SlideShare a Scribd company logo
The Machines That 
Betrayed Their Masters 
ZeroNights 2013
@glennzw 
SensePost.com 
Glenn Wilkinson 
@glennzw
•2-y Donskoy proyezd, 7/1, Moscow 
•Leninskiy prospekt., 2А, Moscow 
•Ulitsa Bakhrushina, 24 строение 1, Moscow 
•Rublevskoye shosse, 44, Moscow 
•Krylatskaya ulitsa, 23, Moscow 
•Ulitsa Sushchevskiy Val, 46 строение, Moscow 
•Ulitsa Krasina, 3, Moscow 
•Bolshaya Sadovaya ulitsa, Moscow 
@glennzw
•Nevsky Prospect, 114, Saint Petersburg 
•Prospekt Medikov, St Petersburg 
•Ulitsa 8 Marta, 41, Yekaterinburg 
@glennzw 
•P132, Kaluzhskaya
•North 16th Street, Philadelphia, USA 
•Captain Cook Drive, Australia 
•Trillerpark, 1210 Viena, Austria 
•3 Luvianpuistokatu, Satakunta, Finland 
@glennzw
@glennzw 
•Wingate by Wyndham, Dallas, Texas, USA 
•Hotel Strata, California, USA 
•Hotel Hacienda, Spain 
•Sunrise Diamond Beach Resort, Egypt 
•5Footway Inn, Singapore 
•H2O Hostel Ljubljana, Slovenia
@glennzw
@glennzw
@glennzw
Machines? Betrayal?
@glennzw
@glennzw 
Machines?
@glennzw 
Betrayal?
A Device
A Unique Signature
A Link from 
Signature to a Human
@glennzw 
Snoopy Framework
@glennzw
@glennzw
@glennzw
@glennzw 
XBee 
XBee 3G 
XBee
@glennzw 
XBee 
XBee 3G 
XBee 
XBee 
XBee 3G 
XBee 
Ethernet 
Ethernet
@glennzw
A Unique Signature
98:03:ab:32:11:33
Linking the Signature
Linking the Signature 
1. Passive Linking
BTHomeHub-AFV1, are you there? 
Starbucks, are you there? 
Virgin-AFVT, are you there? 
Is anyone out there? 
98:03:ab:32:11:33
BTBusinessHub-2DF1 
Virgin-AFVT 
Starbucks 
Starbucks 
SSID GPS Lat GPS Long 
Virgin-AFVT 50.507 -0.128 
Starbucks 50.408 -0.041 
BTBusinessHub-2DF1 50.601 -0.045 
Starbucks 50.391 -0.050
@glennzw 
BTHomeHub-AFV1, are you there? 
Starbucks, are you there? 
Virgin-AFVT, are you there? 
Is anyone out there? 
98:03:ab:32:11:33
Linking the Signature? 
@glennzw 
2. Active Linking
@glennzw 
BTHomeHub-AFV1, are you there? 
Starbucks, are you there? 
Virgin-AFVT, are you there? 
Is anyone out there? 
Hey iPhone! It’s me, Starbucks! 
98:03:ab:32:11:33
Intertubes 
BTOpenzone 
VirginMedia-AR45 
BTHomeHub-BHA7 
Starbucks 
IP= 10.2.0.45 
Site= www.facebook.com 
Site= www.facebook.com 
Cookie = supersecretcookie 
00:11:22:33:44:55 
00:22:33:44:55:66 
Drone001 
Client001 
00:11:22:33:44:55 
Client002 
00:22:33:44:55:66 
Drone002 
Client003 
11:22:33:44:55:66 
Client004 
44:55:66:77:88:99 
IP= 10.2.0.45 
username: joe 
password: secret 
<script src=profiler.jsp> 
mitmproxy sslstrip squid 
Traffic Inspector 
Social Media APIs 
Snoopy 
Server
@glennzw
@glennzw
@glennzw
@glennzw
@glennzw 
Scenarios
@glennzw 
Conference Unique 
Devices Number 
of 
A4endees 
Device 
Per 
Person 
BlackHatVegas2012 4778 6500 0.74 
ITWeb2012 1106 400 2.77 
44CON2012 969 350 2.77 
BlackHatEU2013 681 607 1.12 
Securitay2013 375 100 3.75 
BSides2013 208 474 0.44 
Hackito2013 309 400 0.77 
CERT 
Poland2013 598 500 1.2 
ZeroNights2013 507 ?
@glennzw 
glenn@sensepost.com 
jobs@sensepost.com 
http://research.sensepost.com/

More Related Content

More from E Hacking

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
E Hacking
 
Threats against the next billion devices
Threats against the next billion devicesThreats against the next billion devices
Threats against the next billion devices
E Hacking
 
High Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilitiesHigh Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilities
E Hacking
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
E Hacking
 
Exploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit SystemsExploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit Systems
E Hacking
 
Most Important steps to become a hacker
Most Important steps to become a hackerMost Important steps to become a hacker
Most Important steps to become a hacker
E Hacking
 
Penetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the BattlefieldPenetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the Battlefield
E Hacking
 
Website fingerprinting on TOR
Website fingerprinting on TORWebsite fingerprinting on TOR
Website fingerprinting on TOR
E Hacking
 
Fuzzing the Media Framework in Android
Fuzzing the Media Framework in AndroidFuzzing the Media Framework in Android
Fuzzing the Media Framework in Android
E Hacking
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 
Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itE Hacking
 
Malicious Domain Profiling
Malicious Domain Profiling Malicious Domain Profiling
Malicious Domain Profiling
E Hacking
 
Detecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance SystemsDetecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance Systems
E Hacking
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
E Hacking
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
E Hacking
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
E Hacking
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections Paper
E Hacking
 
Reversing and Malware Analysis
Reversing and Malware Analysis Reversing and Malware Analysis
Reversing and Malware Analysis
E Hacking
 
Metasploit - The Exploit Learning Tree
Metasploit - The Exploit Learning TreeMetasploit - The Exploit Learning Tree
Metasploit - The Exploit Learning Tree
E Hacking
 

More from E Hacking (20)

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Threats against the next billion devices
Threats against the next billion devicesThreats against the next billion devices
Threats against the next billion devices
 
High Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilitiesHigh Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilities
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Exploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit SystemsExploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit Systems
 
Most Important steps to become a hacker
Most Important steps to become a hackerMost Important steps to become a hacker
Most Important steps to become a hacker
 
Penetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the BattlefieldPenetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the Battlefield
 
Website fingerprinting on TOR
Website fingerprinting on TORWebsite fingerprinting on TOR
Website fingerprinting on TOR
 
Fuzzing the Media Framework in Android
Fuzzing the Media Framework in AndroidFuzzing the Media Framework in Android
Fuzzing the Media Framework in Android
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 
Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get it
 
Malicious Domain Profiling
Malicious Domain Profiling Malicious Domain Profiling
Malicious Domain Profiling
 
Detecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance SystemsDetecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance Systems
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections Paper
 
Reversing and Malware Analysis
Reversing and Malware Analysis Reversing and Malware Analysis
Reversing and Malware Analysis
 
Metasploit - The Exploit Learning Tree
Metasploit - The Exploit Learning TreeMetasploit - The Exploit Learning Tree
Metasploit - The Exploit Learning Tree
 

The Machines that Betrayed their Masters