SlideShare a Scribd company logo
PwC
Becoming
The Quiz
Master:
Thanks RE
Jack S (linkcabin)
PwCPwC
@linkcabin
whoami
• Threat intelligence analyst for PwC – APT focused
• Studied cyber security at university
• Previously done talks on OSINT at Bsides London and
DEEPINTEL
• Likes reverse engineering and understanding complex
systems
• Big fan of philosophy, politics and English football!
2
#intelligentdigital
PwCPwC
How it began
Pub quiz
machines
are cool
3
Intelligent Digital
PwCPwC
Gambling as a job?
4
Intelligent Digital
PwCPwC
The machine
Machine freeze
The machine froze, a restart was required. I learnt about
the system environment from its reboot.
It’s Windows 2000
5
Intelligent Digital
PwCPwC
Acquiring the machine?
We could acquire by simply buying one, they are available
for purchase on websites online.
6
Intelligent Digital
PwCPwC
Space
Pretty sure I don’t have space
for a quiz machine in London,
so I took an alternative route
7
Intelligent Digital
Understanding the machine better
Software updates are
distributed on their
site, much like routers,
so I just downloaded it.
PwCPwC
What I did for 3 months
8
Intelligent Digital
Morning/During Work After dinner
PwCPwC
The machine
What's in the box
Software updates are packaged in an archive
Every update contains a executable called setup.exe in the
binary which installs the update
File updates are packaged in archives within the original
archive and are password protected
Developer hoped no one would be able to reverse engineer
the binary to get the passwords!
9
Intelligent Digital
PwCPwC
Passwords are in the ini
Grabbing the passwords
Passwords were held in a encrypted ini file
Setup.exe decrypted the file contents during installation
process
10
Intelligent Digital
PwCPwC
Batch + interpreter?
Interpreting [instructions]
Decrypted contents was a batch file with some more
features, unique looking!
11
Intelligent Digital
PwCPwC
Batch with 7z command line
7zip command line reveals the password
Allows us to understand the environments these binaries
are run
Gives us the password to system and game files which are
updated!
12
Intelligent Digital
PwCPwC
Config file validation
_memcmp GWENC please
Decrypts and validates it by checking the first five bytes
are ‘GWENC’
13
Intelligent Digital
PwCPwC
Crypto mystery
Working out crypto algorithms is hard
Open SSL library is used in the binary
Could not identify the cryptographic algorithm, accepted
two quad words into the main decryption function.
14
Intelligent Digital
PwCPwC
Crypto mystery
Working out crypto algorithms is hard
Static values are set as 0xE50C6C538E615259 and
0x61A468D10E3CB77F.
Another constant used in the algorithm
1953184666628070171
A mixture of bit shifting, XOR and AND operations in
algorithm
15
Intelligent Digital
PwCPwC
Me, still after crypto analysis
Reverse
engineer
the priority!
16
Intelligent Digital
PwCPwC
Overview of files in archive
Some rough file categories
Winshell – Main process interacting as the internals for
the software
“SystemDLLs” – Important dlls added to %SYSTEM32%
“SystemData” – data which is used by the operating for
multiple functions, mostly contains data with strings in
Games – obviously!
17
Intelligent Digital
PwCPwC
99 problems and privacy is one
SQLite database not encrypted
SQLite database present in the “SystemData”
Contains pub locations, player handles and player ‘pins’.
18
Intelligent Digital
~17,000 player rows
~6,000 pub location
rows
PwCPwC
Winshell features
Who will guard the guardians?
Boots and kills processes like local web servers, and other
layer 7 applications
Detects malicious operations, like “reboot fraud”
Checks expiry of machine, credits and overall well being of
machine.
Sets up environment in some manner.
19
Intelligent Digital
PwCPwC
Winshell probes WiFi
Winshell imports DLL’s with
the ability to detect network
router interface
Probing code can detect
versions of TP-LINK and
bandelux routers
Exports in the DLL shows also
mobile capabilities
Looks for APN details
20
Intelligent Digital
Router probe
PwCPwC
Router probing models?
Who will guard the guardians?
Specific models set in the binary analysed, which also has
