extreme hacking: encrypted networks swat style - wayne burke

23
Extreme Hacking Encrypted Networks SWAT Style © 2015 Wayne M Burke – Sequrit CSi BV All rights reserved Source: batblue.com By: Wayne Burke

Upload: ec-council

Post on 21-Jan-2018

502 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Extreme  HackingEncrypted  Networks  SWAT  Style

©  2015    Wayne  M  Burke    – Sequrit CSi BV      -­ All  rights  reservedSource:  batblue.com

By:  Wayne  Burke

Page 2: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

“Uncertainty  is  the  only  certainty  there  is,  and  knowing  how  to  live  with  insecurity  is  the  only  security.”

-­‐ John  Allen  Paulos

Wayne  Quick  Intro:• IT  since  ZX-­‐Spec  /  Com64• Microsoft  MCSE  /  MCT  from  NT4• Certs:Cisco,  UNIX  /  Linux,  MS,  Security• Master  EC-­‐Council  Instructor• Author  CAST  612  Adv  Mobile  HackingSpecializing  in  Mobile  Device  Digital  Forensics,  Hacking  and  Security  Testing  for:Apple  iDevices,  Google  Androids  &  Blackberry• Blended  Learning  Security  Video  Productions.

• Miami• Singapore• Malaysia• Egypt>>  2010  >  2015  Series  <<

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 3: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Page 4: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Snowden  the  Apocalypse  

Image  Source:http://vtec1800.deviantart.com/art/Edward-­Snowden-­381628497

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reservedhttp://ozelotstudios.deviantart.com/art/Snowden-­381105666

Page 5: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Latest  SSL/TLS  Weakness:

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Image  PLACEMARKER  – NSA  Intercept

Page 6: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

The  LogJam Attack:  https://weakdh.org/

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 7: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

The  FREAK  Attack:  https://weakdh.org/

Page 8: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

SSL  Handshake  -­ Diffie Hellman

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 9: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Picture  by  Frank  Moritz

Page 10: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Image  PLACEMARKER  – NSA  Intercept  -­ TURMOIL

Page 11: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Image  PLACEMARKER  – NSA  Intercept  -­ PRISM

Page 12: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Image  PLACEMARKER  – GHCQ  Intercept  -­ SIGDEV

Page 13: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Image  PLACEMARKER  – NSA  Intercept  -­ SKYNET

Page 14: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Hacking  smartphones

The  2007  NSA  wish  book  for  analysts  also  includes  a  number  of  software  tools  that  allow  data  to  be  stolen  from  a  variety  of  smartphones  and  dumb  cell  phones.  One  software  hack,  called  DROPOUTJEEP,  is  a  software  implant  for  Apple  iOS  devices  that  allows  the  NSA  to  remotely  control  and  monitor  nearly  all  the  features  of  an  iPhone,  including  geolocation,  text  messages,  and  the  microphone  and  camera.  (Researcher  and  developer  Jake  Appelbaum,  who  helped  write  the  Spiegel  article  revealing  the  documents,  said  separately  this  week  that  the  NSA  claims  DROPOUTJEEP  installations  are  always  successful.)

Page 15: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

The  NSA  documents  describing  DROPOUTJEEP  boast  that  every  attempt  to  implant  the  malware  on  iPhones  will  always  succeed,  

Appelbaum reports.

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Image  PLACEMARKER  – NSA  Intercept  -­ DROPOUTJEEP

Page 16: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Poodle  SSL

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 17: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Poodle  Attack

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 18: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

What  You  Need  To  Do  To  Prevent  a  POODLE  Attack  on  Your  Web  

Browser(s):

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

There  are  a  few  ways  to  stop  this  vulnerability  from  compromising  websites.  They  are:

Fallback  SCSV.Disabling  SSLv3  on  the  client  side.Disabling  SSLv3  on  the  server  side.Disabling  CBC  cipher  suites  in  SSLv3.

However,  ‘Disabling  SSLv3  entirely’  seems  to  be  the  current  trend  being  practiced  by  most  websites.  Users  need  to  follow  the  instructions  below  disable  SSLv3  from  the  major  browsers.

https://www.thesslstore.com/blog/ssl3-­poodle-­vulnerability-­affects-­oodles/

Page 19: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Browser  Failback

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 20: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

The  Weapons  (Software  /  Hardware)

�MITMf – Partial  HSTS  Bypass  +  ManyMore

�Wi-­Fi  Evil  AP’s  – Easy-­Creds /  PwnStar /  Karma

�IMSI  Catchers  – Alibaba $1800  +  Plus  Others

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Page 21: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

©  2015    Wayne  M  Burke    – Sequrit  CSi    BV      -­ All  rights  reserved

Image  PLACEMARKER  – NSA  Intercept  -­ Google

Page 22: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Reference  Websites:• https://nsa.gov1.info/dni/prism.html• https://weakdh.org/• https://github.com/byt3bl33d3r/MITMf• https://github.com/brav0hax/easy-­creds• https://github.com/SilverFoxx/PwnSTAR• http://www.alibaba.com/product-­detail/IMSI-­catcher_135958750.html

Documentary:• Special  Investigation:  Bugged,  Tracked,  Hacked• http://www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-­hacking/

Movies  /  TV  Series:• Blackhat• http://www.imdb.com/title/tt2717822/• Mr Robot• http://www.imdb.com/title/tt4158110/

Page 23: Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke

Thanks for listening J

Wayne  Burke:[email protected]