SlideShare a Scribd company logo
 This is the third year he’s done a GSM
  presentation
 Did a live demo on stage showing how to
  sniff, crack, and impersonate a phone
 A5/1 is dead AND improperly implemented
 A5/3 is better but will be cracked (still 64bit
  but a block cipher at least)
 A5/4 is legit biznitch but operators are lazy
 TMSI ~= username
 KC ~= password
 GSM != CDMA
 Mitigations:
    Implement padding randomization (blerg)
    SI5/SI6 randomization (Google TS 44.018)
    Implement A5/3
 Implementing  1 and 2 are “easy” and
 effectively stop 100% of current threats
Tools that they used:
 Osmocom – turns a phone into a GSM hacking
  tool
 CaptureCapture – turns Osmocon into an IDS
  for GSM attacks
 GSMMap.org – ratings of countries based on
  their GSM security
   Baseband = the chipset of the phone that
    handles telcoms
   Facilitates the bridge to accept AT commands
   Talks about Qualcom DIAG protocol
       Download mode WRITE and EXECUTE anywhere
        on the device
       Normal mode accepts commands to rw memory
        locations
   Blerg blerg blerg. Good data if you want to
    learn how to reverese your self but no output.
Print Me if you dare
 MSNBC: Millions of printers open to devastating hack
  attack
 Ars technica: HP Printers can be remotely controlled
  and set on fire
 Gawker: Hackers could turn your printer into a
  flaming death bomb
 Gizmodo: Can hackers really use your HP printer to
  steal your identity and blow up your house?
Print Me if you dare
 No bomb/fire
 56 firmwares were released to fix this flaw affecting
    2005-2011 CVE-2011-4161
   Found out that you can update the firmware with LPR
   Found out that this process did not use digital
    signatures or authentication
   PJL – printer job language
   Made a malicious remote firmware update in PJL
    launguage
   Can be used for phishing
Print Me if you dare
 Takes apart a printer and reviews the chips
 Downloads the datasheet for the flash chip (digikey)
 Learns how to talk to the chip
 Made an Arduino dumper for the ROM chip of the
  printer
 Runs output into IDA Pro
 ...Magic…
 Writes a vxworks rootkit – 3k of ARM assembly
Print Me if you dare
 Malware
    Reverse proxy – NAT traversal
    Print-job interceptor – send to another IP
    Debug message redirection – telnet
    Cause paper jams, “Control Controller”
 Summary:
    Made a rootkit to attack HP printers to use as a pivot for pen
     tests.
    Add RFU vulns to your pen tests (Not in Nessus, Nexpose
     yet). Run RFU for printer model. If the firmware changes =
     bad.
    Can be included in legit documents (post script)
CELLULAR PROTOCOL STACKS


              Awesome Intro To Mobile Protocols talk
           Unfortunately nothing about CDMA and America




Goes into GSM, GPRS, the history, why everything is fucked up, extremely
                              thorough
                         Got boring quickly
                             Passed out
CELLULAR PROTOCLS STACKS


           Is he still talking?
               Holy crap
He’s just naming 1000 acronyms now
      Punkrokk – do your joke
             Did he do it?
 Ok nevermind this talk was lame
      Here look at this instead:
• Presentation references “Over 9000” but it flies over the
  heads of all of Europe
• Created the tor_extend ruby library < neat
• Made a map of all the hidden routers < cute




Taking Over The Tor
Network
“Taking Over” The Tor Network
• Created Tor malware that exploits a DLL in a Windows
  box
• Did not release code
• Their malware implemented packet spinning which is an
  attack vector discussed in 2008
• Did not talk to Tor Project at all
• “This doesn’t work with the new version of Tor anymore”
• There are more
                                than 600 bridge
• They have found “all” 181
                                nodes
  bridge nodes                • There are only
• They have found Over          about 2500
  9000!!!1!! ORs

  “Taking Over” The Tor
  Network
• They made Windows malware and then used
  someone else’s attack then told the world they owned
  the Tor network
• Hilarious last 10 minutes of the presentation where
  Dingldine and IOError do a Q and A:
  • Can you tell me what’s new and relevant about your
    presentation?
  • Why didn’t you talk to us?
  • You published a lot of bridge nodes. Why do you want
    to hurt third world countries?
  • Why don’t you release the exploit?



“Taking Over” The Tor
Network
Dingldine: “UR STUPD I FUK
          UR FACE!”



