SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen
EVIL DATA MINING
 FOR FUN AND PROFIT!
Contents
● Web Scraping
● Quick and Dirty SQL Injections
● iPhones, WiFi and Evil Twins
● Hacking Neighbours
● Port scanning on Steroids
Introduction
●   Fredrik Nordberg Almroth (@Almroot)
    Head application engineer and co-founder @ detectify.com
    IT-security guy
    Hacked Google. Twice.

●   Johan Edholm (@norrskal)
    Server administrator and co-founder @ detectify.com
    Worked with IT security analytics and anti-scraping
    Studied system and network management in Linux
What is Detectify?




Detectify is an automated vulnerability scanner.
●   You sign up using beta code.
●   You press start!


●   Detectify emulates a hacking attack.
●   You get a report regarding your vulnerabilities.
●   Detectify is currently in closed beta!

●   You may try it for free using the beta code: HyperMine

●   http://detectify.com/

●   We love feedback! :)
What is data mining?
●   Data mining is mostly associated with statistics and machine learning.

●   ...or discovery of patterns (intelligence) in large datasets...

●   No fancy algorithms! Just real life examples.
Web scraping
● Grab content from websites
● Host somewhere else
● Study the data
● Sell the data
Web scraping
● Manual copy-paste
Web scraping
Web scraping
● Googlebot
Web scraping
● Bad scrapers
  ○ Downloadable or online tools
  ○ Homemade scripts
  ○ HTTP rewriters
Web scraping
● Homemade scripts
  ○   Made for one site/purpose
  ○   No hacking
  ○   May be against ToS
  ○   Probably legal
Web scraping
● Sosseblaskan.se
  ○   Copy of aftonbladet (rewrite)
  ○   A joke
  ○   Not ads for aftonbladet
  ○   Not phishing
  ○   Illegal
SQL
● Structured Query Language

● Used to talk with databases. MySQL, PostgreSQL, etc...
How it's used
● Websites use databases to maintain data.

● The SQL queries often contain user-data.

● You search on a website for a few keywords.

● The odds of it being done by some SQL dialect is huge.
What could possibly go wrong?
● User supplied data may alter the SQL query.

● Example:
   SELECT title FROM blog WHERE title = '$search_keywords';


● If the searched data contain a quote, the SQL query will
   break.

● Attackers may gain other data than just the "blog title".

● Usernames, passwords, emails, credit-cards...
SQL Injections
● Devastating attack.

● Worst part. It's really common.

● Remember Sony last year?
● Victims 2012.
  ○   eHarmony
  ○   last.fm
  ○   Yahoo!
  ○   Android Forums
  ○   Billabong
  ○   Formspring
  ○   nVidia
  ○   Gamigo
  ○   ...List goes on...
● Thousands of sites attacked daily.

● Incredibly easy to get going.

● Loads of guides and tools on the internet.

● Devastating for the vulnerable organizations.
LIVE DEMO!
(This is the time we'll stand here and struggle with the equipment.)
Fun with WLAN
● Create an evil twin
● Jasager
Evil twin
● You connect to eg. "espresso house free"
● iPhone will save and remember that network
● When you come back it will automatically
  connect
Evil twin
● Someone creates a network called
  "espresso house free"
● Your phone will automatically connect
What if the attacker don't know which
networks you've been connected to?
Jasager
Fun with WLAN
● Works on everything
  ○ Windows, linux, Mac, Android, iPhone etc
● Can be monitored
  ○ See which networks you are looking for and in which
    order
Fun with WLAN
WiGLE.net
IT-Security @ Home
● Devices on local networks.
  ○   Routers
  ○   Printers
  ○   Heat Pumps
  ○   Laptops
  ○   PC's
  ○   Tablets
  ○   Cellphones
  ○   XBOX'es
  ○   ...etc...
Telecom operator ComHem provide "Tre-hål-i-väggen"
● Routers may act as switches

● IP Forwarding

● You can see your neighbours devices
● Portscan!

● A port scanner finds open services on IP-
  addresses.

● nmap
● Find vulnerability
  or
● Weak (default) password
  or
● No password!


  Protip:
  http://www.routerpasswords.com/
GAME OVER
Conclusion
You can with ease gain access to your
neighbours data.
Speaking of portscanning...
● Spring 2010, the "spoon" project.

● Got interested in packet crafting.

● 3000 packets/second
● Sweden got 25.000.000 allocated IPv4-addresses.

● ...Results in a timeframe of 2 hours and 20 min to scan.

● Resolve all servers on a given port in a Sweden.

● Could of course be applied to any country.
● Early 2011, "spoon2".

● 30000 packets/second. Ten times as fast!

● From 2½ hour, to approximate 15 minutes.

● Same result.
● Imagine a company. Like ACME Corp.

● 10 servers running "spoon2".

● Get a fresh map of Sweden every 90 second.

● 100 servers, every 9'th second second.
● ACME Corp got potential to become a global "pingdom".

