SlideShare a Scribd company logo
1 of 35
Build Your Own Physical
Pentesting Go-Bag
Beau Bullock - @dafthack
Derek Banks - @0xderuke
Overview
• Attackers commonly try attacking
organizations remotely first
• Phishing Attacks
• Exploiting vulnerabilities in
externally facing systems
• External credential dumps
• Etc.
• If these fail, physical attacks are
required
Overview
• Having the right tools in the
physical attack toolkit can
determine success or failure
• Simply “getting in” is not enough
• What happens after one is inside
an organization can make or
break an operation
• We wanted to share what our
physical pentesting go-bags look
like
About Us
• Pentesters at Black Hills
Information Security
• Have a number of SANS and
OffSec certs…
• CitySec Meetup Organizers
• CigarCitySec – (Tampa, FL)
• CitrusSec – (Orlando, FL
• TidewaterSec – (Poquoson, VA)
• Avid OWA enthusiasts
Go-Bag
Where are we storing our gear?
Choose a Quality Bag
• Totally a personal preference
• Weatherproofing
• GoRuck bags are top notch (but a bit expensive)
• Built in USA
• Scars Lifetime Guarantee
• Must comfortably hold all the gear
“Remote” Physical Attacks
Sometimes, devices can make their way into organizations
USB Drop
• Most employees are “very
concerned” with things like
budgets and payroll
• Dropping USB’s with “sensitive
data” in a parking lot gets shells
• Macro-enabled docs and
spreadsheets are still king
• We are fans on PowerShell
Empire payloads
Backdoored Streaming
Media Devices
• People enjoy gifts
• Streaming media devices require
Internet
• Corp WiFi networks seem to be a
good place to plugin new gifts
• So, I backdoored an Amazon Fire
Stick
• It calls back to a C2 server
providing a remote shell
Wireless Hacking
Can we attack the network over wireless frequencies?
Wireless Gear
• Alfa Cards (AWUS036H)
• Yagi Antenna
• Ubertooth One
• WiFi Pineapple
• HackRF One
• Etc.
Gaining Access
Physical Exploitation Methods
Get-Out-of-Jail-Free Card
• Probably the most important
thing.
• Needed to ensure your
authorized pentest doesn’t land
you in jail
• But, you can spoof these too
• Change security contact info to
someone on your team
Social Engineering
• Simply walking into buildings works sometimes
• The printer really needs paper…
• Having a good ruse is key though
• Tailgating
• Just knocking
• Seriously, this has worked for me.
• Much more in depth topic than can be covered quickly
Lock Picks
• Having a good set of lock picks is
a must
• Some quality brands:
• Sparrows
• SouthOrd
• Toool
• Practice, practice, practice
• Shims
Bypassing Devices
• Compressed Air
• Under the Door Tool
• Credit card trick
• Whiskey
• Etc.
RFID Cloning
• Misplaced belief in the security of RFID access control
• Many types of RFID access devices and protocols
• Can be confusing getting started
• Field usable cloning device examples:
• BLEKey
• ESPKey
• Proxmark3
• Bishop Fox Tastic RFID Theif
RFID Access Control
• Consists of a reader that energizes a tag that returns a signal
• Return signal contains encoded information over a protocol
• Common RFID Frequencies
• Low Frequency (LF) – 125KHz
• HID Prox, EM
• High Frequency (HF) – 13.56 MHz
• MiFare, HID iClass
• Wiegand most common format
BLEKey
• Physical tap for the Wiegand protocol
• Presented at BlackHat 2015
• Uses Bluetooth Low Energy to communicate
• Sniffed data can be offloaded to an app
• App can replay signal granting access
https://github.com/linklayer/BLEKey
ESPKey
• Physical tap that communicates over WiFi
• Presented at Shmoocon 2017
• Implantable Logic Analyzers and Unlocking Doors – Kenny McElroy
• Stands up WiFi hot spot and has a web interface
• Draws power from the card reader
• Not quite for sale yet…
https://archive.org/details/ShmooCon2017
Proxmark3 RDV2 Kit
• Portable RFID sniffing/reading/cloning
• Pretend to be a reader or a tag
