SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
Thank you for collaborating
with your local h4¢k3r$ !
                h4¢
C:
C:>format C:Y/N _
Christian “Check your Wifi” Frenette
Michel “You’ve been H4x0r3d!” Cusin
CSE Conference – Mont-Tremblant
October 16, 2009 © Bell Canada, 2009. Tous droits réservés
Start to think out of the box…

… and realize what hackers know that you
don't… !




Because they WILL use it to their advantage,
against you or your customers !

               © Bell Canada, 2009. Tous droits réservés
Let’s try to think out of the box…

 • How can we make 4 triangles,
   with 6 matches… ?




          © Bell Canada, 2009. Tous droits réservés
?
                                            ?
© Bell Canada, 2009. Tous droits réservés
You have to think out of the
             box, just like the hackers do…
                                                           3




                      1            2
                                                       4

                             3




You know we’re getting at… Right ?


           © Bell Canada, 2009. Tous droits réservés
Overview of the presentation

•   Public information gathering
•   The WiFi Landscape
•   Social Networks / Social hacking / Engineering
•   Spamming, phishing & Cross-site Scripting
•   The infamous Botnets




                  © Bell Canada, 2009. Tous droits réservés
Public information gathering
•   Whois, nslookup / dig, ARIN, RF monitoring, etc…
•   Google (Maps / Earth, Groups, Blogs, Images, etc…)
•   Wigle.net, Wireless Geographic Loggin Engine
•   Enterprise Register
•   Specialized tools (Maltego, Lazy Champ, Kismet, etc…)
•   Social Networking Sites




      • Did you know you were leaking that much..?



                     © Bell Canada, 2009. Tous droits réservés
The WiFi Landscape

• Use Radio frequencies
• Electromagnetic shared medium, think hub !
• Physical environment dependencies
• Users can move, Phy environment can change
• CSMA/CA instead CSMA/CD, or transmit and
  pray
• Indoor / outdoor
• Antenna pattern
• New security considerations


              © Bell Canada, 2009. Tous droits réservés
New vector to protect from….
• Protect network from unauthorized users
  • Rogue AP, session hijacking, eavesdropping
• Protect users from unauthorized networks
  – Fake AP


    Network                                               Users




              © Bell Canada, 2009. Tous droits réservés
Don’t
• Disclose personal information in the SSID name
  of your network
• Relying on masking your SSID is useless:
  – Provide a false sense of security
  – User don’t know and reach for other
  – The stations are broadcasting the SSID they’re trying
    to reach anyway (Probe requests)
• Filtering MAC addresses is useless
  – Always transmit in clear text
  – Easy to spoof


                  © Bell Canada, 2009. Tous droits réservés
© Bell Canada, 2009. Tous droits réservés
© Bell Canada, 2009. Tous droits réservés
© Bell Canada, 2009. Tous droits réservés
DOS attack require expensive equipements
• Micro-wave fork attack
• WiFi jammer

                                                                        Gighz,
                                                          Usually 2.450 Gighz,
                                                          just between Ch 8-9, in
                                                          the ISM band and 500-
                                                                           500-
                                                          1000 watts !!! Vs AP 4
                                                          watts




              © Bell Canada, 2009. Tous droits réservés
We are protected…
• We have firewall
   – Facing Internet ! (dude!!!)
   – We provide a corporate Lan access jack
      • in the parking lot (WiFi)
• We don’t have any wireless… neither policies !
   – Neither wireless detection, ;-(
   – Laptop with WiFi card (ad-hoc mode)




        Internet




                      © Bell Canada, 2009. Tous droits réservés
Authentication & encryption

• We use encryption
  – WEP-RC4 or TKIP-RC4, AES-CCMP
• We use authentication
  – PSK or Enterprise (Eg: Radius)
  – SSID, 802.1x, EAP-TLS, PEAP, etc, (PWD,
    Certificat)
  – EAP, Sitting on WEP/TKIP, AES ?
  – Always use strong password policy (LEAP—
    ASLEAP)


              © Bell Canada, 2009. Tous droits réservés
Working @ home

• I use WEP, WPA-PSK
  – you are acting like a rogue AP, if your home network
    is not protect
• Anayway, I use VPN to connect to the office
  – Your lucky, if it never drop when your not in front of
    your PC
  – Enforce layer 2 security even if you use VPN
• All PCs at home are safe
  – Kids PCs, Playstation, lots of treath from the inside