the ability to remotely reboot the router!
21
Intelligent Digital
PwCPwC
But WHY?
22
Intelligent Digital
PwCPwC
Router probing
Credits
Subscriptions on service are defined by credits and
features. Highest tier subscription gives Free Wifi router
and internet, Free GPRS and unlimited credits for a year!
Capability to do this is impressive
23
Intelligent Digital
PwCPwC
Other connections
Dialup?
In “SystemData” again, we find dialup looking credentials
24
Intelligent Digital
PwCPwC
Not
complete
Log components
• Leaderboard
• ‘Winshell’
• GPRS
• Internal game DLL logs
• Modem and Boot
• Firewall (?)
• Httpd and Dhcpd
• Updater
• The games themselves
• Configuration changes
• Explorer replacement
25
#intelligentdigital
PwCPwC
Machine Expiry
Weird names, software developers and malware
developers:
A file named Temp666.dat held the machine expiry value,
this was checked and modified during the booting of the
machine
26
Intelligent Digital
PwCPwC
Developers get unhappy
Messages in binaries are nothing new
Whether a software developer or malware developer, its
interesting to see the same annoyed messages are present
27
Intelligent Digital
PwCPwC
Apart from it
being fun
Why emulate games?
• Understand the questions without the need to understand
the compression
• Allows you to understand the quiz machine environment
• No need to buy a physical machine
28
#intelligentdigital
PwCPwC
Custom game communication
Lets talk
Custom commands are mostly related to credit,
communicates via the local webserver
29
Intelligent Digital
TERM
CTEL
CGET
CUSE
BTEL
BADD
BGET
TELC
TERM|0|0|0|0|
ENDX|2|0|0|0|
BVAL|0|0|0|0|
ASKC|0|0|0|0|
USEC|0|0|100|0|
USEC|0|0|50|0|
PwC 30
#intelligentdigital
Emulating games and changing credit
Every game has a call to
a DLL to check enough
credit is available.
The DLL communicates
with a lower level DLL
which gets the value,
there are multiple ways
of getting the credit
value, confusing huh?
When the
communication
between the two levels
of DLLs it returns to
EAX, what do we do?
Out of laziness, I patch
each games EAX return
value to a static value.
Not too high though, or
it’ll crash!
1 2 3 4
Two levels of DLLs to get credit level
PwCPwC
Patching
Old Version
31
Intelligent Digital
PwCPwC
Patching
New Version
32
Intelligent Digital
PwCPwC
Getting it to run
After multiple attempts at patching
Binaries were identified to be using RAD game studio
Bink 2 video technology used, screen driver identified
DirectX Wrapper used for mouse and screen resolution
issues
Rare DLL’s used, but can be find on public sites if you try
hard enough ;)
33
Intelligent Digital
PwCPwC
Success!
Sorry for
the blur!
34
Intelligent Digital
PwCPwC
So what?
After multiple attempts at patching
We can play some games without credit restrictions
We can learn the questions
We can debug the games knowing they will run
successfully
35
Intelligent Digital
PwCPwC
Conclusions
Its still Windows 2000
Because the base OS is Windows, its much easier to
analyse
No physical machine, no problem; something to take into
account for embedded devices and IoT with firmware
updates
Some privacy issues/Possible WiFi attack vectors
36
Intelligent Digital
PwCPwC
Conclusions
Its still Windows 2000
Developer thought no one would look at your binaries,
comments and debug statements helped RE
The computer spec limitations lead to interesting
questions for RNG in random function in games
Developer using limited resources means games are not as
sophisticated
37
Intelligent Digital
PwCPwC
Conclusions
Thankyou
for
listening
to me talk
for a long
time 
38
Intelligent Digital
PwC
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not
act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or
implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, [insert
legal name of the PwC firm], its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any
consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision
based on it.
© 2018 [insert legal name of the PwC firm]. All rights reserved. In this document, PwC refers to [insert legal name of the PwC firm] which is a
member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.
Building a secure digital society