• Both LF and HF antennae included
• Need to be relatively close to badge
• Can be operated on battery or be powered via USB
• Works with Kali NetHunter
Bishop Fox Tastic
• Long range RFID reader
• On your own to replay to card reader
• Targets 125KHz systems such as HID Prox
and Indala Prox
• Code and parts list available for free online
• Uses Arduino and long range card reader
https://www.bishopfox.com/resources/tools/rfid-
hacking/attack-tools/
Post Access Exploitation
You’re in. Now what?
Pentest Dropbox
• Fully functional pentesting device
• Persistent reverse SSH tunnel
• Can be controlled over WiFi
• Relatively unnoticeable
• ODROID-C2 build instructions
here:
• http://www.blackhillsinfosec.com/
?p=5156
NAC Bypass Device
• Layer 2 and 3 NAT – Helps avoid
triggering port security rules on
802.1X
• Insert “between” wall and valid
system
• Device spoofs both sides of wire
• Passively learns MAC addresses
• Current build is a Beaglebone
Black
Kon-Boot
• Bypass authentication on many
systems
• Boot to Kon-boot USB or CD
• After getting in you could:
• Dump local hashes
• Add a new admin user
• Get a shell
• Doesn’t work on encrypted HD’s
Wi-Fi Keylogger
• Insert between keyboard and PC
• Connects to an AP specified by us
• Retrieve keys from LAN
connection
• Can email a report every hour
• Keys are stored locally as well
• 4 GB of storage
• Hardly noticeable
PoisonTap
• Emulates an Ethernet device over
USB
• Intercepts all Internet traffic
• Is able to sniff HTTP cookies and
sessions from the browser
• Can be used
• Can be used on a locked machine
LAN Turtle
• “Generic Housing” USB Device that out of the box that provides
• Remote Access
• Network Intelligence
• Man-in-the Middle Monitoring
• Community Module Framework
• Credential grabbing from locked computer
• Thanks @mubix!
HID Attack – Rubber Ducky
• USB Human Interface Device (HID) Keyboard Injection Attack Platform
• From HAK5’s Hakshop
• Takes advantage of inherent trust of connected keyboard devices
• Payloads in the form of scripts then encoded to SD card
• Pre-configured payloads available
• Works on most platform
Kali NetHunter
• Kali Linux on a mobile device
• Android ROM Overlay
• Builds available for Nexus, OnePlus, as well other devices
• Chroot environment with multiple options from minimal to full Kali installs
• HID Attacks (DuckHunter)
• MANA Evil Access Point
• BadUSB Attacks
• Cost – Variable
Kali NetHunter
(Ducky HID Attack)
DEMO!
Conclusion
• There’s a lot more to compromising an organization than just getting
in the door… And there is usually more than one door.
• Preparing for different situations before going on-site is a must.
• Include tools in your go-bag to help you succeed in each scenario.
• One last tip:
• Do recon on the target location prior to getting there. Use Google maps to
locate entrances; Use Wigle to determine possible WiFi SSIDs.
Gear List
• GoRuck bag
• Get-Out-of-Jail-Free Card
• “Remote” Physical Attack Tools
• USB’s for USB drop
• Backdoored Amazon Fire Stick
• Wireless Gear
• Alfa Cards (AWUS036H)
• Yagi Antenna
• Ubertooth One
• WiFi Pineapple
• HackRF One
• Physical Exploitation Tools
• Lock Picks
• Compressed Air
• Under the Door Tool
• Badge Cloning Devices
• Proxmark3 RDV2
• BLEKey
• ESPKey
• Bishop Fox Tastic RFID Thief
• Post-Access Exploitation
• Pentest Dropbox
• NAC Bypass Device
• Kon-Boot
• Wi-Fi Keylogger
• PoisonTap
• LAN Turtles
• Rubber Duckys
• Post-Access Exploitation Cont.
• Kali Nethunter
• Laptop
• Additional Tools
• Powered Screwdriver
• Flashlight
• Cat-5 Cables
• Battery Packs for mobile
devices
• USB On-The-Go Cable
• Throwing star LAN Tap (or real
throwing stars)
Summary and Conclusions
• Black Hills Information Security
• http://www.blackhillsinfosec.com/
• @BHInfoSecurity
• Beau Bullock @dafthack
• Derek Banks @0xderuke
• Questions?

