Csi Netsec 2006 Poor Mans Guide Merdinger

27
Poor Man's Guide To Network Espionage Gear Shawn Merdinger Independent Security Researcher CRT-9 Computer Security Institute NetSec 2006 2006.06.14

description

"Poor Mans Guide To Network Espionage Gear" - Computer Security Institute NETSEC 2006

Transcript of Csi Netsec 2006 Poor Mans Guide Merdinger

Page 1: Csi Netsec 2006 Poor Mans Guide Merdinger

Poor Man's Guide To Network Espionage Gear

Shawn MerdingerIndependent Security Researcher

CRT-9Computer Security Institute

NetSec 20062006.06.14

Page 2: Csi Netsec 2006 Poor Mans Guide Merdinger

British Spy Rock

Page 3: Csi Netsec 2006 Poor Mans Guide Merdinger

First-Gen Spy Rock?

Page 4: Csi Netsec 2006 Poor Mans Guide Merdinger

Obligatory Speaker Slide

● Shawn Merdinger– Independent security researcher & corporate irritant– Current indy projects

● VoIP device & Emergency communications systems

– Former positions● TippingPoint ● Cisco Systems

– STAT (Security Technologies Assessment Team)

– Web: www.io.com/~shawnmer

Page 5: Csi Netsec 2006 Poor Mans Guide Merdinger

Warnings and Stuff

● This is academic research...the “how” not the “why” ● This is “dangerous information”...however

– You have the right/need to know – I have the right/need to talk

● Oh yeah...and remember– Devices (in context) may be illegal...don't use– Activities (in context) may be illegal...don't do– I’m not a lawyer…

Page 6: Csi Netsec 2006 Poor Mans Guide Merdinger

Objectives

● Academic information exchange● My favorite cheap and mean gear● Attacks & countermeasures● Resources

Page 7: Csi Netsec 2006 Poor Mans Guide Merdinger

Agenda

● Objectives● Attackers● Network Espionage Devices (NEDs)● Gettin' Spooky with IT● Countermeasures● Looking forward

Page 8: Csi Netsec 2006 Poor Mans Guide Merdinger

Got bad soup?

Devestating yet “simple” attack

Page 9: Csi Netsec 2006 Poor Mans Guide Merdinger

Attacker Goals

● Attacker wants to accomplish...– Gain internal access via a device at victim location– Attack internal/external hosts via TCP/IP– Attack phone/PDA/PC via Bluetooth– Passively gather information via sniffing– Establish other internal and external access– Impersonate services – Webserver, Database– Target a user's service – VIP VoIP connection

Page 10: Csi Netsec 2006 Poor Mans Guide Merdinger

Attack Tools

● Typical opensource methods and tools– Scanning & Probing– Sniffing– Exploiting– Covert communications

● Multiple protocols and entry points– Wired LAN– 802.11b/g wireless– Bluetooth

Page 11: Csi Netsec 2006 Poor Mans Guide Merdinger

NEDs

● My favorites– Linksys WRT54G– Nokia 770– Gumstix– PicoTux

● Plenty others!– Access Points– PDAs– Game platforms

Page 12: Csi Netsec 2006 Poor Mans Guide Merdinger

NED Characteristics

● Small, unobtrusive, ubiquitous, “cute”● Low-cost, disposable at victim's location● Minimal power requirements

– Power over ethernet, battery, solar potential● Multiple attack vector capability

– Wired, Wireless, Bluetooth, RFID● Traditional forensics very difficult

– Ephemeral filesystems running in RAM & device access– Try that with Encase!

Page 13: Csi Netsec 2006 Poor Mans Guide Merdinger

NED Characteristics

● Outbound reverse connections back to attacker– Crypto tunnels bypass firewalls, IDS– “Under the radar” common protocols like DNS

requests, ICMP, HTTP/S – Proxies, anonymizers, etc.

● Ported attack tools and exploits– ARM processor-based– Some hardware and software limitations and trade-offs

● Dependent libraries, GUIs, etc.– E.g. Don't expect a full Nessus client/server on Linksys routers

Page 14: Csi Netsec 2006 Poor Mans Guide Merdinger

NED OS & Software

● Stripped-down Linux● BusyBox shell● SSH, HTTP/S management● Features like VPN tunnels, mesh networking● On-the-fly software install as “packages”

– DNS, Apache, Asterisk– Attack tools and exploits– Powerful scripting languages: Python, Ruby– Customizable

Page 15: Csi Netsec 2006 Poor Mans Guide Merdinger

Linksys WRT54G● Cheap, cute● Secure with default Linksys firmware?