                  © Bell Canada, 2009. Tous droits réservés
Rogue threats

• Good guys friendly/unaware
  – Implement by users to facilitate network
    access, always against organization policy
    (when they exist…)
• Malicious
  – To provide network backdoor
• Unintended
  – Authorized but misconfigured equipment


               © Bell Canada, 2009. Tous droits réservés
Ad-Hoc mode
• Ad-hoc mode are insecure
  – All stations control the communication no APs
  – Unencrypted or WEP
     • Look the same or very close
     • With aircrack-ng you get the WEP key and import it in Wireshark
       to decrypt on the fly.
  – User may use windows bridging utility to give access to
    wire Lan from the ad-hoc segment




                     © Bell Canada, 2009. Tous droits réservés
Free WiFi acces
              Wonderfull Hot spot

• Hot spot controller only identifies
  authorized user by MAC+IP add
• At login, a popup logoff window is opened,
  normally block by popup-bloker
• Sessions stay active until inactivity timeout
• Excellent receipt for session Hijacking
  – Script to monitor inactivity
  – Spoof MAC and IP address (Pickupline)

               © Bell Canada, 2009. Tous droits réservés
Hot spot cont….

• Hotspot are identified only by SSID
• Station reach for the highest signal
• High power soft-AP may be use to capture
  clients


               Hotspot AP




             © Bell Canada, 2009. Tous droits réservés
Hot spot…Sidejacking.

• Common for popular sites to do authentication
  over HTTPS (Gmail)
  – and reverts to HTTP after authentication
• Raison they can support HTTPS for all users
  – HTTPS is an option you have to select
• The attack consist to retrieve the session cookie,
  no need of your credentials
  – Attacker can impersonate the user
  – Doesn’t affect the active session


                 © Bell Canada, 2009. Tous droits réservés
Hot spot injections Airpw

•   begin page_html
•   match ^(GET|POST)
•   ignore ^GET [^ ?]+.(jpg|jpeg|gif|png|tif|tiff)
•   response content/page_html
•   -----------------------------------------------------------------

•   HTTP/1.1 200 OK                                                             HTTP req
•   Connection: close                                                           sniff
•   Content-Type: text/html                                                                HTTP
                                                                                           response
•   <html><head><title>HELLO CSE!</title>
•   </head><body>
•   <blink><font size=+5 color=red>
•   Hello CSE! I'm watching you !
•   </font>
•   </blink>
•   <p>

                                                                  HTTP req
                             Internet


                                          © Bell Canada, 2009. Tous droits réservés
Hot spot recommendations

• Lack of layer 2 security require stronger
  upper-layer defences
• Personal firewall, HIPS, AV is a must and
  – Patch, patch, patch
• Restrict permitted SSID
• Use VPN tunnelled traffic at hotspots
• Security awareness for Hot spot utilisation


               © Bell Canada, 2009. Tous droits réservés
Black Berry

• They are secure, but users are not always
• Social engineering vulnerability
  – Malware download, turn de BB into a remote
    cam or microphone or redirect mail




              © Bell Canada, 2009. Tous droits réservés
6 things to consider

•   Security policy
•   Strong authentication
•   Strong encryption
•   Monitoring
•   Auditing
•   Security awareness



                © Bell Canada, 2009. Tous droits réservés
Social Engineering

 What is social engineering?




 Is there any social engineers in the room ?

              © Bell Canada, 2009. Tous droits réservés
Social Networks and Social Engineering




               © Bell Canada, 2009. Tous droits réservés
Social Engineering + Social Networks =



• Some people post their life
   – (Kids, vacations, etc..)
• Security relies on a username/password
   – Could be easy to get in
• ID spoofing
   – Could ask money to the victim’s known contacts
• Koobface
   – Worm – Infected 2.9M machines just in the US (Soc. Eng.)
       • Install a Web Server and fake antivirus, send fake messages,
       • Foils CAPTCHA, Steal Data,
       • Hijack Web sessions, Change Domain Name System (DNS)



                        © Bell Canada, 2009. Tous droits réservés
Social Networks and Social Engineering



• Microblog (Max 140 characters -> SMS)
• Security relies on a username/password
    – Could be easy to get in
• ID spoofing
    – Could ask money to the victim’s known contacts
• New way of spamming
• Are used to control Botnets
• All kind of information could be posted on it (same as forums, BB)
    – Corporate
    – Sensitive
    – Etc..




                          © Bell Canada, 2009. Tous droits réservés
Spam

• What is it ?
  Did you know that 86.4% of all e-mail in Sep 09 was spam ?

• Who ?

• Why ?

• When ?

• How ?


