SlideShare a Scribd company logo
Poor Man's Guide To Network Espionage Gear Shawn Merdinger Independent Security Researcher CRT-9 Computer Security Institute  NetSec 2006 2006.06.14
British Spy Rock
First-Gen Spy Rock?
Obligatory Speaker Slide Shawn Merdinger Independent security researcher & corporate irritant Current indy projects VoIP device & Emergency communications systems Former positions TippingPoint  Cisco Systems STAT (Security Technologies Assessment Team) Web: www.io.com/~shawnmer
Warnings and Stuff This is academic research...the “how” not the “why”  This is “dangerous information”...however You have the right/need to  know   I have the right/need to  talk   Oh yeah...and remember Devices (in context) may be illegal...don't use Activities (in context) may be illegal...don't do I’m not a lawyer…
Objectives Academic information exchange My favorite cheap and mean gear Attacks & countermeasures Resources
Agenda Objectives Attackers Network Espionage Devices (NEDs) Gettin' Spooky with IT Countermeasures Looking forward
Got bad soup? Devestating yet “simple” attack
Attacker Goals Attacker wants to accomplish... Gain internal access via a device at victim location Attack internal/external hosts via TCP/IP Attack phone/PDA/PC via Bluetooth Passively gather information via sniffing Establish other internal and external access Impersonate services – Webserver, Database Target a user's service – VIP VoIP connection
Attack Tools Typical opensource methods and tools Scanning & Probing Sniffing Exploiting Covert communications Multiple protocols and entry points Wired LAN 802.11b/g wireless Bluetooth
NEDs My favorites Linksys WRT54G Nokia 770 Gumstix PicoTux Plenty others! Access Points PDAs Game platforms
NED Characteristics Small, unobtrusive, ubiquitous, “cute” Low-cost, disposable at victim's location Minimal power requirements Power over ethernet, battery, solar potential Multiple attack vector capability Wired, Wireless, Bluetooth, RFID Traditional forensics very difficult Ephemeral filesystems running in RAM & device access Try that with Encase!
NED Characteristics Outbound reverse connections back to attacker Crypto tunnels bypass firewalls, IDS “Under the radar” common protocols like DNS requests, ICMP, HTTP/S  Proxies, anonymizers, etc. Ported attack tools and exploits ARM processor-based Some hardware and software limitations and trade-offs Dependent libraries, GUIs, etc. E.g. Don't expect a full Nessus client/server on Linksys routers
NED OS & Software Stripped-down Linux BusyBox shell SSH, HTTP/S management Features like VPN tunnels, mesh networking On-the-fly software install as “packages” DNS, Apache, Asterisk Attack tools and exploits Powerful scripting languages: Python, Ruby Customizable
Linksys WRT54G Cheap, cute Secure with default Linksys firmware? Ubiquitous = the “new Windows” Very likely  unpublished exploits in the wild Opensource alternatives to Linksys firmware OpenWRT Package system Sveasoft Mesh netwkorking Un-leashing the WRT54G....
FairuzaUS for Linksys FairuzaUS:  www.hackerpimps.com Treo 650 SSH into FairuzaUS  into compromised Windows box  Command line interface over SSH
Nokia 770 Basics US $300 Slow CPU, low RAM 802.11b & Bluetooth Virtual touchscreen keyboard Debian Linux PDA Software Lots of development via Maemo project Many security tool packages by independent folks Tcpdump, Nmap, Dsniff, Kismet, Bluetooth audit
Gumstix Ultra-small computers ($120 +) Expandable “snap in” boards CF storage and 802.11b wireless Single and dual Ethernet with POE MITM hardware device with dual ethernet Bluetooth USB, serial, PS/2 connectors Used in BlueSniper, UltraSwarm Developer CDs and environment
PicoTux Picotux 100 and 112 (US $100 +) World's smallest Linux computer 35mm×19mm×19mm (size of RJ45 connector) Power over ethernet Telnet and HTTP server Developer CDs and environment Attacks One of these in the plenum off a Cisco CAT switch “Serial to ethernet connector”
Spooky: Device Enclosures Free water cooler offer ;) Potential for power source Legitimate reason for physical presence..and returning Office décor Flower safe with X-mas tree & lights...plug 'n play Exit Sign, fire extinguisher *Dangerous to mess with emerg. gear
Spooky: 0wn3d Mesh Network Municipal networks beware! Build It EVDO gateway for Internet  Drive-by/Walk-by AP 0wn4g3 Senao AP w/ YAGI = Sweeper Run It Karma = DHCP for everybody Shared crypto keys, cron jobs, remote ssh-fs mounts Own it  Attack  everything , browser exploits on capture portal
Spooky: In-Transit “Marketing” Airports, train stations, bus stations, subways, etc. Bluetooth spamming with “scary” message content 0wn3d wifi networks & Windows Messaging Multiplier-effect Simultaneous at multiple hubs in US “Scary message” Huge productivity costs Wrong message Used as diversion, secondary attack, etc.
Spooky: Long-distance, the next best thing to being there Home-built Bluetooth/Wifi “Sniper” setups Bluetooth targets up to one mile 802.11b targets up to...?
How far?  802.11b over 125 miles
Countermeasures Know the risks and threats Know your network devices and traffic User education, buy-in, ownership of the problem Policy and “best practices” Planned response  Other measures Honeypots, Honeynets, Bluetooth-honeypot Calling the cavelry (private specialists, Johnny Law) Hack-backs
Looking Forward More devices with network access It's only going to get worse.... “Why is my refrigerator scanning my network?” Same old issues: poor QA and security, outsourced, lack-of ownership, fixes/patching, etc. Tied into critical applications Tele-medicine, mobile data Emergency Communications Infrastructure Vonage over Linksys box was NO lifeline post-Katrina Plenty others...stay tuned!
Questions? Thanks! Contact: shawnmer @ gmail.com

