Adrian Crenshaw.  Tenacity Solutions  PJRC.

Slides:



Advertisements
Similar presentations
HAVE YOUR PHOTOS DIGITIZED PCNA: GET YOUR OLD PHOTOS CONVERTED TO A DIGITAL FORMAT FOR YOU.
Advertisements

Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Thank you to IT Training at Indiana University Computer Malware.
USB Reloaded USB Reloaded: The Teensy Attack Eric Conrad
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Discovering Computers: Chapter 1
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Chapter Nine Maintaining a Computer Part III: Malware.
SD Splash Page Splash page brings your brand and message to the screen with a digital flyer and guide to your materials. Feature: Colorful User Interface.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Lesson 4 Computer Software
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hands-On Microsoft Windows Server 2008
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Irongeek.com Adrian Crenshaw Joseph Hollingsworth.
Topics Introduction Hardware and Software How Computers Store Data
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
The Basic Input/Output System Unit objectives: Access the BIOS setup utility, change hardware configuration values, and research BIOS updates Explain the.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
As you look at an iMac you will notice that there are no buttons on the front of the machine as shown in figure 1.
Optimizing Your Computer To Run Faster Using Msconfig Technical Demonstration by: Chris Kilkenny.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Computer security By Isabelle Cooper.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Topic 5: Basic Security.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART I.
Hardware By Ollie Coles Ollie Coles, Hardware. Graphics cards are the reason we are able to see anything on our computer screens A graphics card produces.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
“Candidates were not advantaged by defining every type of operating system provided as examples in the explanatory notes of the standard. Candidates who.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 7. Identifying Assets and Activities to Be Protected
Common Methods Used to Commit Computer Crimes
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Introduction to Computers
5 SYSTEM SOFTWARE CHAPTER
Computer Basics.
5 SYSTEM SOFTWARE CHAPTER
5 SYSTEM SOFTWARE CHAPTER
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Test 3 review FTP & Cybersecurity
What is keystroke logging?
Presentation transcript:

Adrian Crenshaw

 Tenacity Solutions  PJRC  ISSA Kentuckiana Chapter

 I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m just a geek with time on my hands  (ir)Regular on the ISDPodcast

 Hardware instead of software  (though software is of course involved in payloads and firmware)  A few possible non USB examples:  PS/2 Keyloggers  Backdoored routers  Trigger self destructing hardware  Weakened crypto chips

 Hardware has identifying strings to help the OS figure out what drivers to load  USB devices have Vendor IDs Product IDs Great list here:  And Sometimes: Serial Numbers

So, why am I concentrating on USB?  More real examples, as oppose to scare mongering  Ease of installation  Lack of admin rights needed in many cases  Easy to hide or social engineer someone else into installing them

 USB Mass Storage containing malware  U3 Thumb drives with "evil" autorun payloads  Hardware key loggers  Programmable HID USB Keyboard Dongle Devices

 The USB mass-storage device class is a standard way to present digital storage to a host operating system.  Many devices utilize the USB mass-storage device class standard: flash drives, card readers, digital cameras, MP3/media players, digital picture frames and a plethora of other items.  Not necessarily intentional, could be a quality control issue.

 Autorun  Intentionally ran by user (drivers or installs)  Exploit a software bug, for example:  WMF (Windows Metafile) vulnerability  LNK (Link) file vulnerability

 Mariposa botnet client on the Vodafone distributes-mariposa/ distributes-mariposa/  Malware shipped on Apple Video iPods distributes-mariposa/ distributes-mariposa/  Digital Photo Frames and Other Gadgets Infected -photo-f/ -photo-f/

 User awareness (best of luck with that!)  Disable Autorun  Keep patches up to date  Run an anti-malware/anti-virus system  Lockdown what hardware can be installed

 U3 was meant to make running applications off of a flash drive easier  U3 drives make part of the device look like a CD device so OS will try to use Autorun  Attackers can use this functionality to automate attacks like hash dumping, or installing Remote Access Trojans  Core difference between this and “USB Mass Storage containing malware” is intent

 Autorun  If Autorun is disabled, attacker could just run it directly

 Hak5 Switchblade  Butturini’s Incident Response Payload hak5-u3-switchblade-as-an-incident-response-and-forensics-tool hak5-u3-switchblade-as-an-incident-response-and-forensics-tool  Steve Stasiukonis of Secure Network Technologies Inc pen-test story

 User awareness (best of luck with that!)  Disable Autorun  Keep patches up to date  Run an anti-malware/anti-virus system  Lockdown what hardware can be installed

Why will I focus on the last two categories?  Anti-malware is a fairly well covered topic, and these storage based classes of USB devices are just two more vectors.  Anti-malware packages from major vendors are already focusing on these issues.  The autorun issues have been covered alot.  The next two categories don’t have to rely on malware or autorun.

 Hardware key loggers are fairly simple devices conceptually.  Essentially they are installed between the keyboard and the computer, and then log all of the keystrokes that they intercept to their onboard flash memory.  A snooper can then come along later to pick up the key logger and extract the captured data (passwords, documents, activity, etc.).

 None really, though to dump the logs certain keystrokes may have to be sent  KeyCarbon: phxlog  KeeLog: Hold k+b+s  After the recovery trigger, some type the contents of the log and some become drives where you can copy off the log

 People don’t seem to want to tell the world they got owned  The practicality of USB hardware key loggers from the attacker’s perspective varies for many reasons: 1. The cost can be high, from about $60 to well over $300. How many attackers would wish to leave behind such an expensive piece of equipment that they may not be able to collect later? 2. Physical access to the system is required for a short time to install, and possibly to retrieve. So far the wireless key logger the author has tested has been less than reliable. 3. USB is a tougher spec to implement than PS/2. Some keyboard/PC combinations simply fail to function, or function with odd side effects.