                   © Bell Canada, 2009. Tous droits réservés
Phishing

• What is it ?
  Did you know that 1 in 437 e-mails comprised a phishing attack?

• Who ?

• Why ?

• When ?

• How ?

• Here’s some examples…
                    © Bell Canada, 2009. Tous droits réservés
Example of Phishing




             © Bell Canada, 2009. Tous droits réservés
Example of Phishing




             © Bell Canada, 2009. Tous droits réservés
XSS example                         Web Site
                                  (very popular)




User
                                     Web Site
                                (vulnerable to XSS)
         © Bell Canada, 2009. Tous droits réservés
XSS example                         Web Site
                                  (very popular)




User
                                     Web Site
                                (vulnerable to XSS)
         © Bell Canada, 2009. Tous droits réservés
Another Example <Metasploit>




             © Bell Canada, 2009. Tous droits réservés
Spamming + phishing = Lo$$ & Profit$


                           Lo$$ & Profit$




                                                           ng
             Ph




                                                           mi
                is




                                                         am
                   hi
                      ng




                                                       Sp




               © Bell Canada, 2009. Tous droits réservés
The infamous botnet


                 Relay
                 Japan


  Relay
  Russia

               IRC Servers
               (Internet Relay Chat)

Relay
China



  IRC client
  Cuba



               © Bell Canada, 2009. Tous droits réservés
Methodes of propagation




             © Bell Canada, 2009. Tous droits réservés
X                        OK




© Bell Canada, 2009. Tous droits réservés
© Bell Canada, 2009. Tous droits réservés
Peer to peer botnet




            © Bell Canada, 2009. Tous droits réservés
Fast flux botnet




             © Bell Canada, 2009. Tous droits réservés
Botnet controled via Twitter




            © Bell Canada, 2009. Tous droits réservés
Botnet controled via Google Groups




            © Bell Canada, 2009. Tous droits réservés
Security in surface…




                     Intrusion Detection


                                            Antivirus
            Firewall




            © Bell Canada, 2009. Tous droits réservés
Security in depth



                                        Intrusion Detection
                                                                           Communications and
                                                                            Communications and
       Security Policy
        Security Policy                                                    Operations Management
                                                                            Operations Management
                                                               Antivirus
                               Firewall
  Organizational Security
   Organizational Security                                                 Access Control
                                                                            Access Control



Information Classification
 Information Classification                                                Systems Development and
                                                                            Systems Development and
                                                                           Maintenance
                                                                            Maintenance

Personnel Security
 Personnel Security                                                        Business Continuity
                                                                            Business Continuity
                                                                           Management
                                                                            Management

Physical and Environmental
 Physical and Environmental                                                Compliance
                                                                            Compliance
Security
 Security


                              * 10 domains of security - ISO 17799
                               © Bell Canada, 2009. Tous droits réservés
Information security sometimes
require solutions, that may not be in
              “a box”…




          © Bell Canada, 2009. Tous droits réservés
Questions ?




© Bell Canada, 2009. Tous droits réservés

Weitere ähnliche Inhalte

Was ist angesagt?

Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Erkhembaatar M.
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItDan York
 
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...Brad Fortner
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAmmar WK
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
Video Conferencing Solutions
Video Conferencing SolutionsVideo Conferencing Solutions
Video Conferencing SolutionsVideoguy
 
Axeos Brochure
Axeos BrochureAxeos Brochure
Axeos Brochureaxeos
 
Brickcom mission impossible technology reveal wireless full hd 1080p ip surv...
Brickcom  mission impossible technology reveal wireless full hd 1080p ip surv...Brickcom  mission impossible technology reveal wireless full hd 1080p ip surv...
Brickcom mission impossible technology reveal wireless full hd 1080p ip surv...Ali Shoaee
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...Benoit Michel
 
Implementing Uncompressed over IP in software and the pitfalls
Implementing Uncompressed over IP in software and the pitfallsImplementing Uncompressed over IP in software and the pitfalls
Implementing Uncompressed over IP in software and the pitfallsKieran Kunhya
 
Ipecs sbg-1000 brochure
Ipecs sbg-1000 brochureIpecs sbg-1000 brochure
Ipecs sbg-1000 brochureWill Morey
 
Above Net Brief Overview
Above Net Brief OverviewAbove Net Brief Overview
Above Net Brief Overviewligon10
 

Was ist angesagt? (18)

Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
Pioneer Global IP PBX
Pioneer Global IP PBX Pioneer Global IP PBX
Pioneer Global IP PBX
 
