SlideShare a Scribd company logo
Poison Apples: Physical Media Social Engineering DEFCON 19 2011 David Martinez A+ / Network +
Don’t talk to strangers… Social Engineering normally consist of anything from simply asking for info, to dumpster diving. Goal is to gain information/access by false means. Most companies train against it. People are more concerned with privacy and security then before.
…unless they have candy. Physical Media Social Engineering (PMSE) involves using CD’s, USB drives, etc to access information and possibly gain entry to a target network or system.
What is it exactly? “Loaded” media that contains some sort of info the target would be interested in, but also contains malicious scripts and programs. Acts as a physical Trojan, dropping the payload onto the client system. Open possibilities for distribution. Anything from a single USB drive with music for friends, to a corporate “Training” CD-ROM are fair game.  Can be customized to target system. Little to no initial contact with target.
Think Snow White Physical Media Innocent, but naïve target Evil h4x0r
Snow White gets pwnt
How is this Social Engineering? Plays on the curiosity of the target. Can be used as an additional attack vector to go with common SE attacks. Uses many of the same techniques, without actually interfacing with the target.
How can it be used? The fact that PMSE is very modular lends itself to any size attack, with almost any media you can imagine. 3 main distribution schemes would be: Single Target Targeted Demographic Corporation/Workplace Anything is possible however…
Single Target PMSE Most effective in targeting a weak link in a companies hierarchy. Benefits most from prior knowledge of target system and environment. Only one shot to get it right in most cases. Higher probability of detection. Less anonymity. Higher chance of direct contact.
Targeted Demographic PMSE Target is a certain demographic in general, not a specific person or institution. Most similar to p2p-based Trojans. Most effective depending on demographic being targeted. Allows for the most creativity in distribution of media. Provides the best anonymity. Lowest probability of direct contact with target.
Corporate/Institution PMSE Similar to Targeted Demographic, but the only similar variable is the Institution the victim’s work for or attend. Prior knowledge of infrastructure, hierarchy, and workstations is helpful. Corporate offices, Schools, Medical facilities are all vulnerable if done correctly. Risk of detection via corporate security policies, both physical and electronic.
PMSE Attack Demos All that is needed is: Physical Media Cover story Malicious code Some coding knowledge (Batch is sufficient) Interesting, but believable, media Distribution method Common Sense
Basic SE Attack
Physical Media SE Attack
Testing Spread 100 infected CD’s in my local area. Target was a male crowd, from teen to college. Men’s bathroom, locker rooms, outside gym’s, etc. Used Meterpreter service reverse tcp payload exe, encoded with shakati_ga_ni, and binded to JPG file. Set JPG to auto-run to force infection.
The bait…
…the catch Out of 100 CD’s distributed: 53 were a hit, and provided a meterpreter shell. Was able to access admin account on 37 machines. 36 of the infected machines were XP, with no active AV/Firewall software. Meterpreter service was removed upon logging data, no changes were made to target machines.
Pros/Cons of PMSE Pros Little to no verbal/physical contact with target Completely anonymous in most cases. Uses any tool needed. Gives a modular feel to the attack. Relies on target's interest and curiosity. Benefits greatly from prior SE attacks and inside knowledge. Extremely scalable and modifiable Can be anything from a single-target, to a large corporation. Cons Can be expensive and time-consuming on a large scale. Never 100% fool-proof, due to differences in systems, infrastructures, and environments. Typically only give you one shot to accomplish goal.
WikiLeaks as a proving ground May 2010- PFC Bradley Manning takes CD-RW’s with music into work. Erases contents, copies highly classified military documents from SIPRNet. Leaks info to WikiLeaks, which post them online to Public Domain. Manning claimed he had “no malicious intent”, but could have easily been CD’s or USB’s loaded with custom-tailored malware to drop onto SIPRNet.
Questions? David Martinez Down South Hacking DMartinez7500@downsouthhacking.com @dmartinez7500 on twitter

More Related Content

Viewers also liked

Soycomil cmr russia
Soycomil cmr russiaSoycomil cmr russia
Soycomil cmr russiaFoxytim2
 
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato StampaVIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
eAmbiente
 
