?&
- Doesn’t&stop&internal&connections&
- Might&stop&legitimate&functionality&
Possible&Mitigations&
Questions?&
Daniel#Crowley,#Damon#Smith#

More Related Content

More from Felipe Prado

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsDEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Defcon 23 - daniel crowley and damon smith - bugged files