More Related Content

What's hot

Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suitejasonhaddix
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?Yurii Bilyk
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Hossam .M Hamed
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigLive Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigFrans Rosén
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) securityNahidul Kibria
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodologybugcrowd
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingPriyanka Aash
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016Frans Rosén
 

What's hot (20)

Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?XSS - Do you know EVERYTHING?
XSS - Do you know EVERYTHING?
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Web vulnerabilities
Web vulnerabilitiesWeb vulnerabilities
Web vulnerabilities
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigLive Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 
Incident response
Incident responseIncident response
Incident response
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 

Viewers also liked

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...OWASP Turkiye
 
TMForum Open Hack Opening Session - FIWARE
TMForum Open Hack Opening Session - FIWARETMForum Open Hack Opening Session - FIWARE
TMForum Open Hack Opening Session - FIWAREAitor Magán García
 
Starting with mobile application pen testing
Starting with mobile application pen testingStarting with mobile application pen testing
Starting with mobile application pen testingStephanie Vanroelen
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Featuresxabean
 
Identificando y rompiendo servicios de las 4 capas de TCP/IP
Identificando y rompiendo servicios de las 4 capas de TCP/IPIdentificando y rompiendo servicios de las 4 capas de TCP/IP
Identificando y rompiendo servicios de las 4 capas de TCP/IPDaniel Garcia (a.k.a cr0hn)
 
Agile UX Practitioners Survey
Agile UX Practitioners SurveyAgile UX Practitioners Survey
Agile UX Practitioners SurveyJohn Knight
 
CAS2016 - Teams Evolution Models
CAS2016 - Teams Evolution ModelsCAS2016 - Teams Evolution Models
CAS2016 - Teams Evolution ModelsIsrael Alcazar
 
March 2017 ICF Colorado Newsletter
March 2017 ICF Colorado NewsletterMarch 2017 ICF Colorado Newsletter
March 2017 ICF Colorado NewsletterICF Colorado
 
The 3rd International Summit of Zero Suicide in Healthcare
The 3rd International Summit of Zero Suicide in HealthcareThe 3rd International Summit of Zero Suicide in Healthcare
The 3rd International Summit of Zero Suicide in HealthcareDavid Covington
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 
Designing Meaningful Animation
Designing Meaningful AnimationDesigning Meaningful Animation
Designing Meaningful AnimationVal Head
 
Startup Turkey 2017 - Samar Singla
Startup Turkey 2017 - Samar SinglaStartup Turkey 2017 - Samar Singla
Startup Turkey 2017 - Samar SinglaStartup Turkey
 
We Need to Talk: Are We Making the Right Connections?
We Need to Talk: Are We Making the Right Connections?We Need to Talk: Are We Making the Right Connections?
We Need to Talk: Are We Making the Right Connections?Mark Brown
 
Exercise and cancer: How staying active can positively impact your health and...
Exercise and cancer: How staying active can positively impact your health and...Exercise and cancer: How staying active can positively impact your health and...
Exercise and cancer: How staying active can positively impact your health and...Inspire
 
Content marketing : Stratégie webinar avec speakr.co
Content marketing : Stratégie webinar avec speakr.co Content marketing : Stratégie webinar avec speakr.co
Content marketing : Stratégie webinar avec speakr.co Zaby KARIMI
 
Opinieartikel FD: Nederlandse pensioensector staat met rug naar Europa
Opinieartikel FD: Nederlandse pensioensector staat met rug naar EuropaOpinieartikel FD: Nederlandse pensioensector staat met rug naar Europa
Opinieartikel FD: Nederlandse pensioensector staat met rug naar EuropaJeroen de Bruin
 

Viewers also liked (20)

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Bahtiyar Bircan - PwnPhone: Cepteki ...
 