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
eAmbiente
 
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
eAmbiente
 
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
Won Jun Hong
 
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
eAmbiente
 
Домен .moscow
Домен .moscow Домен .moscow
Домен .moscow
Moscow IT Department
 
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
eAmbiente
 
2009 03-26 eeeuopf
2009 03-26 eeeuopf2009 03-26 eeeuopf
2009 03-26 eeeuopf
Oscar Medelius
 
eAmbiente News - Maggio 2013
eAmbiente News - Maggio 2013eAmbiente News - Maggio 2013
eAmbiente News - Maggio 2013
eAmbiente
 
IL CONTO TERMICO
IL CONTO TERMICO IL CONTO TERMICO
IL CONTO TERMICO
eAmbiente
 
Progetto Mobilità, riprendiamoci i nostri litorali
Progetto Mobilità, riprendiamoci i nostri litoraliProgetto Mobilità, riprendiamoci i nostri litorali
Progetto Mobilità, riprendiamoci i nostri litorali
eAmbiente
 
Disney cruise part3
Disney cruise part3Disney cruise part3
Disney cruise part3
Ana Rodriguez
 
Donley Peporfolioargosyundergrads
Donley PeporfolioargosyundergradsDonley Peporfolioargosyundergrads
Donley Peporfolioargosyundergradspdonley212
 
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
eAmbiente
 
Implementation martial art in business
Implementation martial art in businessImplementation martial art in business
Implementation martial art in business
timess74
 

Viewers also liked (20)

Soycomil cmr russia
Soycomil cmr russiaSoycomil cmr russia
Soycomil cmr russia
 
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato StampaVIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
 
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
LA POLITICA ENERGETICA ITALIANA E L’INCENTIVAZIONE DEL NUOVO CONTO ENERGETICO...
 
Spectacled bear
Spectacled bearSpectacled bear
Spectacled bear
 
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
MODALITA’ DI INTERVENTO DI BONIFICA E DI MESSA IN SICUREZZA DEI SUOLI E DELLE...
 
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
조선비즈_부동산포럼_20111011_부동산사기피해_김한솔
 
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
VIAGGIO NEL VENETO DELLE QUALITA’ - Presentazione di Gabriella Chiellino, eAm...
 
Домен .moscow
Домен .moscow Домен .moscow
Домен .moscow
 
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
La Gestione delle Terre e Rocce da Scavo alla luce del Dm 10 agosto
 
Disney cruise part2
Disney cruise part2Disney cruise part2
Disney cruise part2
 
2009 03-26 eeeuopf
2009 03-26 eeeuopf2009 03-26 eeeuopf
2009 03-26 eeeuopf
 
eAmbiente News - Maggio 2013
eAmbiente News - Maggio 2013eAmbiente News - Maggio 2013
eAmbiente News - Maggio 2013
 
IL CONTO TERMICO
IL CONTO TERMICO IL CONTO TERMICO
IL CONTO TERMICO
 
Progetto Mobilità, riprendiamoci i nostri litorali
Progetto Mobilità, riprendiamoci i nostri litoraliProgetto Mobilità, riprendiamoci i nostri litorali
Progetto Mobilità, riprendiamoci i nostri litorali
 
Google Engage Program
Google Engage ProgramGoogle Engage Program
Google Engage Program
 
Disney cruise part3
Disney cruise part3Disney cruise part3
Disney cruise part3
 
Donley Peporfolioargosyundergrads
Donley PeporfolioargosyundergradsDonley Peporfolioargosyundergrads
Donley Peporfolioargosyundergrads
 
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
 
الزمرة
الزمرةالزمرة
الزمرة
 
Implementation martial art in business
Implementation martial art in businessImplementation martial art in business
Implementation martial art in business
 

Similar to Poison apples

Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Sarah Vanier
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
Arbab Usmani
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
evolutionaryit
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
graphhoc
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
G.S Shaktawat
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
Rocco Magnotta
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
Jose L. Quiñones-Borrero
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
 
The Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital WorldThe Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital World
J T "Tom" Johnson
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
Phil Huggins FBCS CITP
 
Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docx
MARRY7
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 

Similar to Poison apples (20)

Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
The Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital WorldThe Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital World
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docx
 
Ict Hacking
Ict   HackingIct   Hacking
Ict Hacking
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Poison apples

  • 1. Poison Apples: Physical Media Social Engineering DEFCON 19 2011 David Martinez A+ / Network +
  • 2. Don’t talk to strangers… Social Engineering normally consist of anything from simply asking for info, to dumpster diving. Goal is to gain information/access by false means. Most companies train against it. People are more concerned with privacy and security then before.
  • 3. …unless they have candy. Physical Media Social Engineering (PMSE) involves using CD’s, USB drives, etc to access information and possibly gain entry to a target network or system.
  • 4. What is it exactly? “Loaded” media that contains some sort of info the target would be interested in, but also contains malicious scripts and programs. Acts as a physical Trojan, dropping the payload onto the client system. Open possibilities for distribution. Anything from a single USB drive with music for friends, to a corporate “Training” CD-ROM are fair game. Can be customized to target system. Little to no initial contact with target.
  • 5. Think Snow White Physical Media Innocent, but naïve target Evil h4x0r
  • 7. How is this Social Engineering? Plays on the curiosity of the target. Can be used as an additional attack vector to go with common SE attacks. Uses many of the same techniques, without actually interfacing with the target.
  • 8. How can it be used? The fact that PMSE is very modular lends itself to any size attack, with almost any media you can imagine. 3 main distribution schemes would be: Single Target Targeted Demographic Corporation/Workplace Anything is possible however…
  • 9. Single Target PMSE Most effective in targeting a weak link in a companies hierarchy. Benefits most from prior knowledge of target system and environment. Only one shot to get it right in most cases. Higher probability of detection. Less anonymity. Higher chance of direct contact.
  • 10. Targeted Demographic PMSE Target is a certain demographic in general, not a specific person or institution. Most similar to p2p-based Trojans. Most effective depending on demographic being targeted. Allows for the most creativity in distribution of media. Provides the best anonymity. Lowest probability of direct contact with target.
  • 11. Corporate/Institution PMSE Similar to Targeted Demographic, but the only similar variable is the Institution the victim’s work for or attend. Prior knowledge of infrastructure, hierarchy, and workstations is helpful. Corporate offices, Schools, Medical facilities are all vulnerable if done correctly. Risk of detection via corporate security policies, both physical and electronic.
  • 12. PMSE Attack Demos All that is needed is: Physical Media Cover story Malicious code Some coding knowledge (Batch is sufficient) Interesting, but believable, media Distribution method Common Sense
  • 15. Testing Spread 100 infected CD’s in my local area. Target was a male crowd, from teen to college. Men’s bathroom, locker rooms, outside gym’s, etc. Used Meterpreter service reverse tcp payload exe, encoded with shakati_ga_ni, and binded to JPG file. Set JPG to auto-run to force infection.
  • 17. …the catch Out of 100 CD’s distributed: 53 were a hit, and provided a meterpreter shell. Was able to access admin account on 37 machines. 36 of the infected machines were XP, with no active AV/Firewall software. Meterpreter service was removed upon logging data, no changes were made to target machines.
  • 18. Pros/Cons of PMSE Pros Little to no verbal/physical contact with target Completely anonymous in most cases. Uses any tool needed. Gives a modular feel to the attack. Relies on target's interest and curiosity. Benefits greatly from prior SE attacks and inside knowledge. Extremely scalable and modifiable Can be anything from a single-target, to a large corporation. Cons Can be expensive and time-consuming on a large scale. Never 100% fool-proof, due to differences in systems, infrastructures, and environments. Typically only give you one shot to accomplish goal.
  • 19. WikiLeaks as a proving ground May 2010- PFC Bradley Manning takes CD-RW’s with music into work. Erases contents, copies highly classified military documents from SIPRNet. Leaks info to WikiLeaks, which post them online to Public Domain. Manning claimed he had “no malicious intent”, but could have easily been CD’s or USB’s loaded with custom-tailored malware to drop onto SIPRNet.
  • 20. Questions? David Martinez Down South Hacking DMartinez7500@downsouthhacking.com @dmartinez7500 on twitter