More Related Content

PPTX
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
PPT
Introduction To Computer Security
PPTX
Digital Security
PPTX
N.sai kiran IIITA AP
PDF
Computer Security and Risks
PPT
Can DRM achieve its security goals?
PDF
CSI - Poor Mans Guide To Espionage Gear
PPT
July132000
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Introduction To Computer Security
Digital Security
N.sai kiran IIITA AP
Computer Security and Risks
Can DRM achieve its security goals?
CSI - Poor Mans Guide To Espionage Gear
July132000

What's hot (18)

PPT
Data security
PPTX
PPTX
Operating Systems: Computer Security
PPTX
Firmware analysis 101
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PPTX
Operating Systems: Computer Security
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
How to be come a hacker slide for 2600 laos
PDF

PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPTX
Ethical hacking
PPT
Steganography ppt
PPTX
Cyber crimeppt1-samweg1 (1)
PPTX
Cy - Firewall
PPT
Ethical hacking
PPTX
Audio stegnography
PPTX
Steganography
PPTX
Software-Defined Radio Presentation
Data security
Operating Systems: Computer Security
Firmware analysis 101
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Operating Systems: Computer Security
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
How to be come a hacker slide for 2600 laos

SACON - Deception Technology (Sahir Hidayatullah)
Ethical hacking
Steganography ppt
Cyber crimeppt1-samweg1 (1)
Cy - Firewall
Ethical hacking
Audio stegnography
Steganography
Software-Defined Radio Presentation
Ad

Viewers also liked (20)

PDF
Business intelligence versus competitive intelligence
PDF
Bi market research tata tcs 2010 08
PPTX
Got Oil? - War Room Slides
PDF
20111216 La réputation de votre entreprise en danger sur le net
PPTX
Immigration + US election - June 2016 War Room
PDF
Intelligence de marché, outils et principes
PPT
War Room
PPTX
Fed Up Fed War Room Slides
PPTX
BRICS Hitting Bricks War Room Slides
PPTX
Future of the USD War Room Slides
PDF
Pôle d'intelligence d'entreprise - Université de Sherbrooke
PPT
La veille, c'est quoi ? Intro
PPTX
How to Spy on Your Competition
PPTX
Tech Boom - Beginning or End War Room Slides
PPTX
US Decouples War Room Slides
PPTX
Corporate espionage
PPTX
Obamacare 1y Anniversary War Room Slides
PDF
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
PPT
Présentation - atelier War Room
PPTX
Got Income War Room Slides
Business intelligence versus competitive intelligence
Bi market research tata tcs 2010 08
Got Oil? - War Room Slides
20111216 La réputation de votre entreprise en danger sur le net
Immigration + US election - June 2016 War Room
Intelligence de marché, outils et principes
War Room
Fed Up Fed War Room Slides
BRICS Hitting Bricks War Room Slides
Future of the USD War Room Slides
Pôle d'intelligence d'entreprise - Université de Sherbrooke
La veille, c'est quoi ? Intro
How to Spy on Your Competition
Tech Boom - Beginning or End War Room Slides
US Decouples War Room Slides
Corporate espionage
Obamacare 1y Anniversary War Room Slides
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
Présentation - atelier War Room
Got Income War Room Slides
Ad