TMForum Open Hack Opening Session - FIWARE
TMForum Open Hack Opening Session - FIWARETMForum Open Hack Opening Session - FIWARE
TMForum Open Hack Opening Session - FIWARE
 
Starting with mobile application pen testing
Starting with mobile application pen testingStarting with mobile application pen testing
Starting with mobile application pen testing
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Features
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Identificando y rompiendo servicios de las 4 capas de TCP/IP
Identificando y rompiendo servicios de las 4 capas de TCP/IPIdentificando y rompiendo servicios de las 4 capas de TCP/IP
Identificando y rompiendo servicios de las 4 capas de TCP/IP
 
Agile UX Practitioners Survey
Agile UX Practitioners SurveyAgile UX Practitioners Survey
Agile UX Practitioners Survey
 
CAS2016 - Teams Evolution Models
CAS2016 - Teams Evolution ModelsCAS2016 - Teams Evolution Models
CAS2016 - Teams Evolution Models
 
March 2017 ICF Colorado Newsletter
March 2017 ICF Colorado NewsletterMarch 2017 ICF Colorado Newsletter
March 2017 ICF Colorado Newsletter
 
The 3rd International Summit of Zero Suicide in Healthcare
The 3rd International Summit of Zero Suicide in HealthcareThe 3rd International Summit of Zero Suicide in Healthcare
The 3rd International Summit of Zero Suicide in Healthcare
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Designing Meaningful Animation
Designing Meaningful AnimationDesigning Meaningful Animation
Designing Meaningful Animation
 
Startup Turkey 2017 - Samar Singla
Startup Turkey 2017 - Samar SinglaStartup Turkey 2017 - Samar Singla
Startup Turkey 2017 - Samar Singla
 
We Need to Talk: Are We Making the Right Connections?
We Need to Talk: Are We Making the Right Connections?We Need to Talk: Are We Making the Right Connections?
We Need to Talk: Are We Making the Right Connections?
 
Exercise and cancer: How staying active can positively impact your health and...
Exercise and cancer: How staying active can positively impact your health and...Exercise and cancer: How staying active can positively impact your health and...
Exercise and cancer: How staying active can positively impact your health and...
 
Content marketing : Stratégie webinar avec speakr.co
Content marketing : Stratégie webinar avec speakr.co Content marketing : Stratégie webinar avec speakr.co
Content marketing : Stratégie webinar avec speakr.co
 
Una colección del siglo XXI
Una colección del siglo XXIUna colección del siglo XXI
Una colección del siglo XXI
 
Idomeni Laundromat de Ai Weiwei
Idomeni Laundromat de Ai WeiweiIdomeni Laundromat de Ai Weiwei
Idomeni Laundromat de Ai Weiwei
 
Proyecto ASHYI
Proyecto ASHYI Proyecto ASHYI
Proyecto ASHYI
 
Opinieartikel FD: Nederlandse pensioensector staat met rug naar Europa
Opinieartikel FD: Nederlandse pensioensector staat met rug naar EuropaOpinieartikel FD: Nederlandse pensioensector staat met rug naar Europa
Opinieartikel FD: Nederlandse pensioensector staat met rug naar Europa
 

Similar to How to Build Your Own Physical Pentesting Go-bag

Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devicesYashin Mehaboobe
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Kirill Ermakov
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheelsinfodox
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]SiddheshPowar
 
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorSocially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorMike Felch
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Paul Haskell-Dowland
 

Similar to How to Build Your Own Physical Pentesting Go-bag (20)

Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devices
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheels
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
Internet security
Internet securityInternet security
Internet security
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorSocially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front Door
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 

More from Beau Bullock

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingBeau Bullock
 
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureGetting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureBeau Bullock
 
Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Beau Bullock
 
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorTravelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorBeau Bullock
 
Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Beau Bullock
 
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Beau Bullock
 
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Beau Bullock
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?Beau Bullock
 
Red Team Apocalypse
Red Team ApocalypseRed Team Apocalypse
Red Team ApocalypseBeau Bullock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
A Google Event You Won't Forget
A Google Event You Won't ForgetA Google Event You Won't Forget
A Google Event You Won't ForgetBeau Bullock
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellBeau Bullock
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionBeau Bullock
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to BlackBeau Bullock
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Pentest Apocalypse
Pentest ApocalypsePentest Apocalypse
Pentest ApocalypseBeau Bullock
 

More from Beau Bullock (16)

Getting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract AuditingGetting Started in Blockchain Security and Smart Contract Auditing
Getting Started in Blockchain Security and Smart Contract Auditing
 
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: AzureGetting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: Azure
 
Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!
 