“Taking Over” The Tor
Network
DOWNLOAD
All the things:
 http://mirror.fem-net.de/CCC/28C3/mp4-h264-HQ/
END

More Related Content

Viewers also liked

0x20 hack
0x20 hack0x20 hack
0x20 hack
antitree
 
Docker Security
Docker SecurityDocker Security
Docker Security
antitree
 
Nsa and vpn
Nsa and vpnNsa and vpn
Nsa and vpn
antitree
 
Just Mouse Jack Init
Just Mouse Jack InitJust Mouse Jack Init
Just Mouse Jack Init
antitree
 
Salander v bond 2600
Salander v bond 2600Salander v bond 2600
Salander v bond 2600
antitree
 
Reinventing anon email
Reinventing anon emailReinventing anon email
Reinventing anon email
antitree
 
Laverna vs etherpad
Laverna vs etherpadLaverna vs etherpad
Laverna vs etherpad
antitree
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
antitree
 
State of wifi_2016
State of wifi_2016State of wifi_2016
State of wifi_2016
antitree
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
antitree
 
Introduction to ethereum_public
Introduction to ethereum_publicIntroduction to ethereum_public
Introduction to ethereum_public
antitree
 

Viewers also liked (11)

0x20 hack
0x20 hack0x20 hack
0x20 hack
 
Docker Security
Docker SecurityDocker Security
Docker Security
 
Nsa and vpn
Nsa and vpnNsa and vpn
Nsa and vpn
 
Just Mouse Jack Init
Just Mouse Jack InitJust Mouse Jack Init
Just Mouse Jack Init
 
Salander v bond 2600
Salander v bond 2600Salander v bond 2600
Salander v bond 2600
 
Reinventing anon email
Reinventing anon emailReinventing anon email
Reinventing anon email
 
Laverna vs etherpad
Laverna vs etherpadLaverna vs etherpad
Laverna vs etherpad
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
State of wifi_2016
State of wifi_2016State of wifi_2016
State of wifi_2016
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Introduction to ethereum_public
Introduction to ethereum_publicIntroduction to ethereum_public
Introduction to ethereum_public
 

Similar to 28c3 in 15

Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
ratnalajaggu
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
qqlan
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Shakacon
 
Jabber 101
Jabber 101Jabber 101
Jabber 101
stpeter
 
Sectools
SectoolsSectools
Sectools
securedome
 
aaa
aaaaaa
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
Internet Technology for the Commodore 64
Internet Technology for the Commodore 64Internet Technology for the Commodore 64
Internet Technology for the Commodore 64
Leif Bloomquist
 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
Thierry Zoller
 
All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.
Thierry Zoller
 
BruCON 2010 Lightning Talks - DIY Grid Computing
BruCON 2010 Lightning Talks - DIY Grid ComputingBruCON 2010 Lightning Talks - DIY Grid Computing
BruCON 2010 Lightning Talks - DIY Grid Computing
tomaszmiklas
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
Felipe Prado
 
The internet of $h1t
The internet of $h1tThe internet of $h1t
The internet of $h1t
Amit Serper
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Killer Bugs From Outer Space
Killer Bugs From Outer SpaceKiller Bugs From Outer Space
Killer Bugs From Outer Space
Jérôme Petazzoni
 
Kamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuffKamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuff
Olle E Johansson
 
Artillery Duel Network
Artillery Duel NetworkArtillery Duel Network
Artillery Duel Network
Leif Bloomquist
 

Similar to 28c3 in 15 (20)

Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
Jabber 101
Jabber 101Jabber 101
Jabber 101
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Internet Technology for the Commodore 64
Internet Technology for the Commodore 64Internet Technology for the Commodore 64
Internet Technology for the Commodore 64
 
Hack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
 
All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.
 
BruCON 2010 Lightning Talks - DIY Grid Computing
BruCON 2010 Lightning Talks - DIY Grid ComputingBruCON 2010 Lightning Talks - DIY Grid Computing
BruCON 2010 Lightning Talks - DIY Grid Computing
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
 
The internet of $h1t
The internet of $h1tThe internet of $h1t
The internet of $h1t
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Killer Bugs From Outer Space
Killer Bugs From Outer SpaceKiller Bugs From Outer Space
Killer Bugs From Outer Space
 
Kamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuffKamailio World 2018: Having fun with new stuff
Kamailio World 2018: Having fun with new stuff
 
Artillery Duel Network
Artillery Duel NetworkArtillery Duel Network
Artillery Duel Network
 

More from antitree

Hardening ssh configurations
Hardening ssh configurationsHardening ssh configurations
Hardening ssh configurations
antitree
 
Salander v bond b sides detroit final v3
Salander v bond b sides detroit final v3Salander v bond b sides detroit final v3
Salander v bond b sides detroit final v3antitree
 
Pentesting embedded
Pentesting embeddedPentesting embedded
Pentesting embeddedantitree
 
Tor
TorTor
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
antitree
 
Lock picking barcamp
Lock picking barcampLock picking barcamp
Lock picking barcamp
antitree
 
Lock picking 2600
Lock picking 2600Lock picking 2600
Lock picking 2600
antitree
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheep
antitree
 
Hackerspaces
HackerspacesHackerspaces
Hackerspaces
antitree
 
Intro to IPv6 by Ben Woodruff
Intro to IPv6 by Ben WoodruffIntro to IPv6 by Ben Woodruff
Intro to IPv6 by Ben Woodruff
antitree
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
antitree
 
Dll hijacking
Dll hijackingDll hijacking
Dll hijacking
antitree
 

More from antitree (12)

Hardening ssh configurations
Hardening ssh configurationsHardening ssh configurations
Hardening ssh configurations
 
Salander v bond b sides detroit final v3
Salander v bond b sides detroit final v3Salander v bond b sides detroit final v3
Salander v bond b sides detroit final v3
 
