SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Playing the Forensics
Game: Forensic Analysis of
Gaming Applications For
Fun and Profit
Peter Clemenko III
Who am I?
● Student at Wilmington University in
Computer Network Security
● Member of the 2nd place Community
College team in the 2012 DC3 Digital
Forensics Challenge
● Open Source Enthusiast
● Gamer who has way too much time on his
hands
Why gaming applications?
● Gaming is popular
○ 54 million enthusiast and performance PC gamers in
2012
■ http://www.tomshardware.com/news/jpr-pc-gamers-numbers-pc-gaming-dead,15530.html
● Gaming applications leave a lot of artifacts
○ Web browser history
○ Stored usernames and passwords
■ Sometimes in Base64, or worse...
○ Chat logs
● How many people actually bother with these
artifacts?
Web Browsers
Some gaming applications include web
browsers
● Gaming apps with browsers include:
○ Steam
○ Raptr
○ Origin
○ Overwolf
○ Xfire
● This presentation will only cover Steam
Why should we care about game
web browsers?
● Crucial evidence for the investigation might
be there.
● More attack vectors for pentests, social
engineering, and exploit development.
● You can use this evidence to build a profile
of the target.
○ What are their interests?
○ Were they somewhere they shouldn’t
have been?
Steam Web Browser
● Webkit based
○ Used to be Trident based, but switched to Webkit
before OSX release of Steam
● Limited functionality
○ No download, favorites, or history functionality.
● Artifacts on disk
○ localconfig files
■ Individual SQLite files
○ cookies
■ SQLite file Cookies
○ raw cache
■ raw file without the file extension
Image from mariokas123.deviantart.com
● Two browser storage locations
○ Steam Client cache
○ In game overlay cache
○ The only difference between these two is where they
are stored and what part of Steam stores it’s
browser cache there.
Password Storage
● Over the years, logging in is more common
in gaming.
● These applications usually offer you an
opportunity to remember your credentials.
○ Some of them don’t even ask, they just do it.
● Some games store their own credentials in
config files.
○ This is starting to go away as games are starting to
become more integrated with systems like Steam
and Origin.
● Some of these games however store
passwords in an insecure manner.
○ Some games store their passwords in Base64 or
even cleartext.
○ In the interest of being ethical and responsible, I will
not mention which programs are doing it.
It has to be asked however….
● These passwords might be reused
elsewhere and provide new attack vectors
○ More things to add to your wordlist
There’s an XKCD for everything…
Comic is a shortened version of http://xkcd.com/792/
Chat logs
● A lot of gaming related apps have chat
functionality built in. Some of them can be
configured to store chat logs locally.
● There are some cases however where chat
logs might not be there, or the application
might not store them.
○ Steam doesn’t store chat logs locally.
○ Other apps need logging enabled manually.
● Using config files to find weakly stored
passwords that might have been reused with
encrypted files of interest
● Building a targeted wordlist for password
cracking
How can both blue and red team
benefit?
● Enhancing forensics tools to search for
these artifacts
● Using the logs and artifacts to find out more
about a suspect
How can forensics people benefit?
How can red team benefit?
● Social Engineering
○ Build a profile of your target, some of the info gained
might be useful
● Gathering weakly stored credentials in the
hopes of password reuse
○ Maybe in the form of a Metasploit module?
● Use your imagination
Questions? Concerns? Feedback?
playing the forensics game

Weitere ähnliche Inhalte

Ähnlich wie playing the forensics game

Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Peter Sabev
 
GameTrader project
GameTrader projectGameTrader project
GameTrader projectjuan_aleman
 
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)Memory forensic analysis (aashish)
Memory forensic analysis (aashish)ClubHack
 
Hacknbeers sqli and cryptography
Hacknbeers sqli and cryptographyHacknbeers sqli and cryptography
Hacknbeers sqli and cryptographyMiguel Ibarra
 
Designing a pragmatic back-end service for mobile games
Designing a pragmatic back-end service for mobile gamesDesigning a pragmatic back-end service for mobile games
Designing a pragmatic back-end service for mobile gamesiFunFactory Inc.
 