Similar to Csi Netsec 2006 Poor Mans Guide Merdinger (20)

PDF
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
PDF
Luiz eduardo. introduction to mobile snitch
PDF
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
PPT
Attacking Embedded Devices (No Axe Required)
PDF
Hack Attack! An Introduction to Penetration Testing
PPTX
How to Build Your Own Physical Pentesting Go-bag
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
PDF
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
PPTX
Network Security: Protecting SOHO Networks
PDF
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
PDF
Hackerworkshop exercises
DOC
_lauraaviles_05082015_Week 2 Assignment
PDF
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
PPTX
DevLink - WiFu: You think your wireless is secure?
PPT
Attacking Automatic Wireless Network Selection
KEY
Unity makes strength
PPTX
Concise Courses Raspberry Pi
PPT
802.11: Ethernet Marches On
PDF
The Ultimate Defence - Think Like a Hacker
PPT
Security & ethical hacking
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Luiz eduardo. introduction to mobile snitch
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Attacking Embedded Devices (No Axe Required)
Hack Attack! An Introduction to Penetration Testing
How to Build Your Own Physical Pentesting Go-bag
Cracking Into Embedded Devices - HACK.LU 2K8
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Network Security: Protecting SOHO Networks
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
Hackerworkshop exercises
_lauraaviles_05082015_Week 2 Assignment
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
DevLink - WiFu: You think your wireless is secure?
Attacking Automatic Wireless Network Selection
Unity makes strength
Concise Courses Raspberry Pi
802.11: Ethernet Marches On
The Ultimate Defence - Think Like a Hacker
Security & ethical hacking

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Modernising the Digital Integration Hub
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
What is a Computer? Input Devices /output devices
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Tartificialntelligence_presentation.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Five Habits of High-Impact Board Members
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
Geologic Time for studying geology for geologist
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
DP Operators-handbook-extract for the Mautical Institute
A review of recent deep learning applications in wood surface defect identifi...
Modernising the Digital Integration Hub
Web Crawler for Trend Tracking Gen Z Insights.pptx
Module 1.ppt Iot fundamentals and Architecture
Hindi spoken digit analysis for native and non-native speakers
What is a Computer? Input Devices /output devices
WOOl fibre morphology and structure.pdf for textiles
Tartificialntelligence_presentation.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Group 1 Presentation -Planning and Decision Making .pptx
Hybrid model detection and classification of lung cancer
Five Habits of High-Impact Board Members
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Geologic Time for studying geology for geologist

