Archive

Archive for May, 2011

What is a cupfighter?

May 30th, 2011 No comments

In order to better explain what a Cupfighter is, our employer Schuberg Philis created this video:

YouTube Preview Image

We are always looking for more Cupfighters.

HitB2011AMS: Credit Card Skimming and PIN Harvesting in an EMV World

May 20th, 2011 No comments
Black Skimmer Rynchops niger Skimming a cc by image from marlin harm's Flick stream

Black Skimmer Rynchops niger Skimming a cc by image from marlin harm's Flick stream

By Adam Laurie and Daniele Bianco

Slides on the HitB Materials page.

So what is EMV it stand for Europay, Mastercard and Vista and is a new security statndard for credit cards.With the introduction of EMV the liabiliy moved from the merchant to the cardholder because fraud is thought to be unlikely.  However EMV has allready been proven to be broken. E.g. Murdoch et. al. have proven that it is possible to use a stolen card without knowing the PIN.

This talk focuses  on the ability to still skim a EMV credit card, without reading the magstripe (which is very often still present).

Skimming a chip card may be more interesting because the user cannot see the interface and thus cannot detect the skimmer. The time effort to install a smartcard skimmer is quite small.

The industry perceives these tools as complex, but that is not true. Devices are small, easy to install and hard to detect.

It is possible to clone the track 1 and track 2 magnetic stripe data from publicly readable data of EMV chip. Luckily not all EMS cards support this.

So magnetic stripe data can be stolen and a stolen card van be used without a PIN, but is it possible to do PIN and magnetic stripe harvesting with EMV cards.

Read more…

HitB2011AMS: iPhone Data Protection in-Depth

May 20th, 2011 No comments
Steve Jobs for Fortune magazine a cc nc nd image from tsevis's Flick stream

Steve Jobs for Fortune magazine a cc nc nd image from tsevis's Flick stream

By Jean-Baptiste Bédrune and Jean Sigwald

Slides on the HitB Materials page.

This talk is about data security and the iPhone. Almost all iPhone like deices (excluding the iPad2 for the moment) can book usigned code when they are in recovery mode. It is also possible to create acustom ram disk, thee are techniques used by jailbreakers and phone forensics people.

Data in the iPhone is encrypted with either the UID (unique iPhone key) or GID (key unique to each model).

In the iPhone (iOS < 4) the UID key was only used  to facilitate fast wipe (change key, cannot read flash anymore), it did not provide data security. The iPhone 4 was designed with data security in mind. Jean and Jean demonstrate the tools they wrote to get around the data protection of iOS 4

Because the unlock code is used for data security data can be set to be only available when:

  • The Phone is unlocked
  • After the phone is unlocked for the first time
  • Always

In iOS 4 there is an escrow key which allows MobileMe and iTunes to access the phone for backup or passcode reset without unlocking the phone.

The first tool that they developed and demonstrated was the keyChainViewer which can be used to view the contents of keyChain, but not the keys.

Using the built in iOS functions (that use the passwcode) you can actually bruto force the passcode of the phone with a small application on the phone. If you boot the phone from a ram disc you can do this without knowing the passcode. Using the brute forced passcode the keyChain can be read and decrypted.

Next tools where demoed to browse the encrypted filesystem and to decrypt iTunes backup files.

Conclusion of the researchers:

  • iOS4 offers far better protection then iOS3
  • Mail files (with the exception of exchange) are protected by the passcode this offers additional protection, but it can be obtained if you have the phone

Tools are available on http://code.google.com/p/iphone-dataprotection/


About Jean-Baptiste Bédrune

Jean-Baptiste works at the Software security R&D team at Sogeti for 4 years. His domains of research include code (un)protection, audit of DRM solutions, applied cryptography, reverse engineering on embedded devices and distributed computing. Jean joined Sogeti in early 2010. His research topics include reverse engineering, embedded devices and smartphones security.