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game development
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game developmentITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game development
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game developmentITCamp
 
Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Karl Fosaaen
 
Akshay-UNIT 20-LO-1,2,3&4-FINAL
Akshay-UNIT 20-LO-1,2,3&4-FINALAkshay-UNIT 20-LO-1,2,3&4-FINAL
Akshay-UNIT 20-LO-1,2,3&4-FINALAkshay
 
ICP: The Gamer's World Computer
ICP: The Gamer's World ComputerICP: The Gamer's World Computer
ICP: The Gamer's World Computerdjsalac
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesMichael Scovetta
 
Dedicated Game Servers
Dedicated Game ServersDedicated Game Servers
Dedicated Game Serverswebhostingguy
 
Social Gaming GameIS User Group Meeting
Social Gaming GameIS User Group MeetingSocial Gaming GameIS User Group Meeting
Social Gaming GameIS User Group MeetingAlmog Koren
 
Multiplayer Online Gaming
Multiplayer Online GamingMultiplayer Online Gaming
Multiplayer Online Gamingchetnamistry
 
Console development
Console developmentConsole development
Console developmentspartasoft
 
GDC Next 2013 - Synching Game States Across Multiple Devices
GDC Next 2013 - Synching Game States Across Multiple DevicesGDC Next 2013 - Synching Game States Across Multiple Devices
GDC Next 2013 - Synching Game States Across Multiple DevicesDavid Geurts
 
Computer Networks: An Introduction
Computer Networks: An IntroductionComputer Networks: An Introduction
Computer Networks: An Introductionsanand0
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
Game Models - A Different Approach
Game Models - A Different ApproachGame Models - A Different Approach
Game Models - A Different ApproachNick Pruehs
 
Gaming PC Market in India and issues related to privacy
Gaming PC Market in India and issues related to privacyGaming PC Market in India and issues related to privacy
Gaming PC Market in India and issues related to privacyAbinash Pradhan
 

Ähnlich wie playing the forensics game (20)

Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)
 
GameTrader project
GameTrader projectGameTrader project
GameTrader project
 
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
 
Hacknbeers sqli and cryptography
Hacknbeers sqli and cryptographyHacknbeers sqli and cryptography
Hacknbeers sqli and cryptography
 
Designing a pragmatic back-end service for mobile games
Designing a pragmatic back-end service for mobile gamesDesigning a pragmatic back-end service for mobile games
Designing a pragmatic back-end service for mobile games
 
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game development
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game developmentITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game development
ITCamp 2011 - Catalin Zima - Common pitfalls in Windows Phone 7 game development
 
Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612
 
Akshay-UNIT 20-LO-1,2,3&4-FINAL
Akshay-UNIT 20-LO-1,2,3&4-FINALAkshay-UNIT 20-LO-1,2,3&4-FINAL
Akshay-UNIT 20-LO-1,2,3&4-FINAL
 
ICP: The Gamer's World Computer
ICP: The Gamer's World ComputerICP: The Gamer's World Computer
ICP: The Gamer's World Computer
 
The Art of Tracking
The Art of TrackingThe Art of Tracking
The Art of Tracking
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
 
Dedicated Game Servers
Dedicated Game ServersDedicated Game Servers
Dedicated Game Servers
 
Social Gaming GameIS User Group Meeting
Social Gaming GameIS User Group MeetingSocial Gaming GameIS User Group Meeting
Social Gaming GameIS User Group Meeting
 
Multiplayer Online Gaming
Multiplayer Online GamingMultiplayer Online Gaming
Multiplayer Online Gaming
 
Console development
Console developmentConsole development
Console development
 
GDC Next 2013 - Synching Game States Across Multiple Devices
GDC Next 2013 - Synching Game States Across Multiple DevicesGDC Next 2013 - Synching Game States Across Multiple Devices
GDC Next 2013 - Synching Game States Across Multiple Devices
 
Computer Networks: An Introduction
Computer Networks: An IntroductionComputer Networks: An Introduction
Computer Networks: An Introduction
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Game Models - A Different Approach
Game Models - A Different ApproachGame Models - A Different Approach
Game Models - A Different Approach
 