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...
Interactive Content Authoring for A153 ATSC Mobile Digital Television Employi...
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and Profit
 
iptsp bangladesh, Shohel Shikdar at MetroNet Bangladesh ltd
iptsp bangladesh, Shohel Shikdar at MetroNet Bangladesh ltdiptsp bangladesh, Shohel Shikdar at MetroNet Bangladesh ltd
iptsp bangladesh, Shohel Shikdar at MetroNet Bangladesh ltd
 
FOSS in Broadcast
FOSS in BroadcastFOSS in Broadcast
FOSS in Broadcast
 
Solo Home Gateway
Solo Home GatewaySolo Home Gateway
Solo Home Gateway
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
Video Conferencing Solutions
Video Conferencing SolutionsVideo Conferencing Solutions
Video Conferencing Solutions
 
Axeos Brochure
Axeos BrochureAxeos Brochure
Axeos Brochure
 
Brickcom mission impossible technology reveal wireless full hd 1080p ip surv...
Brickcom  mission impossible technology reveal wireless full hd 1080p ip surv...Brickcom  mission impossible technology reveal wireless full hd 1080p ip surv...
Brickcom mission impossible technology reveal wireless full hd 1080p ip surv...
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
TELKOM IPTV
TELKOM IPTVTELKOM IPTV
TELKOM IPTV
 
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...
 
Implementing Uncompressed over IP in software and the pitfalls
Implementing Uncompressed over IP in software and the pitfallsImplementing Uncompressed over IP in software and the pitfalls
Implementing Uncompressed over IP in software and the pitfalls
 
Ipecs sbg-1000 brochure
Ipecs sbg-1000 brochureIpecs sbg-1000 brochure
Ipecs sbg-1000 brochure
 
Above Net Brief Overview
Above Net Brief OverviewAbove Net Brief Overview
Above Net Brief Overview
 

Andere mochten auch

資訊科技與教育 網路沉迷
資訊科技與教育 網路沉迷資訊科技與教育 網路沉迷
資訊科技與教育 網路沉迷fennir
 
Cloud computing: i trend 2012
Cloud computing: i trend 2012Cloud computing: i trend 2012
Cloud computing: i trend 2012ENTER S.r.l.
 
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1ENTER S.r.l.
 
Cloudup, cloud server al minuto
Cloudup, cloud server al minutoCloudup, cloud server al minuto
Cloudup, cloud server al minutoENTER S.r.l.
 
La sfida per gli ISP, tra sicurezza e flessibilità
La sfida per gli ISP, tra sicurezza e flessibilitàLa sfida per gli ISP, tra sicurezza e flessibilità
La sfida per gli ISP, tra sicurezza e flessibilitàENTER S.r.l.
 
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2ENTER S.r.l.
 

Andere mochten auch (9)

Portfolio Chimera 2012
Portfolio Chimera 2012Portfolio Chimera 2012
Portfolio Chimera 2012
 
資訊科技與教育 網路沉迷
資訊科技與教育 網路沉迷資訊科技與教育 網路沉迷
資訊科技與教育 網路沉迷
 
VIRTUAL CLASSRROM
VIRTUAL CLASSRROMVIRTUAL CLASSRROM
VIRTUAL CLASSRROM
 
Cloud computing: i trend 2012
Cloud computing: i trend 2012Cloud computing: i trend 2012
Cloud computing: i trend 2012
 
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1
Cloud survey2012: lo stato del cloud computing in Italia. Capitolo 1
 
Cloudup, cloud server al minuto
Cloudup, cloud server al minutoCloudup, cloud server al minuto
Cloudup, cloud server al minuto
 
elisa
elisaelisa
elisa
 
La sfida per gli ISP, tra sicurezza e flessibilità
La sfida per gli ISP, tra sicurezza e flessibilitàLa sfida per gli ISP, tra sicurezza e flessibilità
La sfida per gli ISP, tra sicurezza e flessibilità
 
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2
Cloud survey 2012: lo stato del cloud computing in Italia. Capitolo 2
 

Ähnlich wie Thank you for collaborating with your local hackers

Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 
Uncommon MiTM in uncommon conditions
Uncommon MiTM in uncommon conditionsUncommon MiTM in uncommon conditions
Uncommon MiTM in uncommon conditionsHeadLightSecurity
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1Adebayo Ojo
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
[2014] Sigfox - Why all the fuss
[2014] Sigfox - Why all the fuss [2014] Sigfox - Why all the fuss
[2014] Sigfox - Why all the fuss Nicolas Lesconnec
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"Defcon Moscow
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 