About Jean Sigwald

Jean Sigwald is a security researcher working at Sogeti ESEC R&D lab. His research is mainly focused on smartphones security and the services offered by the network operators.

HitB2011AMS: Let met Stuxnet You

May 20th, 2011 No comments
Bad day at the office a cc nc ND iamge from Roger Smith's Flick stream

Bad day at the office a cc nc ND iamge from Roger Smith's Flick stream

By Itzik Kotler

Slides on the HitB Materials page.

Itzik start his presentation that writing StuxNet for a company is much less hard then writing one for a nuclear reactor. Stuxnet is interesting in that it is a purely software based attack that had a real hardware based effect.

So can software damage hardware? Yes it can:

  • Software controls hardware ad can make it perform damaging hardware
  • Software can damage software that runs hardware
  • Software runs hardware and can make this hardware take an action that damages other hardware

So what is PDOS (Permanent Denial of Service)? Damaging hardware so bad that it needs to be replace or reinstalled.

Users the brick their phone when they try to jailbreak it are basically causing a self inflicted PDoS.

So who would do it and why?

Read more…

HitB2011AMS: A Real-Life Study of What Really Breaks SSL

May 20th, 2011 No comments
Breaking the ice a cc nc nd by image from MarcelGermain's Flickr stream

Breaking the ice a cc nc nd by image from MarcelGermain's Flickr stream

By Ivan Ristić

Slides on the HitB Materials page.

Ivan researches SSL for Qualys. SSL was designed as a protocol add-on by Netscape to secure http, but can be used to secure other protocols as well.

The main challenges today are:

  1. Fragility of the trust ecosystem
  2. Incorrect or weak configuration
  3. Slow adoption of modern statndar
  4. Lack of support for virtual SSL hosting
  5. Mismatch between HTTP and SSL

There are three main attacks against SSL:

  • Passive MitM
  • Session Hijacking
  • Active MitM
    • Session bypass (ssl strip)
    • Renegotiation attack
    • Rogue certificates
    • User attackers (who reads warnings)
  • Third party compromise
  • Ivan’s has a lot of data based on the a surveys conducted by his employer Qualys SSL Labs, EFF’s SSL Observatory. In total 1.2million sites with valid certificates where investigated.

    Ivan showed a slide that indicates that of the sites visited only 0.6% of the sites had a fully correct SSL configuration, nearly 50% of the sites did not offer SSL at all.

    In Qualys’ most In the most recent SSL Survey only 32% of the sites offering SSL where configured correctly.

    Read more…

    HitB2011AMS: WebShells: A Framework for Penetration Testing

    May 19th, 2011 No comments
    Florida Fragments a cc nc sa by image from Merrick Brown's Flickr stream

    Florida Fragments a cc nc sa by image from Merrick Brown's Flickr stream

    By Elena Kropochkina and Joffrey Czarny

    Slides on the HitB Materials page.

    Lots of Webshells used by pentesters to get access to the systems are detected by conventional security products like anti-virus, IPS and WAF. In stead of building a new websheel for each assignment the presenters tried to work towards a framework for webshells, that was modular and added obfuscation as a protection against AV/IPS/WAF.

    But if you want to build a webshell framework you need to know what is out there. Most webservers on the internet are dominantly Apache, IIS and Weblogic. Pentesters are most in need of Webshells based on ASP, PHP and Java shells as it is heavily used for intranet applications.

    The presenters gave an overview of the webshels out there for webshells for Linux, MySQL, PHP, JSP, ASP. Many of the common shells have high detection rates on the most common anti-virus platforms.

    Even tough there are some webshells that are nearly complete in features and others that are not detected by Anti-Virus there isn’t one that is both.

    There are a few ways to get around anti-virus encoding, obfuscation and encryption. There are common tools available to obfuscation for different languages like PHP, VBScript and Java. Obfuscation tools make reading the code harder, but are analysis is often still possible.

    Read more…

    HitB2011AMS: A Million Little Tracking Devices

    May 19th, 2011 No comments

    By Don A. Bailey

    Slides on the HitB Materials page.