Gaming PC Market in India and issues related to privacy
Gaming PC Market in India and issues related to privacyGaming PC Market in India and issues related to privacy
Gaming PC Market in India and issues related to privacy
 

Kürzlich hochgeladen

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 

Kürzlich hochgeladen (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 

playing the forensics game

  • 1. Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit Peter Clemenko III
  • 2. Who am I? ● Student at Wilmington University in Computer Network Security ● Member of the 2nd place Community College team in the 2012 DC3 Digital Forensics Challenge ● Open Source Enthusiast ● Gamer who has way too much time on his hands
  • 3. Why gaming applications? ● Gaming is popular ○ 54 million enthusiast and performance PC gamers in 2012 ■ http://www.tomshardware.com/news/jpr-pc-gamers-numbers-pc-gaming-dead,15530.html ● Gaming applications leave a lot of artifacts ○ Web browser history ○ Stored usernames and passwords ■ Sometimes in Base64, or worse... ○ Chat logs ● How many people actually bother with these artifacts?
  • 4. Web Browsers Some gaming applications include web browsers ● Gaming apps with browsers include: ○ Steam ○ Raptr ○ Origin ○ Overwolf ○ Xfire ● This presentation will only cover Steam
  • 5. Why should we care about game web browsers?
  • 6. ● Crucial evidence for the investigation might be there. ● More attack vectors for pentests, social engineering, and exploit development. ● You can use this evidence to build a profile of the target. ○ What are their interests? ○ Were they somewhere they shouldn’t have been?
  • 7. Steam Web Browser ● Webkit based ○ Used to be Trident based, but switched to Webkit before OSX release of Steam ● Limited functionality ○ No download, favorites, or history functionality. ● Artifacts on disk ○ localconfig files ■ Individual SQLite files ○ cookies ■ SQLite file Cookies ○ raw cache ■ raw file without the file extension
  • 9. ● Two browser storage locations ○ Steam Client cache ○ In game overlay cache ○ The only difference between these two is where they are stored and what part of Steam stores it’s browser cache there.
  • 10. Password Storage ● Over the years, logging in is more common in gaming. ● These applications usually offer you an opportunity to remember your credentials. ○ Some of them don’t even ask, they just do it.
  • 11.
  • 12. ● Some games store their own credentials in config files. ○ This is starting to go away as games are starting to become more integrated with systems like Steam and Origin. ● Some of these games however store passwords in an insecure manner. ○ Some games store their passwords in Base64 or even cleartext. ○ In the interest of being ethical and responsible, I will not mention which programs are doing it.
  • 13. It has to be asked however….
  • 14. ● These passwords might be reused elsewhere and provide new attack vectors ○ More things to add to your wordlist
  • 15. There’s an XKCD for everything… Comic is a shortened version of http://xkcd.com/792/
  • 16. Chat logs ● A lot of gaming related apps have chat functionality built in. Some of them can be configured to store chat logs locally. ● There are some cases however where chat logs might not be there, or the application might not store them. ○ Steam doesn’t store chat logs locally. ○ Other apps need logging enabled manually.
  • 17. ● Using config files to find weakly stored passwords that might have been reused with encrypted files of interest ● Building a targeted wordlist for password cracking How can both blue and red team benefit?
  • 18. ● Enhancing forensics tools to search for these artifacts ● Using the logs and artifacts to find out more about a suspect How can forensics people benefit?
  • 19. How can red team benefit? ● Social Engineering ○ Build a profile of your target, some of the info gained might be useful ● Gathering weakly stored credentials in the hopes of password reuse ○ Maybe in the form of a Metasploit module? ● Use your imagination

Hinweis der Redaktion

  1. Image from mariokas123.deviantart.com
  2. Client cache stores: Stores cache and cookies of the Steam client application, including steam community, big picture, and things opened in the web browser through the client application In game overlay cache stores: Stores cache and cookies of steam in game overlay
  3. Mention DRM, digital distro, and multiplayer as places to log in.
  4. Note that it’s not as simple as just base64 decode in most places, usually you are dealing with byte arrays.
  5. http://xkcd.com/792/
  6. Mention building a profile and social engineering if you have the chatlogs.