More Related Content

Similar to Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.

Iot Workshop Columbus
Iot Workshop ColumbusIot Workshop Columbus
Iot Workshop Columbus
Mike Branstein
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Jakub Kałużny
 
Quick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
Quick prototyping using Gadgeteer, Raspberry Pi + Fez CreamQuick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
Quick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
Mif Masterz
 
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havocCountry domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
Tiago Henriques
 
Securing the Pipeline
Securing the PipelineSecuring the Pipeline
Securing the Pipeline
Thoughtworks
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
MediaTek Labs
 
A new way to inspire and stimulate learning
A new way to inspire and stimulate learningA new way to inspire and stimulate learning
A new way to inspire and stimulate learning
Lee Stott
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Jakub Kałużny
 
Code PaLOUsa Azure IoT Workshop
Code PaLOUsa Azure IoT WorkshopCode PaLOUsa Azure IoT Workshop
Code PaLOUsa Azure IoT Workshop
Mike Branstein
 
Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011
Lee Stott
 
IoT Workshop Nashville
IoT Workshop NashvilleIoT Workshop Nashville
IoT Workshop Nashville
Mike Branstein
 
Embeded system Basics.pptx
Embeded system Basics.pptxEmbeded system Basics.pptx
Embeded system Basics.pptx
KundanSuman4
 
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocolsCONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
PROIDEA
 
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanelA Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
Data Science Club
 
Iot in-production
Iot in-productionIot in-production
Iot in-production
Florian Raschbichler
 
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
KTN
 
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdfAdvanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
WiseNaeem
 
Cc internet of things @ Thomas More
Cc internet of things @ Thomas MoreCc internet of things @ Thomas More
Cc internet of things @ Thomas More
JWORKS powered by Ordina
 
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdfAdvanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Ismailkhan77481
 

Similar to Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE. (20)

Iot Workshop Columbus
Iot Workshop ColumbusIot Workshop Columbus
Iot Workshop Columbus
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
Quick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
Quick prototyping using Gadgeteer, Raspberry Pi + Fez CreamQuick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
Quick prototyping using Gadgeteer, Raspberry Pi + Fez Cream
 
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havocCountry domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
 
Securing the Pipeline
Securing the PipelineSecuring the Pipeline
Securing the Pipeline
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
 
A new way to inspire and stimulate learning
A new way to inspire and stimulate learningA new way to inspire and stimulate learning
A new way to inspire and stimulate learning
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 
Code PaLOUsa Azure IoT Workshop
Code PaLOUsa Azure IoT WorkshopCode PaLOUsa Azure IoT Workshop
Code PaLOUsa Azure IoT Workshop
 
Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011
 
IoT Workshop Nashville
IoT Workshop NashvilleIoT Workshop Nashville
IoT Workshop Nashville
 
Embeded system Basics.pptx
Embeded system Basics.pptxEmbeded system Basics.pptx
Embeded system Basics.pptx
 
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocolsCONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
 
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanelA Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
A Big (Query) Frog in a Small Pond, Jakub Motyl, BuffPanel
 
Iot in-production
Iot in-productionIot in-production
Iot in-production
 
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
Implementing AI: Running AI at the Edge: ClickCV – Providing high-performance...
 
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdfAdvanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
 
IoT Session Thomas More
IoT Session Thomas MoreIoT Session Thomas More
IoT Session Thomas More
 
Cc internet of things @ Thomas More
Cc internet of things @ Thomas MoreCc internet of things @ Thomas More
Cc internet of things @ Thomas More
 
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdfAdvanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
Advanced View Pic Microcontroller Projects List _ PIC Microcontroller.pdf
 

More from hacktivity

Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
hacktivity
 
Vincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking KubernetesVincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking Kubernetes
hacktivity
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnel
hacktivity
 
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webappsMikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
hacktivity
 
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
hacktivity
 
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle WeaponizationGabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
hacktivity
 
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
hacktivity
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
hacktivity
 
Gergely Biczók - Interdependent Privacy & the Psychology of Likes
Gergely Biczók - Interdependent Privacy & the Psychology of LikesGergely Biczók - Interdependent Privacy & the Psychology of Likes
Gergely Biczók - Interdependent Privacy & the Psychology of Likes
hacktivity
 