– Ubiquitous = the “new Windows”– Very likely unpublished exploits in the wild

● Opensource alternatives to Linksys firmware– OpenWRT

● Package system

– Sveasoft● Mesh netwkorking

● Un-leashing the WRT54G....

Page 16: Csi Netsec 2006 Poor Mans Guide Merdinger

FairuzaUS for Linksys● FairuzaUS: www.hackerpimps.com

Treo 650 SSH into FairuzaUS

into compromised Windows box

Command line interface over SSH

Page 17: Csi Netsec 2006 Poor Mans Guide Merdinger

Nokia 770

● Basics– US $300– Slow CPU, low RAM– 802.11b & Bluetooth– Virtual touchscreen keyboard– Debian Linux PDA– Software

● Lots of development via Maemo project● Many security tool packages by independent folks

– Tcpdump, Nmap, Dsniff, Kismet, Bluetooth audit

Page 18: Csi Netsec 2006 Poor Mans Guide Merdinger

Gumstix

● Ultra-small computers ($120 +)● Expandable “snap in” boards

– CF storage and 802.11b wireless– Single and dual Ethernet with POE

● MITM hardware device with dual ethernet

– Bluetooth– USB, serial, PS/2 connectors– Used in BlueSniper, UltraSwarm– Developer CDs and environment

Page 19: Csi Netsec 2006 Poor Mans Guide Merdinger

PicoTux

● Picotux 100 and 112 (US $100 +)– World's smallest Linux computer– 35mm×19mm×19mm (size of RJ45 connector)– Power over ethernet– Telnet and HTTP server– Developer CDs and environment

● Attacks– One of these in the plenum off a Cisco CAT switch– “Serial to ethernet connector”

Page 20: Csi Netsec 2006 Poor Mans Guide Merdinger

Spooky: Device Enclosures

● Free water cooler offer ;)– Potential for power source– Legitimate reason for physical presence..and returning

● Office décor– Flower safe with X-mas tree & lights...plug 'n play

● Exit Sign, fire extinguisher– *Dangerous to mess with emerg. gear

Page 21: Csi Netsec 2006 Poor Mans Guide Merdinger

Spooky: 0wn3d Mesh Network● Municipal networks beware!● Build It

– EVDO gateway for Internet – Drive-by/Walk-by AP 0wn4g3– Senao AP w/ YAGI = Sweeper

● Run It– Karma = DHCP for everybody– Shared crypto keys, cron jobs, remote ssh-fs mounts

● Own it – Attack everything, browser exploits on capture portal

Page 22: Csi Netsec 2006 Poor Mans Guide Merdinger

Spooky: In-Transit “Marketing”

● Airports, train stations, bus stations, subways, etc.– Bluetooth spamming with “scary” message content– 0wn3d wifi networks & Windows Messaging

● Multiplier-effect– Simultaneous at multiple hubs in US– “Scary message”

● Huge productivity costs

– Wrong message● Used as diversion, secondary attack, etc.

Page 23: Csi Netsec 2006 Poor Mans Guide Merdinger

Spooky: Long-distance,the next best thing to being there

● Home-built Bluetooth/Wifi “Sniper” setups

Bluetooth targets up to one mile 802.11b targets up to...?

Page 24: Csi Netsec 2006 Poor Mans Guide Merdinger

How far? 802.11b over 125 miles

Page 25: Csi Netsec 2006 Poor Mans Guide Merdinger

Countermeasures

● Know the risks and threats● Know your network devices and traffic● User education, buy-in, ownership of the problem● Policy and “best practices”● Planned response ● Other measures

– Honeypots, Honeynets, Bluetooth-honeypot– Calling the cavelry (private specialists, Johnny Law)– Hack-backs

Page 26: Csi Netsec 2006 Poor Mans Guide Merdinger

Looking Forward

● More devices with network access– It's only going to get worse....

● “Why is my refrigerator scanning my network?”● Same old issues: poor QA and security, outsourced, lack-of

ownership, fixes/patching, etc.

● Tied into critical applications– Tele-medicine, mobile data– Emergency Communications Infrastructure

● Vonage over Linksys box was NO lifeline post-Katrina● Plenty others...stay tuned!

Page 27: Csi Netsec 2006 Poor Mans Guide Merdinger

Questions?

Thanks!

Contact: shawnmer @ gmail.com