 Physical security  Lockdown what hardware can be installed may work in some cases but not many  Physical inspection  Notice odd problems that could mean there is a USB keylogger present  Odd USB vendor/product IDs?  Inline devices not working from a keyboards built-in hub?  Reports of slow USB speed with inline devices?

 keyloggers-1-keycarbon keyloggers-1-keycarbon  keyloggers-2-keyghost-keelog keyloggers-2-keyghost-keelog  keyloggers-3-keyllama keyloggers-3-keyllama   hardware-keylogger-review hardware-keylogger-review  keyloggers-use-review-and-stealth keyloggers-use-review-and-stealth

 Simple microcontroller based device that acts as a USB HID (Human Interface Device)  Can be used to script any actions a keyboard and mouse can do  Way more information can be found here: grammable-hid-usb-keystroke-dongle grammable-hid-usb-keystroke-dongle

 Likely types faster than you can, without errors  Works even if U3 autorun is turned off  Draws less attention than sitting down in front of the terminal would. The person turns their head for a minute, the pen-tester plugs in their programmable USB key stroke dongle, and Bobs your uncle, instant pwnage.  Can also be set to go off on a timer when you know a target will be logged in  Can be Hidden in other items  Just use your imagination!

1. Add a user to the box or the domain. 2. Run a program that sets up a back door. 3. Copy files to a thumb drive, or upload them to a site that the attacker controls. 4. Go to a website that the victim has a session cookie for, and do some sort of transaction (sort of like Cross Site Request Forgery, but hardware based).

 Timer based  Lock Keys  Light, motion or some other environmental conditions

 Not much yet, just a lot of talk at conferences:  Dave Kennedy “SET 0.6 Release with Special PHUKD Key” talk at B-Sides Las Vegas  Dave Kennedy and Josh Kelly “Powershell...omfg” at Defcon 18 and Blackhat Las Vegas  Richard Rushing “USB - HID, The Hacking Interface Design” at BlackHat USA 2010  Monta Elkins s “Hacking with Hardware: Introducing the Universal RF USB Keyboard Emulation Device – URFUKED”.  USB Rubber Ducky  Adrian Crenshaw talk “Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device”

 User awareness, just don’t plug everything in!  Physical security  Lockdown what hardware can be installed  Physical inspection  Anomalies

There is some hope

On Windows 7/Vista look at the following GPO options: Computer Configuration->Administrative Templates->System->Device Instillation- >Device Instillation Restrictions

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Grou p Policy Objects\{EA879B20-EDB8-4FBB-972D- DDD85F5D90AA}Machine\Software\Policies\Microsoft\Windows\DeviceInst all\Restrictions] "DenyRemovableDevices"=dword: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Grou p Policy Objects\{EA879B20-EDB8-4FBB-972D- DDD85F5D90AA}Machine\Software\Policies\Microsoft\Windows\DeviceInst all\Restrictions\DeniedPolicy] "SimpleText"="Disabled because Adrian Said So!!!" If device was inserted when policy is in place, you may have to go into device manager to enable the device even after the policy is unset.

1. Enable both "Allow administrators to override Device Installation Restriction policies" and "Prevent installation of removable devices". 2. Set "Display a custom message title when device installation is prevented by a policy setting" and "Display a custom message when installation is prevented by a policy setting" to something meaningful so the user knows why the hardware did not install properly. 3. Whenever you install a new device on purpose, manually go into device manager, and install the drivers using the "Update Driver Software..." option.  More information at: malicious-usb-devices malicious-usb-devices

 Figured I could do it with UDEV rules, scratched my head for awhile  Michael Miller from the PaulDotCom podcast mailing list helped point me to some info that helped:  Some commands to find info about your devices so you can write a script:  Simple list of USB devices lsusb  See a list of input devices: cat /proc/bus/input/devices  Get info about a device: udevadm info -a -p /sys/bus/usb/devices/usb1/1-3  Test your scripts: udevadm test /sys/bus/usb/devices/usb1/1-3  See info about devices as they a inserted and removed: udevadm monitoror tail /var/log/messages

 /etc/udev/rules.d/01-usblockdown.rules  Still needs work, use at your own risk  Read up on UDEV rules and sysfs:

USB Big Brother Time

 Built into Windows, but a pain to use for finding information about USB devices

 Lists Vendor/Product IDs and tons of information about devices!  USBDview can remove devices, list them remotely and tons more. See help file for all the options.

 Create a file that looks something like: \\ \\ \\skynet \\cthulhu  Run command: USBDeview /remotefile boxes.txt /scomma myoutput.csv  Import the CSV file into and Database or Spreadsheet application to search and correlate.  More details at: and-data-leaks-via-the-usb-serial-numbers-on-flash-drives-smart- phones-and-mp3-players and-data-leaks-via-the-usb-serial-numbers-on-flash-drives-smart- phones-and-mp3-players

 Track “Typhoid Mary” thumb drives by their serial number. (Conficker)  Look for know suspicious Vendor IDs.  Computers with two keyboards?

 Louisville Infosec  DerbyCon 2011, Louisville Ky  Skydogcon/Hack3rcon/Phreaknic/Notacon/Outerz0ne

42