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorTravelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front Door
 
Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)Red Team Apocalypse - BSides Peru (En español)
Red Team Apocalypse - BSides Peru (En español)
 
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
 
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
 
Red Team Apocalypse
Red Team ApocalypseRed Team Apocalypse
Red Team Apocalypse
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Google Event You Won't Forget
A Google Event You Won't ForgetA Google Event You Won't Forget
A Google Event You Won't Forget
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShell
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to Black
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Pentest Apocalypse
Pentest ApocalypsePentest Apocalypse
Pentest Apocalypse
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

How to Build Your Own Physical Pentesting Go-bag

  • 1. Build Your Own Physical Pentesting Go-Bag Beau Bullock - @dafthack Derek Banks - @0xderuke
  • 2. Overview • Attackers commonly try attacking organizations remotely first • Phishing Attacks • Exploiting vulnerabilities in externally facing systems • External credential dumps • Etc. • If these fail, physical attacks are required
  • 3. Overview • Having the right tools in the physical attack toolkit can determine success or failure • Simply “getting in” is not enough • What happens after one is inside an organization can make or break an operation • We wanted to share what our physical pentesting go-bags look like
  • 4. About Us • Pentesters at Black Hills Information Security • Have a number of SANS and OffSec certs… • CitySec Meetup Organizers • CigarCitySec – (Tampa, FL) • CitrusSec – (Orlando, FL • TidewaterSec – (Poquoson, VA) • Avid OWA enthusiasts
  • 5. Go-Bag Where are we storing our gear?
  • 6. Choose a Quality Bag • Totally a personal preference • Weatherproofing • GoRuck bags are top notch (but a bit expensive) • Built in USA • Scars Lifetime Guarantee • Must comfortably hold all the gear
  • 7. “Remote” Physical Attacks Sometimes, devices can make their way into organizations
  • 8. USB Drop • Most employees are “very concerned” with things like budgets and payroll • Dropping USB’s with “sensitive data” in a parking lot gets shells • Macro-enabled docs and spreadsheets are still king • We are fans on PowerShell Empire payloads
  • 9. Backdoored Streaming Media Devices • People enjoy gifts • Streaming media devices require Internet • Corp WiFi networks seem to be a good place to plugin new gifts • So, I backdoored an Amazon Fire Stick • It calls back to a C2 server providing a remote shell
  • 10. Wireless Hacking Can we attack the network over wireless frequencies?
  • 11. Wireless Gear • Alfa Cards (AWUS036H) • Yagi Antenna • Ubertooth One • WiFi Pineapple • HackRF One • Etc.
  • 13. Get-Out-of-Jail-Free Card • Probably the most important thing. • Needed to ensure your authorized pentest doesn’t land you in jail • But, you can spoof these too • Change security contact info to someone on your team
  • 14. Social Engineering • Simply walking into buildings works sometimes • The printer really needs paper… • Having a good ruse is key though • Tailgating • Just knocking • Seriously, this has worked for me. • Much more in depth topic than can be covered quickly
  • 15. Lock Picks • Having a good set of lock picks is a must • Some quality brands: • Sparrows • SouthOrd • Toool • Practice, practice, practice • Shims
  • 16. Bypassing Devices • Compressed Air • Under the Door Tool • Credit card trick • Whiskey • Etc.
  • 17. RFID Cloning • Misplaced belief in the security of RFID access control • Many types of RFID access devices and protocols • Can be confusing getting started • Field usable cloning device examples: • BLEKey • ESPKey • Proxmark3 • Bishop Fox Tastic RFID Theif
  • 18. RFID Access Control • Consists of a reader that energizes a tag that returns a signal • Return signal contains encoded information over a protocol • Common RFID Frequencies • Low Frequency (LF) – 125KHz • HID Prox, EM • High Frequency (HF) – 13.56 MHz • MiFare, HID iClass • Wiegand most common format
  • 19. BLEKey • Physical tap for the Wiegand protocol • Presented at BlackHat 2015 • Uses Bluetooth Low Energy to communicate • Sniffed data can be offloaded to an app • App can replay signal granting access https://github.com/linklayer/BLEKey