Ähnlich wie Thank you for collaborating with your local hackers (20)

Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
Uncommon MiTM in uncommon conditions
Uncommon MiTM in uncommon conditionsUncommon MiTM in uncommon conditions
Uncommon MiTM in uncommon conditions
 
2012 ah vegas wlan security fundamentals
2012 ah vegas   wlan security fundamentals2012 ah vegas   wlan security fundamentals
2012 ah vegas wlan security fundamentals
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
[2014] Sigfox - Why all the fuss
[2014] Sigfox - Why all the fuss [2014] Sigfox - Why all the fuss
[2014] Sigfox - Why all the fuss
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Nokia E7-00
Nokia  E7-00Nokia  E7-00
Nokia E7-00
 
Download It
Download ItDownload It
Download It
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Top 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison leeTop 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison lee
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 

Mehr von michelcusin

Combler les écarts en sécurité de l'information
Combler les écarts en sécurité de l'informationCombler les écarts en sécurité de l'information
Combler les écarts en sécurité de l'informationmichelcusin
 
Sécurité de l’information: L’importance du réveil des organisations.
Sécurité de l’information: L’importance du réveil des organisations.Sécurité de l’information: L’importance du réveil des organisations.
Sécurité de l’information: L’importance du réveil des organisations.michelcusin
 
Article prot vs_def_secus_10_12
Article prot vs_def_secus_10_12Article prot vs_def_secus_10_12
Article prot vs_def_secus_10_12michelcusin
 
Article_pentest_Secus 10 12
Article_pentest_Secus 10 12Article_pentest_Secus 10 12
Article_pentest_Secus 10 12michelcusin
 
Social Engineer Toolkit: quand la machine attaque l’humain
Social Engineer Toolkit: quand la machine attaque l’humainSocial Engineer Toolkit: quand la machine attaque l’humain
Social Engineer Toolkit: quand la machine attaque l’humainmichelcusin
 
Intrusions et gestion d’incidents informatique
Intrusions et gestion d’incidents informatiqueIntrusions et gestion d’incidents informatique
Intrusions et gestion d’incidents informatiquemichelcusin
 
Vos enfants, Internet et vous
Vos enfants, Internet et vousVos enfants, Internet et vous
Vos enfants, Internet et vousmichelcusin
 
Pwn plug: Arme fatale
Pwn plug: Arme fatalePwn plug: Arme fatale
Pwn plug: Arme fatalemichelcusin
 
Article secus 05_11_pwnplug
Article secus 05_11_pwnplugArticle secus 05_11_pwnplug
Article secus 05_11_pwnplugmichelcusin
 
Le piratage à la portée de tout le monde
Le piratage à la portée de tout le mondeLe piratage à la portée de tout le monde
Le piratage à la portée de tout le mondemichelcusin
 
Maitriser l'art du kung fu cqsi2010
Maitriser l'art du kung fu cqsi2010Maitriser l'art du kung fu cqsi2010
Maitriser l'art du kung fu cqsi2010michelcusin
 
Article mc secus_10_10
Article mc secus_10_10Article mc secus_10_10
Article mc secus_10_10michelcusin
 
Présentation menaces web2.0_cqsi_2008
Présentation menaces web2.0_cqsi_2008Présentation menaces web2.0_cqsi_2008
Présentation menaces web2.0_cqsi_2008michelcusin
 
Présentation botnet u_laval
Présentation botnet u_lavalPrésentation botnet u_laval
Présentation botnet u_lavalmichelcusin
 
Colloque cyber 2010 les botnets
Colloque cyber 2010   les botnetsColloque cyber 2010   les botnets
Colloque cyber 2010 les botnetsmichelcusin
 
Article secus 09_09
Article secus 09_09Article secus 09_09
Article secus 09_09michelcusin
 
Article mc secus_05_10
Article mc secus_05_10Article mc secus_05_10
Article mc secus_05_10michelcusin
 
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...Comment les administrateurs de systèmes peuvent ils détecter les pirates info...
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...michelcusin
 

Mehr von michelcusin (18)

Combler les écarts en sécurité de l'information
Combler les écarts en sécurité de l'informationCombler les écarts en sécurité de l'information
Combler les écarts en sécurité de l'information
 
Sécurité de l’information: L’importance du réveil des organisations.
Sécurité de l’information: L’importance du réveil des organisations.Sécurité de l’information: L’importance du réveil des organisations.
Sécurité de l’information: L’importance du réveil des organisations.
 
