SlideShare a Scribd company logo
1 of 47
Download to read offline
SHATTERING THE DARK
CODE BLUE 2019, BLUEBOX 4
TEXT
WHO WE ARE
▸ Ken-ya YOSHIMURA (@ad3liae)
▸ Takahiro YOSHIMURA (@alterakey)
▸ Security researchers
▸ Monolith Works Inc. CEO/CTO
https://moonlithworks.co.jp/
TEXT
WHAT WE DO
▸ Security research and development
▸ iOS/Android Apps
→Financial, Games, IoT related, etc. (>200)
→trueseeing: Non-decompiling Android Application Vulnerability Scanner
[2017]
▸ Windows/Mac/Web/HTML5 Apps
→POS, RAD tools etc.
▸ Network/Web penetration testing
→PCI-DSS etc.
▸ Search engine reconnaissance
(aka. Google Hacking)
▸ Whitebox testing
▸ Forensic analysis
▸ Research
→Clairvoyance: concurrent lip reader [2019]
TEXT
WHAT WE DO
▸ CTF
▸ Enemy10, Sutegoma2
▸ METI CTFCJ 2012 Qual.: 1st
▸ METI CTFCJ 2012: 3rd
▸ DEF CON 21 CTF: 6th
▸ DEF CON 22 OpenCTF: 4th
▸ Talks:
DEF CON 25 Demo Labs
CODE BLUE 2017
DEF CON 27 AI Village etc.
DEFCON 2016 by Wiyre Media on flickr, CC-BY 2.0
TEXT
RELATED WORKS
▸ Web application vulnerability scanners
▸ Manual: Burp Suite, ZAP etc.
▸ Automatic: WebInspect etc.
TEXT
WHAT IS THE DARK WEB?
▸ Anonymized Web on (mostly) Tor
▸ Pure freedom and anarchism
▸ Hard-ish to identify users
→ CAPTCHAs are often deployed
▸ Traffic routes are randomized
→ Rather high TTLs
Onions by Mike Mozart on flickr, CC-BY 2.0
JOKER’S STASH
CASE STUDY #1
TEXT
JOKER’S STASH
▸ Fake credit card market?
TEXT
PREPARATION - TRADITIONAL
▸ Manual
▸ Crawl and build data flows:
Tedious, error-prone, and not repeatable
▸ Automatic
▸ Spider:
Not so comprehensive — insufficient
coverages
TEXT
SHATTER: THE IN-BETWEEN BEAUTY
▸ Our answer: Shatter
▸ Semi-automatic
▸ Repeatable
▸ Comprehensive
Shattering by chiaralily on flickr, CC-BY-NC 2.0
TEXT
PREPARATION - SHATTER
▸ Manually crawl, mark, and map
→ “Target maps”
▸ Edit target maps and go
▸ Target maps describe scans
▸ Marked requests will be recognized as
“targets”
▸ Data flows are mostly automatically deduced
— thus semi-automatic
▸ Same map gives same scan — repeatable
Planning by Jeremy Keith on flickr, CC-BY 2.0
TEXT
SHATTER TARGET MAP
▸ Are terse and readable YAMLs
▸ Comprised of:
▸ Analysises: What should we do
▸ Sessions: How should we do
▸ Identities: Who should we are
▸ Targets: Whom we approach to
▸ Flows: How we deduce parameters (opt.)
▸ Exploits: What we should do on findings
TEXT
ATTACK PLAN / EXECUTE
▸ Data flow map
▸ Flows are wholly deduced
▸ Massive parallel scan
→combats high TTLs
▸ Scanner is ZAP-compatible
(for now)
DEMO 1
AUTOMATIC
EXPLOITATION ATTEMPTS
TEXT
AFTERMATH
▸ Insanely old middleware
→Automatic exploitation attempt gave 500
▸ Operator identity:
“Evgenij Sokolov”,
“Bertrand Rasse”, possibly etc.
omerta.sup@gmail.com
▸ Operator works:
http://omerta.wf/ etc.
▸ cf. omerta (n)
1: a code of silence practiced by the Mafia; a refusal
to give evidence to the police about criminal activities
THE NIGHTMARE
CASE STUDY #2
TEXT
NIGHTMARE
▸ Black market
▸ Afterwork of Dream Market?
TEXT
PREPARATION - TRADITIONAL
▸ CAPTCHA
▸ Potential showstopper
TEXT
PREPARATION - SHATTER
▸ CAPTCHA
▸ Parameters can be deduced with code-
blocks
→ NN-based solvers can be attached!
CAPTCHA 102
▸ Recognizing glyphs in an image
▸ Hard to solve algorithmically
▸ 3-dimensional distortion
▸ Noise
LEARN TO RECOGNIZE
▸ Image classification problem
▸ CNN
Convolutional Neural Networks
▸ Supervised learning model
▸ Similar to visual cortex
▸ Good at spatial pattern recog.
▸ Robust against distortions and shifts
Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
LEARN TO RECOGNIZE
▸ For 5-chars:
(10+26)5 → 107∼ patterns
▸ Cannot be solved at once
▸ Just classifiers
Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
DIVIDE AND CONQUER
▸ OpenCV2
▸ De-speckling
▸ Extracting glyphs
▸ Errors due to lack of spacing
→ignoring for now
BREACH PLAN
▸ OpenCV2
▸ Glyph extraction
▸ CNN