  • 20. ESPKey • Physical tap that communicates over WiFi • Presented at Shmoocon 2017 • Implantable Logic Analyzers and Unlocking Doors – Kenny McElroy • Stands up WiFi hot spot and has a web interface • Draws power from the card reader • Not quite for sale yet… https://archive.org/details/ShmooCon2017
  • 21. Proxmark3 RDV2 Kit • Portable RFID sniffing/reading/cloning • Pretend to be a reader or a tag • Both LF and HF antennae included • Need to be relatively close to badge • Can be operated on battery or be powered via USB • Works with Kali NetHunter
  • 22. Bishop Fox Tastic • Long range RFID reader • On your own to replay to card reader • Targets 125KHz systems such as HID Prox and Indala Prox • Code and parts list available for free online • Uses Arduino and long range card reader https://www.bishopfox.com/resources/tools/rfid- hacking/attack-tools/
  • 24. Pentest Dropbox • Fully functional pentesting device • Persistent reverse SSH tunnel • Can be controlled over WiFi • Relatively unnoticeable • ODROID-C2 build instructions here: • http://www.blackhillsinfosec.com/ ?p=5156
  • 25. NAC Bypass Device • Layer 2 and 3 NAT – Helps avoid triggering port security rules on 802.1X • Insert “between” wall and valid system • Device spoofs both sides of wire • Passively learns MAC addresses • Current build is a Beaglebone Black
  • 26. Kon-Boot • Bypass authentication on many systems • Boot to Kon-boot USB or CD • After getting in you could: • Dump local hashes • Add a new admin user • Get a shell • Doesn’t work on encrypted HD’s
  • 27. Wi-Fi Keylogger • Insert between keyboard and PC • Connects to an AP specified by us • Retrieve keys from LAN connection • Can email a report every hour • Keys are stored locally as well • 4 GB of storage • Hardly noticeable
  • 28. PoisonTap • Emulates an Ethernet device over USB • Intercepts all Internet traffic • Is able to sniff HTTP cookies and sessions from the browser • Can be used • Can be used on a locked machine
  • 29. LAN Turtle • “Generic Housing” USB Device that out of the box that provides • Remote Access • Network Intelligence • Man-in-the Middle Monitoring • Community Module Framework • Credential grabbing from locked computer • Thanks @mubix!
  • 30. HID Attack – Rubber Ducky • USB Human Interface Device (HID) Keyboard Injection Attack Platform • From HAK5’s Hakshop • Takes advantage of inherent trust of connected keyboard devices • Payloads in the form of scripts then encoded to SD card • Pre-configured payloads available • Works on most platform
  • 31. Kali NetHunter • Kali Linux on a mobile device • Android ROM Overlay • Builds available for Nexus, OnePlus, as well other devices • Chroot environment with multiple options from minimal to full Kali installs • HID Attacks (DuckHunter) • MANA Evil Access Point • BadUSB Attacks • Cost – Variable
  • 32. Kali NetHunter (Ducky HID Attack) DEMO!
  • 33. Conclusion • There’s a lot more to compromising an organization than just getting in the door… And there is usually more than one door. • Preparing for different situations before going on-site is a must. • Include tools in your go-bag to help you succeed in each scenario. • One last tip: • Do recon on the target location prior to getting there. Use Google maps to locate entrances; Use Wigle to determine possible WiFi SSIDs.
  • 34. Gear List • GoRuck bag • Get-Out-of-Jail-Free Card • “Remote” Physical Attack Tools • USB’s for USB drop • Backdoored Amazon Fire Stick • Wireless Gear • Alfa Cards (AWUS036H) • Yagi Antenna • Ubertooth One • WiFi Pineapple • HackRF One • Physical Exploitation Tools • Lock Picks • Compressed Air • Under the Door Tool • Badge Cloning Devices • Proxmark3 RDV2 • BLEKey • ESPKey • Bishop Fox Tastic RFID Thief • Post-Access Exploitation • Pentest Dropbox • NAC Bypass Device • Kon-Boot • Wi-Fi Keylogger • PoisonTap • LAN Turtles • Rubber Duckys • Post-Access Exploitation Cont. • Kali Nethunter • Laptop • Additional Tools • Powered Screwdriver • Flashlight • Cat-5 Cables • Battery Packs for mobile devices • USB On-The-Go Cable • Throwing star LAN Tap (or real throwing stars)
  • 35. Summary and Conclusions • Black Hills Information Security • http://www.blackhillsinfosec.com/ • @BHInfoSecurity • Beau Bullock @dafthack • Derek Banks @0xderuke • Questions?