● Results in large scale data mining.

● Would require loads of clever algorithms and
  infrastructure to maintain it all though.
shodanhq.com
● The firm shodanhq already crawls countries for open
  services.

● Identified ~438.000 web servers in Sweden alone.

● Mostly devices found on local networks.
  (routers / printers).

● No security. Loads of vulnerable devices.
● Eavesdrop your neighbour? No problem.

● Why bother?

● Can be applied to a whole country.
Summary
● Web Scraping
● Quick and Dirty SQL Injections
● iPhones, WiFi and Evil Twins
● Hacking Neighbours
● Port scanning on Steroids
Q&A
     Hack the planet!




http://detectify.com/
References
●   http://www.theta44.org/karma/aawns.pdf

●   http://timtux.net/posts/10-Vad-delar-du-ut-IT-skerhet-i-hemmet

●   http://krebsonsecurity.com/2010/06/wi-fi-street-smarts-iphone-edition/

●   http://nmap.org/6/

●   http://www.ietf.org/rfc/rfc793.txt

●   http://www.ietf.org/rfc/rfc791.txt

●   http://www.ietf.org/rfc/rfc1323.txt

●   http://www.zdnet.com/sql-injection-attacks-up-69-7000001742/

Weitere ähnliche Inhalte

Was ist angesagt?

2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar
 

Was ist angesagt? (14)

2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web
Dark webDark web
Dark web
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Hacking its types and the art of exploitation
Hacking its types and the art of exploitationHacking its types and the art of exploitation
Hacking its types and the art of exploitation
 
Dark net
Dark netDark net
Dark net
 
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South AfricaSecrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Comprehensive guide for compromising network devices.
Comprehensive guide for compromising network devices.Comprehensive guide for compromising network devices.
Comprehensive guide for compromising network devices.
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopDefcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 

Ähnlich wie Hyper Island - 2012

Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
Michael Scovetta
 

Ähnlich wie Hyper Island - 2012 (20)

Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
 
IT in 2017
IT in 2017IT in 2017
IT in 2017
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
 
Security Vulnerabilities: How to Defend Against Them
Security Vulnerabilities: How to Defend Against ThemSecurity Vulnerabilities: How to Defend Against Them
Security Vulnerabilities: How to Defend Against Them
 
All Aboard The Stateful Train
All Aboard The Stateful TrainAll Aboard The Stateful Train
All Aboard The Stateful Train
 
On hacking & security
On hacking & security On hacking & security
On hacking & security
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
 
IntoWebGL - Unite Melbourne 2015
IntoWebGL - Unite Melbourne 2015IntoWebGL - Unite Melbourne 2015
IntoWebGL - Unite Melbourne 2015
 
Python in Industry
Python in IndustryPython in Industry
Python in Industry
 
An EyeWitness View into your Network
An EyeWitness View into your NetworkAn EyeWitness View into your Network
An EyeWitness View into your Network
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
IoT Session Thomas More
IoT Session Thomas MoreIoT Session Thomas More
IoT Session Thomas More
 
Cc internet of things @ Thomas More
Cc internet of things @ Thomas MoreCc internet of things @ Thomas More
Cc internet of things @ Thomas More
 
Crawling and Processing the Italian Corporate Web
Crawling and Processing the Italian Corporate WebCrawling and Processing the Italian Corporate Web
Crawling and Processing the Italian Corporate Web
 
The internet of $h1t
The internet of $h1tThe internet of $h1t
The internet of $h1t
 
IoT Presentation slides
IoT Presentation slidesIoT Presentation slides
IoT Presentation slides
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain Points
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Hyper Island - 2012