    Don’s talk focuses about devices that are designed to track your assets or loved one., specifically the Zoombak who’s biggest selling point is that you can use it to definitely know where your kids are. Zoombak really took off after it was endorsed by TV personality Oprah.

    A Zoombak devices basically consist of a GSM module and a MicroController. These two do not share any memory, but talk to each other over a serial channel using AT commands.

    On of the first flaws in the Zoombak is that the GSM module can only talk using the decommissioned and broken A5/2 algorithm. A5/2 is so weak that it can be cracked in real time using PC hardware, but Don didn’t use this eakness to attack the device.

    Because being on the GSM network all the time is too expensive the Zoombak device works differently. If you want to know the location of the device you send it an SMS, the SMS is polled from the SIM by the Micro Controller and acts on this command, e.g. by sending the location of the device to a website over the GPRS network.

    Read more…

    HitB2011AMS: Beyond Botnets – Dissecting the Ecosystem

    May 19th, 2011 No comments
    'cup of robots ~ on white' a cc by image from striatic's Flickr stream

    'cup of robots ~ on white' a cc by image from striatic's Flickr stream

    By Michael Sandee (FoxIt)

    Slides on the HitB Materials page.

    Michael’s talk focuses on the current eco systems of botnets. Who run them, who uses them and who benefits from them. Michael starts of by showing how sophisticated Botnets have become. Cyber criminals are running botnets as a commercial business and a ‘cloud service’ including dashboards. He showed an example of a botnet that did not generate its own infections, but used its users to infect targets. As a price 20% of the infected machines are not controlled by the infector but  by the botnet operators.

    Some botnets measure their effectiveness by e.g. running virus scanners against their payload every 15 minutes  and reporting back the detection rates of their systems.

    It is interesting to see that the prices of e.g. credit card data are currently dropping rapidly. We have come to the point that UK credit card data is now sold for a set price per gigabyte.

    Michael illustrated the fact that botnets are getting very advanced with a lot of different examples. E.g. Traffic Converter in the last two years have earned 40 to 50 Million USD and it is a very well run operation.

    It is an advanced operation with:

    • Live Chat Support
    • Support trouble ticket system
    • AV testing by humans
    • Online helpdesk
    • Payment system
    • Full QA

    Stopping cybercrime is not going to stop. It is more then just botnets, but also fake anti-virus and click fraud. The victims are not large corporation’s, but common folks.

    Visualizing 100%

    May 17th, 2011 No comments
    Delivering and guaranteeing 100% is nice, but how do you report, analyse and define a new direction on your service delivery in that case. And we need more than that. We need to instantly know how we are doing on finance, project execution, team dynamics and  computer operations. The answer is rather simple. We want to have the ‘right’ information, available in an easy manner (ipad, web, pdf, mail) and that being interactive and real time. Having that said, we created a new goal for ourselves and having that said we were even more dissatisfied with the current way of working. Inspired by some customers that use BI to a great extend and inspired by the transparency of the open source community and the web gives, we started our journey to find the correct information we want to analyse to create new visions. And therefor we needed to select a set of tooling that support us in this quest. After that we only needed to have the right knowledge on both presenting data but on analysing data as well.
    One of the companies that is sky rocketing in this area is Tableau. And they came to Amsterdam for their 1st Tableau European Customer Conference. This is a great opportunity to learn more about visualization in general, the tool and its possibilities, the technical requirements on how to work in this manner, learn from other companies on how they use Tableau in there environment and see of course some roadmap items as well. Overall these days have proven to be good to great. We are on the right track definitely but there yet. Goodies of the two days are, the tiny tips and tricks (that are in the manual as well btw), time series analyses (with Meredith Dicks, that helped us before). But maybe the best thing is that we might be working together on OpenTSDB / HBase on Hadoop and Odata. Were on to something here and that is giving us a boost.
    Categories: Tableau Tags: , ,