Article prot vs_def_secus_10_12
Article prot vs_def_secus_10_12Article prot vs_def_secus_10_12
Article prot vs_def_secus_10_12
 
Article_pentest_Secus 10 12
Article_pentest_Secus 10 12Article_pentest_Secus 10 12
Article_pentest_Secus 10 12
 
Social Engineer Toolkit: quand la machine attaque l’humain
Social Engineer Toolkit: quand la machine attaque l’humainSocial Engineer Toolkit: quand la machine attaque l’humain
Social Engineer Toolkit: quand la machine attaque l’humain
 
Intrusions et gestion d’incidents informatique
Intrusions et gestion d’incidents informatiqueIntrusions et gestion d’incidents informatique
Intrusions et gestion d’incidents informatique
 
Vos enfants, Internet et vous
Vos enfants, Internet et vousVos enfants, Internet et vous
Vos enfants, Internet et vous
 
Pwn plug: Arme fatale
Pwn plug: Arme fatalePwn plug: Arme fatale
Pwn plug: Arme fatale
 
Article secus 05_11_pwnplug
Article secus 05_11_pwnplugArticle secus 05_11_pwnplug
Article secus 05_11_pwnplug
 
Le piratage à la portée de tout le monde
Le piratage à la portée de tout le mondeLe piratage à la portée de tout le monde
Le piratage à la portée de tout le monde
 
Maitriser l'art du kung fu cqsi2010
Maitriser l'art du kung fu cqsi2010Maitriser l'art du kung fu cqsi2010
Maitriser l'art du kung fu cqsi2010
 
Article mc secus_10_10
Article mc secus_10_10Article mc secus_10_10
Article mc secus_10_10
 
Présentation menaces web2.0_cqsi_2008
Présentation menaces web2.0_cqsi_2008Présentation menaces web2.0_cqsi_2008
Présentation menaces web2.0_cqsi_2008
 
Présentation botnet u_laval
Présentation botnet u_lavalPrésentation botnet u_laval
Présentation botnet u_laval
 
Colloque cyber 2010 les botnets
Colloque cyber 2010   les botnetsColloque cyber 2010   les botnets
Colloque cyber 2010 les botnets
 
Article secus 09_09
Article secus 09_09Article secus 09_09
Article secus 09_09
 
Article mc secus_05_10
Article mc secus_05_10Article mc secus_05_10
Article mc secus_05_10
 
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...Comment les administrateurs de systèmes peuvent ils détecter les pirates info...
Comment les administrateurs de systèmes peuvent ils détecter les pirates info...
 

Kürzlich hochgeladen

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Kürzlich hochgeladen (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Thank you for collaborating with your local hackers