  • 1. EVIL DATA MINING FOR FUN AND PROFIT!
  • 2. Contents ● Web Scraping ● Quick and Dirty SQL Injections ● iPhones, WiFi and Evil Twins ● Hacking Neighbours ● Port scanning on Steroids
  • 3. Introduction ● Fredrik Nordberg Almroth (@Almroot) Head application engineer and co-founder @ detectify.com IT-security guy Hacked Google. Twice. ● Johan Edholm (@norrskal) Server administrator and co-founder @ detectify.com Worked with IT security analytics and anti-scraping Studied system and network management in Linux
  • 4. What is Detectify? Detectify is an automated vulnerability scanner.
  • 5. You sign up using beta code.
  • 6. You press start! ● Detectify emulates a hacking attack.
  • 7. You get a report regarding your vulnerabilities.
  • 8. Detectify is currently in closed beta! ● You may try it for free using the beta code: HyperMine ● http://detectify.com/ ● We love feedback! :)
  • 9. What is data mining? ● Data mining is mostly associated with statistics and machine learning. ● ...or discovery of patterns (intelligence) in large datasets... ● No fancy algorithms! Just real life examples.
  • 10. Web scraping ● Grab content from websites ● Host somewhere else ● Study the data ● Sell the data
  • 14. Web scraping ● Bad scrapers ○ Downloadable or online tools ○ Homemade scripts ○ HTTP rewriters
  • 15. Web scraping ● Homemade scripts ○ Made for one site/purpose ○ No hacking ○ May be against ToS ○ Probably legal
  • 16. Web scraping ● Sosseblaskan.se ○ Copy of aftonbladet (rewrite) ○ A joke ○ Not ads for aftonbladet ○ Not phishing ○ Illegal
  • 17. SQL ● Structured Query Language ● Used to talk with databases. MySQL, PostgreSQL, etc...
  • 18. How it's used ● Websites use databases to maintain data. ● The SQL queries often contain user-data. ● You search on a website for a few keywords. ● The odds of it being done by some SQL dialect is huge.
  • 19. What could possibly go wrong? ● User supplied data may alter the SQL query. ● Example: SELECT title FROM blog WHERE title = '$search_keywords'; ● If the searched data contain a quote, the SQL query will break. ● Attackers may gain other data than just the "blog title". ● Usernames, passwords, emails, credit-cards...
  • 21. ● Devastating attack. ● Worst part. It's really common. ● Remember Sony last year?
  • 22. ● Victims 2012. ○ eHarmony ○ last.fm ○ Yahoo! ○ Android Forums ○ Billabong ○ Formspring ○ nVidia ○ Gamigo ○ ...List goes on...
  • 23. ● Thousands of sites attacked daily. ● Incredibly easy to get going. ● Loads of guides and tools on the internet. ● Devastating for the vulnerable organizations.
  • 24. LIVE DEMO! (This is the time we'll stand here and struggle with the equipment.)
  • 25. Fun with WLAN ● Create an evil twin ● Jasager
  • 26. Evil twin ● You connect to eg. "espresso house free" ● iPhone will save and remember that network ● When you come back it will automatically connect
  • 27. Evil twin ● Someone creates a network called "espresso house free" ● Your phone will automatically connect
  • 28. What if the attacker don't know which networks you've been connected to?
  • 29.
  • 31. Fun with WLAN ● Works on everything ○ Windows, linux, Mac, Android, iPhone etc ● Can be monitored ○ See which networks you are looking for and in which order
  • 33. IT-Security @ Home ● Devices on local networks. ○ Routers ○ Printers ○ Heat Pumps ○ Laptops ○ PC's ○ Tablets ○ Cellphones ○ XBOX'es ○ ...etc...
  • 34. Telecom operator ComHem provide "Tre-hål-i-väggen"
  • 35. ● Routers may act as switches ● IP Forwarding ● You can see your neighbours devices
  • 36.
  • 37. ● Portscan! ● A port scanner finds open services on IP- addresses. ● nmap
  • 38.
  • 39. ● Find vulnerability or ● Weak (default) password or ● No password! Protip: http://www.routerpasswords.com/
  • 41. Conclusion You can with ease gain access to your neighbours data.
  • 42. Speaking of portscanning... ● Spring 2010, the "spoon" project. ● Got interested in packet crafting. ● 3000 packets/second
  • 43. ● Sweden got 25.000.000 allocated IPv4-addresses. ● ...Results in a timeframe of 2 hours and 20 min to scan. ● Resolve all servers on a given port in a Sweden. ● Could of course be applied to any country.
  • 44. ● Early 2011, "spoon2". ● 30000 packets/second. Ten times as fast! ● From 2½ hour, to approximate 15 minutes. ● Same result.
  • 45. ● Imagine a company. Like ACME Corp. ● 10 servers running "spoon2". ● Get a fresh map of Sweden every 90 second. ● 100 servers, every 9'th second second.
  • 46. ● ACME Corp got potential to become a global "pingdom". ● Results in large scale data mining. ● Would require loads of clever algorithms and infrastructure to maintain it all though.
  • 47. shodanhq.com ● The firm shodanhq already crawls countries for open services. ● Identified ~438.000 web servers in Sweden alone. ● Mostly devices found on local networks. (routers / printers). ● No security. Loads of vulnerable devices.
  • 48. ● Eavesdrop your neighbour? No problem. ● Why bother? ● Can be applied to a whole country.
  • 49. Summary ● Web Scraping ● Quick and Dirty SQL Injections ● iPhones, WiFi and Evil Twins ● Hacking Neighbours ● Port scanning on Steroids
  • 50. Q&A Hack the planet! http://detectify.com/
  • 51. References ● http://www.theta44.org/karma/aawns.pdf ● http://timtux.net/posts/10-Vad-delar-du-ut-IT-skerhet-i-hemmet ● http://krebsonsecurity.com/2010/06/wi-fi-street-smarts-iphone-edition/ ● http://nmap.org/6/ ● http://www.ietf.org/rfc/rfc793.txt ● http://www.ietf.org/rfc/rfc791.txt ● http://www.ietf.org/rfc/rfc1323.txt ● http://www.zdnet.com/sql-injection-attacks-up-69-7000001742/