Csi Netsec 2006 Poor Mans Guide Merdinger

  • 1. Poor Man's Guide To Network Espionage Gear Shawn Merdinger Independent Security Researcher CRT-9 Computer Security Institute NetSec 2006 2006.06.14
  • 4. Obligatory Speaker Slide Shawn Merdinger Independent security researcher & corporate irritant Current indy projects VoIP device & Emergency communications systems Former positions TippingPoint Cisco Systems STAT (Security Technologies Assessment Team) Web: www.io.com/~shawnmer
  • 5. Warnings and Stuff This is academic research...the “how” not the “why” This is “dangerous information”...however You have the right/need to know I have the right/need to talk Oh yeah...and remember Devices (in context) may be illegal...don't use Activities (in context) may be illegal...don't do I’m not a lawyer…
  • 6. Objectives Academic information exchange My favorite cheap and mean gear Attacks & countermeasures Resources
  • 7. Agenda Objectives Attackers Network Espionage Devices (NEDs) Gettin' Spooky with IT Countermeasures Looking forward
  • 8. Got bad soup? Devestating yet “simple” attack
  • 9. Attacker Goals Attacker wants to accomplish... Gain internal access via a device at victim location Attack internal/external hosts via TCP/IP Attack phone/PDA/PC via Bluetooth Passively gather information via sniffing Establish other internal and external access Impersonate services – Webserver, Database Target a user's service – VIP VoIP connection
  • 10. Attack Tools Typical opensource methods and tools Scanning & Probing Sniffing Exploiting Covert communications Multiple protocols and entry points Wired LAN 802.11b/g wireless Bluetooth
  • 11. NEDs My favorites Linksys WRT54G Nokia 770 Gumstix PicoTux Plenty others! Access Points PDAs Game platforms
  • 12. NED Characteristics Small, unobtrusive, ubiquitous, “cute” Low-cost, disposable at victim's location Minimal power requirements Power over ethernet, battery, solar potential Multiple attack vector capability Wired, Wireless, Bluetooth, RFID Traditional forensics very difficult Ephemeral filesystems running in RAM & device access Try that with Encase!
  • 13. NED Characteristics Outbound reverse connections back to attacker Crypto tunnels bypass firewalls, IDS “Under the radar” common protocols like DNS requests, ICMP, HTTP/S Proxies, anonymizers, etc. Ported attack tools and exploits ARM processor-based Some hardware and software limitations and trade-offs Dependent libraries, GUIs, etc. E.g. Don't expect a full Nessus client/server on Linksys routers
  • 14. NED OS & Software Stripped-down Linux BusyBox shell SSH, HTTP/S management Features like VPN tunnels, mesh networking On-the-fly software install as “packages” DNS, Apache, Asterisk Attack tools and exploits Powerful scripting languages: Python, Ruby Customizable
  • 15. Linksys WRT54G Cheap, cute Secure with default Linksys firmware? Ubiquitous = the “new Windows” Very likely unpublished exploits in the wild Opensource alternatives to Linksys firmware OpenWRT Package system Sveasoft Mesh netwkorking Un-leashing the WRT54G....
  • 16. FairuzaUS for Linksys FairuzaUS: www.hackerpimps.com Treo 650 SSH into FairuzaUS into compromised Windows box Command line interface over SSH
  • 17. Nokia 770 Basics US $300 Slow CPU, low RAM 802.11b & Bluetooth Virtual touchscreen keyboard Debian Linux PDA Software Lots of development via Maemo project Many security tool packages by independent folks Tcpdump, Nmap, Dsniff, Kismet, Bluetooth audit
  • 18. Gumstix Ultra-small computers ($120 +) Expandable “snap in” boards CF storage and 802.11b wireless Single and dual Ethernet with POE MITM hardware device with dual ethernet Bluetooth USB, serial, PS/2 connectors Used in BlueSniper, UltraSwarm Developer CDs and environment
  • 19. PicoTux Picotux 100 and 112 (US $100 +) World's smallest Linux computer 35mm×19mm×19mm (size of RJ45 connector) Power over ethernet Telnet and HTTP server Developer CDs and environment Attacks One of these in the plenum off a Cisco CAT switch “Serial to ethernet connector”
  • 20. Spooky: Device Enclosures Free water cooler offer ;) Potential for power source Legitimate reason for physical presence..and returning Office décor Flower safe with X-mas tree & lights...plug 'n play Exit Sign, fire extinguisher *Dangerous to mess with emerg. gear
  • 21. Spooky: 0wn3d Mesh Network Municipal networks beware! Build It EVDO gateway for Internet Drive-by/Walk-by AP 0wn4g3 Senao AP w/ YAGI = Sweeper Run It Karma = DHCP for everybody Shared crypto keys, cron jobs, remote ssh-fs mounts Own it Attack everything , browser exploits on capture portal
  • 22. Spooky: In-Transit “Marketing” Airports, train stations, bus stations, subways, etc. Bluetooth spamming with “scary” message content 0wn3d wifi networks & Windows Messaging Multiplier-effect Simultaneous at multiple hubs in US “Scary message” Huge productivity costs Wrong message Used as diversion, secondary attack, etc.
  • 23. Spooky: Long-distance, the next best thing to being there Home-built Bluetooth/Wifi “Sniper” setups Bluetooth targets up to one mile 802.11b targets up to...?
  • 24. How far? 802.11b over 125 miles
  • 25. Countermeasures Know the risks and threats Know your network devices and traffic User education, buy-in, ownership of the problem Policy and “best practices” Planned response Other measures Honeypots, Honeynets, Bluetooth-honeypot Calling the cavelry (private specialists, Johnny Law) Hack-backs
  • 26. Looking Forward More devices with network access It's only going to get worse.... “Why is my refrigerator scanning my network?” Same old issues: poor QA and security, outsourced, lack-of ownership, fixes/patching, etc. Tied into critical applications Tele-medicine, mobile data Emergency Communications Infrastructure Vonage over Linksys box was NO lifeline post-Katrina Plenty others...stay tuned!
  • 27. Questions? Thanks! Contact: shawnmer @ gmail.com