  • 1. Thank you for collaborating with your local h4¢k3r$ ! h4¢ C: C:>format C:Y/N _ Christian “Check your Wifi” Frenette Michel “You’ve been H4x0r3d!” Cusin CSE Conference – Mont-Tremblant October 16, 2009 © Bell Canada, 2009. Tous droits réservés
  • 2. Start to think out of the box… … and realize what hackers know that you don't… ! Because they WILL use it to their advantage, against you or your customers ! © Bell Canada, 2009. Tous droits réservés
  • 3. Let’s try to think out of the box… • How can we make 4 triangles, with 6 matches… ? © Bell Canada, 2009. Tous droits réservés
  • 4. ? ? © Bell Canada, 2009. Tous droits réservés
  • 5. You have to think out of the box, just like the hackers do… 3 1 2 4 3 You know we’re getting at… Right ? © Bell Canada, 2009. Tous droits réservés
  • 6. Overview of the presentation • Public information gathering • The WiFi Landscape • Social Networks / Social hacking / Engineering • Spamming, phishing & Cross-site Scripting • The infamous Botnets © Bell Canada, 2009. Tous droits réservés
  • 7. Public information gathering • Whois, nslookup / dig, ARIN, RF monitoring, etc… • Google (Maps / Earth, Groups, Blogs, Images, etc…) • Wigle.net, Wireless Geographic Loggin Engine • Enterprise Register • Specialized tools (Maltego, Lazy Champ, Kismet, etc…) • Social Networking Sites • Did you know you were leaking that much..? © Bell Canada, 2009. Tous droits réservés
  • 8. The WiFi Landscape • Use Radio frequencies • Electromagnetic shared medium, think hub ! • Physical environment dependencies • Users can move, Phy environment can change • CSMA/CA instead CSMA/CD, or transmit and pray • Indoor / outdoor • Antenna pattern • New security considerations © Bell Canada, 2009. Tous droits réservés
  • 9. New vector to protect from…. • Protect network from unauthorized users • Rogue AP, session hijacking, eavesdropping • Protect users from unauthorized networks – Fake AP Network Users © Bell Canada, 2009. Tous droits réservés
  • 10. Don’t • Disclose personal information in the SSID name of your network • Relying on masking your SSID is useless: – Provide a false sense of security – User don’t know and reach for other – The stations are broadcasting the SSID they’re trying to reach anyway (Probe requests) • Filtering MAC addresses is useless – Always transmit in clear text – Easy to spoof © Bell Canada, 2009. Tous droits réservés
  • 11. © Bell Canada, 2009. Tous droits réservés
  • 12. © Bell Canada, 2009. Tous droits réservés
  • 13. © Bell Canada, 2009. Tous droits réservés
  • 14. DOS attack require expensive equipements • Micro-wave fork attack • WiFi jammer Gighz, Usually 2.450 Gighz, just between Ch 8-9, in the ISM band and 500- 500- 1000 watts !!! Vs AP 4 watts © Bell Canada, 2009. Tous droits réservés
  • 15. We are protected… • We have firewall – Facing Internet ! (dude!!!) – We provide a corporate Lan access jack • in the parking lot (WiFi) • We don’t have any wireless… neither policies ! – Neither wireless detection, ;-( – Laptop with WiFi card (ad-hoc mode) Internet © Bell Canada, 2009. Tous droits réservés
  • 16. Authentication & encryption • We use encryption – WEP-RC4 or TKIP-RC4, AES-CCMP • We use authentication – PSK or Enterprise (Eg: Radius) – SSID, 802.1x, EAP-TLS, PEAP, etc, (PWD, Certificat) – EAP, Sitting on WEP/TKIP, AES ? – Always use strong password policy (LEAP— ASLEAP) © Bell Canada, 2009. Tous droits réservés
  • 17. Working @ home • I use WEP, WPA-PSK – you are acting like a rogue AP, if your home network is not protect • Anayway, I use VPN to connect to the office – Your lucky, if it never drop when your not in front of your PC – Enforce layer 2 security even if you use VPN • All PCs at home are safe – Kids PCs, Playstation, lots of treath from the inside © Bell Canada, 2009. Tous droits réservés
  • 18. Rogue threats • Good guys friendly/unaware – Implement by users to facilitate network access, always against organization policy (when they exist…) • Malicious – To provide network backdoor • Unintended – Authorized but misconfigured equipment © Bell Canada, 2009. Tous droits réservés
  • 19. Ad-Hoc mode • Ad-hoc mode are insecure – All stations control the communication no APs – Unencrypted or WEP • Look the same or very close • With aircrack-ng you get the WEP key and import it in Wireshark to decrypt on the fly. – User may use windows bridging utility to give access to wire Lan from the ad-hoc segment © Bell Canada, 2009. Tous droits réservés
  • 20. Free WiFi acces Wonderfull Hot spot • Hot spot controller only identifies authorized user by MAC+IP add • At login, a popup logoff window is opened, normally block by popup-bloker • Sessions stay active until inactivity timeout • Excellent receipt for session Hijacking – Script to monitor inactivity – Spoof MAC and IP address (Pickupline) © Bell Canada, 2009. Tous droits réservés
  • 21. Hot spot cont…. • Hotspot are identified only by SSID • Station reach for the highest signal • High power soft-AP may be use to capture clients Hotspot AP © Bell Canada, 2009. Tous droits réservés