Pentesting embedded
Pentesting embeddedPentesting embedded
Pentesting embedded
 
Tor
TorTor
Tor
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Lock picking barcamp
Lock picking barcampLock picking barcamp
Lock picking barcamp
 
Lock picking 2600
Lock picking 2600Lock picking 2600
Lock picking 2600
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheep
 
Hackerspaces
HackerspacesHackerspaces
Hackerspaces
 
Intro to IPv6 by Ben Woodruff
Intro to IPv6 by Ben WoodruffIntro to IPv6 by Ben Woodruff
Intro to IPv6 by Ben Woodruff
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Dll hijacking
Dll hijackingDll hijacking
Dll hijacking
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

28c3 in 15

  • 1.
  • 2.  This is the third year he’s done a GSM presentation  Did a live demo on stage showing how to sniff, crack, and impersonate a phone  A5/1 is dead AND improperly implemented  A5/3 is better but will be cracked (still 64bit but a block cipher at least)  A5/4 is legit biznitch but operators are lazy
  • 3.  TMSI ~= username  KC ~= password  GSM != CDMA  Mitigations:  Implement padding randomization (blerg)  SI5/SI6 randomization (Google TS 44.018)  Implement A5/3  Implementing 1 and 2 are “easy” and effectively stop 100% of current threats
  • 4. Tools that they used:  Osmocom – turns a phone into a GSM hacking tool  CaptureCapture – turns Osmocon into an IDS for GSM attacks  GSMMap.org – ratings of countries based on their GSM security
  • 5. Baseband = the chipset of the phone that handles telcoms  Facilitates the bridge to accept AT commands  Talks about Qualcom DIAG protocol  Download mode WRITE and EXECUTE anywhere on the device  Normal mode accepts commands to rw memory locations  Blerg blerg blerg. Good data if you want to learn how to reverese your self but no output.
  • 6. Print Me if you dare  MSNBC: Millions of printers open to devastating hack attack  Ars technica: HP Printers can be remotely controlled and set on fire  Gawker: Hackers could turn your printer into a flaming death bomb  Gizmodo: Can hackers really use your HP printer to steal your identity and blow up your house?
  • 7. Print Me if you dare  No bomb/fire  56 firmwares were released to fix this flaw affecting 2005-2011 CVE-2011-4161  Found out that you can update the firmware with LPR  Found out that this process did not use digital signatures or authentication  PJL – printer job language  Made a malicious remote firmware update in PJL launguage  Can be used for phishing
  • 8. Print Me if you dare  Takes apart a printer and reviews the chips  Downloads the datasheet for the flash chip (digikey)  Learns how to talk to the chip  Made an Arduino dumper for the ROM chip of the printer  Runs output into IDA Pro  ...Magic…  Writes a vxworks rootkit – 3k of ARM assembly
  • 9. Print Me if you dare  Malware  Reverse proxy – NAT traversal  Print-job interceptor – send to another IP  Debug message redirection – telnet  Cause paper jams, “Control Controller”  Summary:  Made a rootkit to attack HP printers to use as a pivot for pen tests.  Add RFU vulns to your pen tests (Not in Nessus, Nexpose yet). Run RFU for printer model. If the firmware changes = bad.  Can be included in legit documents (post script)
  • 10. CELLULAR PROTOCOL STACKS Awesome Intro To Mobile Protocols talk Unfortunately nothing about CDMA and America Goes into GSM, GPRS, the history, why everything is fucked up, extremely thorough Got boring quickly Passed out
  • 11. CELLULAR PROTOCLS STACKS Is he still talking? Holy crap He’s just naming 1000 acronyms now Punkrokk – do your joke Did he do it? Ok nevermind this talk was lame Here look at this instead:
  • 12. • Presentation references “Over 9000” but it flies over the heads of all of Europe • Created the tor_extend ruby library < neat • Made a map of all the hidden routers < cute Taking Over The Tor Network
  • 13.
  • 14. “Taking Over” The Tor Network • Created Tor malware that exploits a DLL in a Windows box • Did not release code • Their malware implemented packet spinning which is an attack vector discussed in 2008 • Did not talk to Tor Project at all • “This doesn’t work with the new version of Tor anymore”
  • 15. • There are more than 600 bridge • They have found “all” 181 nodes bridge nodes • There are only • They have found Over about 2500 9000!!!1!! ORs “Taking Over” The Tor Network
  • 16. • They made Windows malware and then used someone else’s attack then told the world they owned the Tor network • Hilarious last 10 minutes of the presentation where Dingldine and IOError do a Q and A: • Can you tell me what’s new and relevant about your presentation? • Why didn’t you talk to us? • You published a lot of bridge nodes. Why do you want to hurt third world countries? • Why don’t you release the exploit? “Taking Over” The Tor Network
  • 17. Dingldine: “UR STUPD I FUK UR FACE!” “Taking Over” The Tor Network
  • 18. DOWNLOAD All the things:  http://mirror.fem-net.de/CCC/28C3/mp4-h264-HQ/
  • 19. END