▸ Glyph classfication
Chess Teacher by JB Kilpatrick on flickr, CC-BY 2.0
BREACH PLAN?
▸ What should we learn?
▸ Synthesized with generators
(tag=parameters)
▸ Gathered truths
(tag=pre-coordinated truths)
Question by Florence Ivy on flickr, CC-BY-ND 2.0
HUMANS TO SAVE US
▸ Anti-Captcha
▸ CAPTCHA recognition service run by
humans
▸ Gathered images and tags
→Now we can learn
▸ Human powered…? but:
▸ Tedious to recon generators
▸ Of course Shatter can use AC directly
GRAB THEM OUT
▸ Let’s gather CAPTCHAs
▸ We need ~2000
▸ High RTT!
(2~sec..)
Grab by Rutger Tuller on flickr, CC-BY 2.0
GRAB THEM OUT!
▸ asyncio super-parallel grabber
→No mercy
▸ 2000 imgs / ~48s
(24ms/img)
▸ Throughputs are not so bad
READ THEM OUT
▸ Read 2000 CAPTCHAs
▸ Out-of-charset reads
▸ Inaccurate glyph extracts
▸ Take only good reads!
DIVIDE AND CONQUER
▸ OpenCV2
▸ Shrink, despeckle, expand
▸ Glyph extraction
DIVIDE AND CONQUER
▸ Samples: 6305
▸ Should be around 10000… but
▸ Dropping glyph mis-extractions
▸ Dropping CAPTCHA mis-reads
RELENTLESS LEARNER
▸ CNN on Keras
▸ N×32x32x1 → 36 ([A-Z0-9])
▸ Preprocessing
▸ resize and thresholding
▸ Normalization: [0.0f .. 1.0f]
RELENTLESS LEARNER
▸ Keeping effective learning
▸ Small input: 32x32×1
▸ amsgrad (i.e. modified Adam)
▸ Test dataset
▸ 10% of original dataset
▸ Store the model in HDF5 format
→to continuous learning
LEARN TO BREAK
▸ 50 epochs → 30min.
Tensorflow 2.0 @ MBP 2017
▸ GPU?
▸ Keras uses automatically
▸ Only CUDA — MBP falls short :(
Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
LEARN TO BREAK!
▸ 99% acc. (even in other datasets)
→Excellent
▸ Recognizes even Anti-Captcha fails
▸ CNN: should need 500..1000/cls
▸ 175.1/cls in reality
▸ Small dataset :(
Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
CAPTCHA COMPROMISED
▸ Rarely misses for another dataset
PREPARATION - SHATTER (2)
▸ Attach to target map as a code block
▸ Feed the solver, return the result into the
parameter
TEXT
ATTACK PLAN / EXECUTE
▸ Data flow map
▸ CAPTCHAs are solved in realtime
DEMO 2
AUTOMATED SCAN,
SOLVING MULTIPLE CAPTCHAS
TEXT
AFTERMATH (2)
▸ We have breached CAPTCHA protection for
Nightmare
(again)
▸ Their CAPTCHAs are rather weak
(again)
No lock 2 by Jens Eilers Bischoff on flickr, CC-BY 2.0
TEXT
FREE AS FREEDOM
▸ http://sha.tter.io/
(GitHub repos will be announced there)
▸ AGPL-3: It remains free for good
▸ Currently under heavy workings on fixes and ..
▸ We are striving to make it not only useful but
also essential
Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ The dark web
▸ Anonymized Web
▸ Hard to name attackers
▸ CAPTCHAs are often deployed but _not_
effective!
▸ Related works are not sufficient
▸ Automatic: non-comprehensive
▸ Manual: non-repeatable
IMG_2988s by 不憂照相館 on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ Our answer: Shatter
▸ Semi-automatic
Crawl, mark, map, edit — you do
Scan — we do
▸ Repeatable
Same map gives the same scan
▸ Comprehensive
Because you crawl
▸ Beauty lies in “semi-autonomy”
Shattering by chiaralily on flickr, CC-BY-NC 2.0
TEXT
CONCLUSION
▸ Shatter can…
▸ Deduce params automatically, or with some
code
(solving CAPTCHAs, 2FAs, …)
▸ Fingerprint and stage attacks
▸ Actively exploit vulnerabilities
▸ Cooperate with other toolchains to deeper
analysis/exploitation
Mise en scène nocturne by Jean-François Renaud on flickr, CC-BY-ND 2.0
TEXT
CONCLUSION
▸ Shatter is
▸ At: http://sha.tter.io/
(GitHub repos will be announced there)
▸ Under AGPL-3: Free as freedom, for good
▸ Stay tuned!
▸ Under heavy workings on fixes and ..
▸ Should be available at 12/24/2019
Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ For hidden service operators:
▸ CAPTCHAs are not effective
▸ Better update your stack
▸ If you do bad things, you must be prepared
to be exposed
Menace by Kilworth Simmonds on flickr, CC-BY-ND 2.0
FIN.
28.10.2019 MONOLITH WORKS INC.