  • 22. Hot spot…Sidejacking. • Common for popular sites to do authentication over HTTPS (Gmail) – and reverts to HTTP after authentication • Raison they can support HTTPS for all users – HTTPS is an option you have to select • The attack consist to retrieve the session cookie, no need of your credentials – Attacker can impersonate the user – Doesn’t affect the active session © Bell Canada, 2009. Tous droits réservés
  • 23. Hot spot injections Airpw • begin page_html • match ^(GET|POST) • ignore ^GET [^ ?]+.(jpg|jpeg|gif|png|tif|tiff) • response content/page_html • ----------------------------------------------------------------- • HTTP/1.1 200 OK HTTP req • Connection: close sniff • Content-Type: text/html HTTP response • <html><head><title>HELLO CSE!</title> • </head><body> • <blink><font size=+5 color=red> • Hello CSE! I'm watching you ! • </font> • </blink> • <p> HTTP req Internet © Bell Canada, 2009. Tous droits réservés
  • 24. Hot spot recommendations • Lack of layer 2 security require stronger upper-layer defences • Personal firewall, HIPS, AV is a must and – Patch, patch, patch • Restrict permitted SSID • Use VPN tunnelled traffic at hotspots • Security awareness for Hot spot utilisation © Bell Canada, 2009. Tous droits réservés
  • 25. Black Berry • They are secure, but users are not always • Social engineering vulnerability – Malware download, turn de BB into a remote cam or microphone or redirect mail © Bell Canada, 2009. Tous droits réservés
  • 26. 6 things to consider • Security policy • Strong authentication • Strong encryption • Monitoring • Auditing • Security awareness © Bell Canada, 2009. Tous droits réservés
  • 27. Social Engineering What is social engineering? Is there any social engineers in the room ? © Bell Canada, 2009. Tous droits réservés
  • 28. Social Networks and Social Engineering © Bell Canada, 2009. Tous droits réservés
  • 29. Social Engineering + Social Networks = • Some people post their life – (Kids, vacations, etc..) • Security relies on a username/password – Could be easy to get in • ID spoofing – Could ask money to the victim’s known contacts • Koobface – Worm – Infected 2.9M machines just in the US (Soc. Eng.) • Install a Web Server and fake antivirus, send fake messages, • Foils CAPTCHA, Steal Data, • Hijack Web sessions, Change Domain Name System (DNS) © Bell Canada, 2009. Tous droits réservés
  • 30. Social Networks and Social Engineering • Microblog (Max 140 characters -> SMS) • Security relies on a username/password – Could be easy to get in • ID spoofing – Could ask money to the victim’s known contacts • New way of spamming • Are used to control Botnets • All kind of information could be posted on it (same as forums, BB) – Corporate – Sensitive – Etc.. © Bell Canada, 2009. Tous droits réservés
  • 31. Spam • What is it ? Did you know that 86.4% of all e-mail in Sep 09 was spam ? • Who ? • Why ? • When ? • How ? © Bell Canada, 2009. Tous droits réservés
  • 32. Phishing • What is it ? Did you know that 1 in 437 e-mails comprised a phishing attack? • Who ? • Why ? • When ? • How ? • Here’s some examples… © Bell Canada, 2009. Tous droits réservés
  • 33. Example of Phishing © Bell Canada, 2009. Tous droits réservés
  • 34. Example of Phishing © Bell Canada, 2009. Tous droits réservés
  • 35. XSS example Web Site (very popular) User Web Site (vulnerable to XSS) © Bell Canada, 2009. Tous droits réservés
  • 36. XSS example Web Site (very popular) User Web Site (vulnerable to XSS) © Bell Canada, 2009. Tous droits réservés
  • 37. Another Example <Metasploit> © Bell Canada, 2009. Tous droits réservés
  • 38. Spamming + phishing = Lo$$ & Profit$ Lo$$ & Profit$ ng Ph mi is am hi ng Sp © Bell Canada, 2009. Tous droits réservés
  • 39. The infamous botnet Relay Japan Relay Russia IRC Servers (Internet Relay Chat) Relay China IRC client Cuba © Bell Canada, 2009. Tous droits réservés
  • 40. Methodes of propagation © Bell Canada, 2009. Tous droits réservés
  • 41. X OK © Bell Canada, 2009. Tous droits réservés
  • 42. © Bell Canada, 2009. Tous droits réservés
  • 43. Peer to peer botnet © Bell Canada, 2009. Tous droits réservés
  • 44. Fast flux botnet © Bell Canada, 2009. Tous droits réservés
  • 45. Botnet controled via Twitter © Bell Canada, 2009. Tous droits réservés
  • 46. Botnet controled via Google Groups © Bell Canada, 2009. Tous droits réservés
  • 47. Security in surface… Intrusion Detection Antivirus Firewall © Bell Canada, 2009. Tous droits réservés
  • 48. Security in depth Intrusion Detection Communications and Communications and Security Policy Security Policy Operations Management Operations Management Antivirus Firewall Organizational Security Organizational Security Access Control Access Control Information Classification Information Classification Systems Development and Systems Development and Maintenance Maintenance Personnel Security Personnel Security Business Continuity Business Continuity Management Management Physical and Environmental Physical and Environmental Compliance Compliance Security Security * 10 domains of security - ISO 17799 © Bell Canada, 2009. Tous droits réservés
  • 49. Information security sometimes require solutions, that may not be in “a box”… © Bell Canada, 2009. Tous droits réservés
  • 50. Questions ? © Bell Canada, 2009. Tous droits réservés