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To UsPaolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
hacktivity
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
hacktivity
 

More from hacktivity (11)

Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
 
Vincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking KubernetesVincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking Kubernetes
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnel
 
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webappsMikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
 
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
 
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle WeaponizationGabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
 
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
 
Gergely Biczók - Interdependent Privacy & the Psychology of Likes
Gergely Biczók - Interdependent Privacy & the Psychology of LikesGergely Biczók - Interdependent Privacy & the Psychology of Likes
Gergely Biczók - Interdependent Privacy & the Psychology of Likes
 
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To UsPaolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.

  • 2. PwCPwC @linkcabin whoami • Threat intelligence analyst for PwC – APT focused • Studied cyber security at university • Previously done talks on OSINT at Bsides London and DEEPINTEL • Likes reverse engineering and understanding complex systems • Big fan of philosophy, politics and English football! 2 #intelligentdigital
  • 3. PwCPwC How it began Pub quiz machines are cool 3 Intelligent Digital
  • 4. PwCPwC Gambling as a job? 4 Intelligent Digital
  • 5. PwCPwC The machine Machine freeze The machine froze, a restart was required. I learnt about the system environment from its reboot. It’s Windows 2000 5 Intelligent Digital
  • 6. PwCPwC Acquiring the machine? We could acquire by simply buying one, they are available for purchase on websites online. 6 Intelligent Digital
  • 7. PwCPwC Space Pretty sure I don’t have space for a quiz machine in London, so I took an alternative route 7 Intelligent Digital Understanding the machine better Software updates are distributed on their site, much like routers, so I just downloaded it.
  • 8. PwCPwC What I did for 3 months 8 Intelligent Digital Morning/During Work After dinner
  • 9. PwCPwC The machine What's in the box Software updates are packaged in an archive Every update contains a executable called setup.exe in the binary which installs the update File updates are packaged in archives within the original archive and are password protected Developer hoped no one would be able to reverse engineer the binary to get the passwords! 9 Intelligent Digital
  • 10. PwCPwC Passwords are in the ini Grabbing the passwords Passwords were held in a encrypted ini file Setup.exe decrypted the file contents during installation process 10 Intelligent Digital
  • 11. PwCPwC Batch + interpreter? Interpreting [instructions] Decrypted contents was a batch file with some more features, unique looking! 11 Intelligent Digital
  • 12. PwCPwC Batch with 7z command line 7zip command line reveals the password Allows us to understand the environments these binaries are run Gives us the password to system and game files which are updated! 12 Intelligent Digital
  • 13. PwCPwC Config file validation _memcmp GWENC please Decrypts and validates it by checking the first five bytes are ‘GWENC’ 13 Intelligent Digital
  • 14. PwCPwC Crypto mystery Working out crypto algorithms is hard Open SSL library is used in the binary Could not identify the cryptographic algorithm, accepted two quad words into the main decryption function. 14 Intelligent Digital
  • 15. PwCPwC Crypto mystery Working out crypto algorithms is hard Static values are set as 0xE50C6C538E615259 and 0x61A468D10E3CB77F. Another constant used in the algorithm 1953184666628070171 A mixture of bit shifting, XOR and AND operations in algorithm 15 Intelligent Digital
  • 16. PwCPwC Me, still after crypto analysis Reverse engineer the priority! 16 Intelligent Digital
  • 17. PwCPwC Overview of files in archive Some rough file categories Winshell – Main process interacting as the internals for the software “SystemDLLs” – Important dlls added to %SYSTEM32% “SystemData” – data which is used by the operating for multiple functions, mostly contains data with strings in Games – obviously! 17 Intelligent Digital
  • 18. PwCPwC 99 problems and privacy is one SQLite database not encrypted SQLite database present in the “SystemData” Contains pub locations, player handles and player ‘pins’. 18 Intelligent Digital ~17,000 player rows ~6,000 pub location rows