More Related Content

Similar to [CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura

Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Zoltan Balazs
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
BSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs BlueBSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs BlueAndrew Freeborn
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDMarc Manthey
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...CODE BLUE
 
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosCar Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosJay Turla
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class Chris Gates
 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)packetloop
 
Columbus WordCamp 2015
Columbus WordCamp 2015Columbus WordCamp 2015
Columbus WordCamp 2015Jason Packer
 
stackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure driftstackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure driftNETWAYS
 
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki WattJourneys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki WattOpenCredo
 
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...Maksim Shudrak
 
How We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating SystemHow We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating Systemsaulius_vl
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacPriyanka Aash
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
Aggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with AutomationAggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with AutomationCTruncer
 

Similar to [CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura (20)

Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
BSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs BlueBSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs Blue
 
Us 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimesUs 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimes
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Total E(A)gression defcon
Total E(A)gression   defconTotal E(A)gression   defcon
Total E(A)gression defcon
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
 
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosCar Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface Scenarios
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)
 
Columbus WordCamp 2015
Columbus WordCamp 2015Columbus WordCamp 2015
Columbus WordCamp 2015
 
stackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure driftstackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure drift
 
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki WattJourneys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
 
Sneaky computation
Sneaky computationSneaky computation
Sneaky computation
 
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
 
How We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating SystemHow We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating System
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
 
Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
Aggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with AutomationAggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with Automation
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 

Recently uploaded (20)

Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 

[CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura

  • 1. SHATTERING THE DARK CODE BLUE 2019, BLUEBOX 4
  • 2. TEXT WHO WE ARE ▸ Ken-ya YOSHIMURA (@ad3liae) ▸ Takahiro YOSHIMURA (@alterakey) ▸ Security researchers ▸ Monolith Works Inc. CEO/CTO https://moonlithworks.co.jp/
  • 3. TEXT WHAT WE DO ▸ Security research and development ▸ iOS/Android Apps →Financial, Games, IoT related, etc. (>200) →trueseeing: Non-decompiling Android Application Vulnerability Scanner [2017] ▸ Windows/Mac/Web/HTML5 Apps →POS, RAD tools etc. ▸ Network/Web penetration testing →PCI-DSS etc. ▸ Search engine reconnaissance (aka. Google Hacking) ▸ Whitebox testing ▸ Forensic analysis ▸ Research →Clairvoyance: concurrent lip reader [2019]
  • 4. TEXT WHAT WE DO ▸ CTF ▸ Enemy10, Sutegoma2 ▸ METI CTFCJ 2012 Qual.: 1st ▸ METI CTFCJ 2012: 3rd ▸ DEF CON 21 CTF: 6th ▸ DEF CON 22 OpenCTF: 4th ▸ Talks: DEF CON 25 Demo Labs CODE BLUE 2017 DEF CON 27 AI Village etc. DEFCON 2016 by Wiyre Media on flickr, CC-BY 2.0
  • 5. TEXT RELATED WORKS ▸ Web application vulnerability scanners ▸ Manual: Burp Suite, ZAP etc. ▸ Automatic: WebInspect etc.
  • 6. TEXT WHAT IS THE DARK WEB? ▸ Anonymized Web on (mostly) Tor ▸ Pure freedom and anarchism ▸ Hard-ish to identify users → CAPTCHAs are often deployed ▸ Traffic routes are randomized → Rather high TTLs Onions by Mike Mozart on flickr, CC-BY 2.0
  • 8. TEXT JOKER’S STASH ▸ Fake credit card market?
  • 9. TEXT PREPARATION - TRADITIONAL ▸ Manual ▸ Crawl and build data flows: Tedious, error-prone, and not repeatable ▸ Automatic ▸ Spider: Not so comprehensive — insufficient coverages
  • 10. TEXT SHATTER: THE IN-BETWEEN BEAUTY ▸ Our answer: Shatter ▸ Semi-automatic ▸ Repeatable ▸ Comprehensive Shattering by chiaralily on flickr, CC-BY-NC 2.0
  • 11. TEXT PREPARATION - SHATTER ▸ Manually crawl, mark, and map → “Target maps” ▸ Edit target maps and go ▸ Target maps describe scans ▸ Marked requests will be recognized as “targets” ▸ Data flows are mostly automatically deduced — thus semi-automatic ▸ Same map gives same scan — repeatable Planning by Jeremy Keith on flickr, CC-BY 2.0
  • 12. TEXT SHATTER TARGET MAP ▸ Are terse and readable YAMLs ▸ Comprised of: ▸ Analysises: What should we do ▸ Sessions: How should we do ▸ Identities: Who should we are ▸ Targets: Whom we approach to ▸ Flows: How we deduce parameters (opt.) ▸ Exploits: What we should do on findings
  • 13. TEXT ATTACK PLAN / EXECUTE ▸ Data flow map ▸ Flows are wholly deduced ▸ Massive parallel scan →combats high TTLs ▸ Scanner is ZAP-compatible (for now)
  • 15. TEXT AFTERMATH ▸ Insanely old middleware →Automatic exploitation attempt gave 500 ▸ Operator identity: “Evgenij Sokolov”, “Bertrand Rasse”, possibly etc. omerta.sup@gmail.com ▸ Operator works: http://omerta.wf/ etc. ▸ cf. omerta (n) 1: a code of silence practiced by the Mafia; a refusal to give evidence to the police about criminal activities
  • 17. TEXT NIGHTMARE ▸ Black market ▸ Afterwork of Dream Market?
  • 18. TEXT PREPARATION - TRADITIONAL ▸ CAPTCHA ▸ Potential showstopper
  • 19. TEXT PREPARATION - SHATTER ▸ CAPTCHA ▸ Parameters can be deduced with code- blocks → NN-based solvers can be attached!
  • 20. CAPTCHA 102 ▸ Recognizing glyphs in an image ▸ Hard to solve algorithmically ▸ 3-dimensional distortion ▸ Noise
  • 21. LEARN TO RECOGNIZE ▸ Image classification problem ▸ CNN Convolutional Neural Networks ▸ Supervised learning model ▸ Similar to visual cortex ▸ Good at spatial pattern recog. ▸ Robust against distortions and shifts Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
  • 22. LEARN TO RECOGNIZE ▸ For 5-chars: (10+26)5 → 107∼ patterns ▸ Cannot be solved at once ▸ Just classifiers Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
  • 23. DIVIDE AND CONQUER ▸ OpenCV2 ▸ De-speckling ▸ Extracting glyphs ▸ Errors due to lack of spacing →ignoring for now
  • 24. BREACH PLAN ▸ OpenCV2 ▸ Glyph extraction ▸ CNN ▸ Glyph classfication Chess Teacher by JB Kilpatrick on flickr, CC-BY 2.0