  • 19. PwCPwC Winshell features Who will guard the guardians? Boots and kills processes like local web servers, and other layer 7 applications Detects malicious operations, like “reboot fraud” Checks expiry of machine, credits and overall well being of machine. Sets up environment in some manner. 19 Intelligent Digital
  • 20. PwCPwC Winshell probes WiFi Winshell imports DLL’s with the ability to detect network router interface Probing code can detect versions of TP-LINK and bandelux routers Exports in the DLL shows also mobile capabilities Looks for APN details 20 Intelligent Digital Router probe
  • 21. PwCPwC Router probing models? Who will guard the guardians? Specific models set in the binary analysed, which also has the ability to remotely reboot the router! 21 Intelligent Digital
  • 23. PwCPwC Router probing Credits Subscriptions on service are defined by credits and features. Highest tier subscription gives Free Wifi router and internet, Free GPRS and unlimited credits for a year! Capability to do this is impressive 23 Intelligent Digital
  • 24. PwCPwC Other connections Dialup? In “SystemData” again, we find dialup looking credentials 24 Intelligent Digital
  • 25. PwCPwC Not complete Log components • Leaderboard • ‘Winshell’ • GPRS • Internal game DLL logs • Modem and Boot • Firewall (?) • Httpd and Dhcpd • Updater • The games themselves • Configuration changes • Explorer replacement 25 #intelligentdigital
  • 26. PwCPwC Machine Expiry Weird names, software developers and malware developers: A file named Temp666.dat held the machine expiry value, this was checked and modified during the booting of the machine 26 Intelligent Digital
  • 27. PwCPwC Developers get unhappy Messages in binaries are nothing new Whether a software developer or malware developer, its interesting to see the same annoyed messages are present 27 Intelligent Digital
  • 28. PwCPwC Apart from it being fun Why emulate games? • Understand the questions without the need to understand the compression • Allows you to understand the quiz machine environment • No need to buy a physical machine 28 #intelligentdigital
  • 29. PwCPwC Custom game communication Lets talk Custom commands are mostly related to credit, communicates via the local webserver 29 Intelligent Digital TERM CTEL CGET CUSE BTEL BADD BGET TELC TERM|0|0|0|0| ENDX|2|0|0|0| BVAL|0|0|0|0| ASKC|0|0|0|0| USEC|0|0|100|0| USEC|0|0|50|0|
  • 30. PwC 30 #intelligentdigital Emulating games and changing credit Every game has a call to a DLL to check enough credit is available. The DLL communicates with a lower level DLL which gets the value, there are multiple ways of getting the credit value, confusing huh? When the communication between the two levels of DLLs it returns to EAX, what do we do? Out of laziness, I patch each games EAX return value to a static value. Not too high though, or it’ll crash! 1 2 3 4 Two levels of DLLs to get credit level
  • 33. PwCPwC Getting it to run After multiple attempts at patching Binaries were identified to be using RAD game studio Bink 2 video technology used, screen driver identified DirectX Wrapper used for mouse and screen resolution issues Rare DLL’s used, but can be find on public sites if you try hard enough ;) 33 Intelligent Digital
  • 35. PwCPwC So what? After multiple attempts at patching We can play some games without credit restrictions We can learn the questions We can debug the games knowing they will run successfully 35 Intelligent Digital
  • 36. PwCPwC Conclusions Its still Windows 2000 Because the base OS is Windows, its much easier to analyse No physical machine, no problem; something to take into account for embedded devices and IoT with firmware updates Some privacy issues/Possible WiFi attack vectors 36 Intelligent Digital
  • 37. PwCPwC Conclusions Its still Windows 2000 Developer thought no one would look at your binaries, comments and debug statements helped RE The computer spec limitations lead to interesting questions for RNG in random function in games Developer using limited resources means games are not as sophisticated 37 Intelligent Digital
  • 38. PwCPwC Conclusions Thankyou for listening to me talk for a long time  38 Intelligent Digital
  • 39. PwC This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, [insert legal name of the PwC firm], its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. © 2018 [insert legal name of the PwC firm]. All rights reserved. In this document, PwC refers to [insert legal name of the PwC firm] which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. Building a secure digital society