  • 25. BREACH PLAN? ▸ What should we learn? ▸ Synthesized with generators (tag=parameters) ▸ Gathered truths (tag=pre-coordinated truths) Question by Florence Ivy on flickr, CC-BY-ND 2.0
  • 26. HUMANS TO SAVE US ▸ Anti-Captcha ▸ CAPTCHA recognition service run by humans ▸ Gathered images and tags →Now we can learn ▸ Human powered…? but: ▸ Tedious to recon generators ▸ Of course Shatter can use AC directly
  • 27. GRAB THEM OUT ▸ Let’s gather CAPTCHAs ▸ We need ~2000 ▸ High RTT! (2~sec..) Grab by Rutger Tuller on flickr, CC-BY 2.0
  • 28. GRAB THEM OUT! ▸ asyncio super-parallel grabber →No mercy ▸ 2000 imgs / ~48s (24ms/img) ▸ Throughputs are not so bad
  • 29. READ THEM OUT ▸ Read 2000 CAPTCHAs ▸ Out-of-charset reads ▸ Inaccurate glyph extracts ▸ Take only good reads!
  • 30. DIVIDE AND CONQUER ▸ OpenCV2 ▸ Shrink, despeckle, expand ▸ Glyph extraction
  • 31. DIVIDE AND CONQUER ▸ Samples: 6305 ▸ Should be around 10000… but ▸ Dropping glyph mis-extractions ▸ Dropping CAPTCHA mis-reads
  • 32. RELENTLESS LEARNER ▸ CNN on Keras ▸ N×32x32x1 → 36 ([A-Z0-9]) ▸ Preprocessing ▸ resize and thresholding ▸ Normalization: [0.0f .. 1.0f]
  • 33. RELENTLESS LEARNER ▸ Keeping effective learning ▸ Small input: 32x32×1 ▸ amsgrad (i.e. modified Adam) ▸ Test dataset ▸ 10% of original dataset ▸ Store the model in HDF5 format →to continuous learning
  • 34. LEARN TO BREAK ▸ 50 epochs → 30min. Tensorflow 2.0 @ MBP 2017 ▸ GPU? ▸ Keras uses automatically ▸ Only CUDA — MBP falls short :( Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
  • 35. LEARN TO BREAK! ▸ 99% acc. (even in other datasets) →Excellent ▸ Recognizes even Anti-Captcha fails ▸ CNN: should need 500..1000/cls ▸ 175.1/cls in reality ▸ Small dataset :( Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
  • 36. CAPTCHA COMPROMISED ▸ Rarely misses for another dataset
  • 37. PREPARATION - SHATTER (2) ▸ Attach to target map as a code block ▸ Feed the solver, return the result into the parameter
  • 38. TEXT ATTACK PLAN / EXECUTE ▸ Data flow map ▸ CAPTCHAs are solved in realtime
  • 39. DEMO 2 AUTOMATED SCAN, SOLVING MULTIPLE CAPTCHAS
  • 40. TEXT AFTERMATH (2) ▸ We have breached CAPTCHA protection for Nightmare (again) ▸ Their CAPTCHAs are rather weak (again) No lock 2 by Jens Eilers Bischoff on flickr, CC-BY 2.0
  • 41. TEXT FREE AS FREEDOM ▸ http://sha.tter.io/ (GitHub repos will be announced there) ▸ AGPL-3: It remains free for good ▸ Currently under heavy workings on fixes and .. ▸ We are striving to make it not only useful but also essential Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
  • 42. TEXT CONCLUSION ▸ The dark web ▸ Anonymized Web ▸ Hard to name attackers ▸ CAPTCHAs are often deployed but _not_ effective! ▸ Related works are not sufficient ▸ Automatic: non-comprehensive ▸ Manual: non-repeatable IMG_2988s by 不憂照相館 on flickr, CC-BY-NC-ND 2.0
  • 43. TEXT CONCLUSION ▸ Our answer: Shatter ▸ Semi-automatic Crawl, mark, map, edit — you do Scan — we do ▸ Repeatable Same map gives the same scan ▸ Comprehensive Because you crawl ▸ Beauty lies in “semi-autonomy” Shattering by chiaralily on flickr, CC-BY-NC 2.0
  • 44. TEXT CONCLUSION ▸ Shatter can… ▸ Deduce params automatically, or with some code (solving CAPTCHAs, 2FAs, …) ▸ Fingerprint and stage attacks ▸ Actively exploit vulnerabilities ▸ Cooperate with other toolchains to deeper analysis/exploitation Mise en scène nocturne by Jean-François Renaud on flickr, CC-BY-ND 2.0
  • 45. TEXT CONCLUSION ▸ Shatter is ▸ At: http://sha.tter.io/ (GitHub repos will be announced there) ▸ Under AGPL-3: Free as freedom, for good ▸ Stay tuned! ▸ Under heavy workings on fixes and .. ▸ Should be available at 12/24/2019 Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
  • 46. TEXT CONCLUSION ▸ For hidden service operators: ▸ CAPTCHAs are not effective ▸ Better update your stack ▸ If you do bad things, you must be prepared to be exposed Menace by Kilworth Simmonds on flickr, CC-BY-ND 2.0