TJ OConnor Nate Grunzweig David Brasefield. The views expressed in this presentation are those of the author and do not reflect the official policy or.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

The Most Analytical and Comprehensive Defense Network in a Box.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
System Security Scanning and Discovery Chapter 14.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
FIT3105 Smart card based authentication and identity management Lecture 4.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Port Scanning.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
OSI Model Routing Connection-oriented/Connectionless Network Services.
Identification of Mobile Devices from Network Traffic Measurements - a HTTP User Agent Method Master’s Thesis August 2 8, 2012 Supervisor – Prof. Heikki.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
COEN 252 Computer Forensics
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Bluetooth Tutorial Larry Rudolph.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
FORESEC Academy FORESEC Academy Security Essentials (III)
An Investigation of Bluetooth Application Program Interface Layer Development Sam Knights Rhodes University Supervisors: Dr G. Foster and Prof P. Clayton.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Bluetooth Larry Rudolph Feb 16, 2006.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Hybrid Approaches Towards Optimized Network Discovery Techniques By David Meltzer.
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CSCE 548 Student Presentation By Manasa Suthram
The Linux Operating System
EN Lecture Notes Spring 2016
Network Security and Monitoring
Topic 5: Communication and the Internet
Internet of Things Vulnerabilities
6. Application Software Security
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

TJ OConnor Nate Grunzweig David Brasefield

The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government.

 Think about… this device knows  Who you talked to last  Where you have been  Your  Your texts from last night  And we don’t give it any protection  But it could be worse…  There are some things that just shouldn’t be mobile devices….

Should a credit card system really have a radio whose main design constraint is to cost < $2?

What happens on iPad release day if you jam 2.4?

 Heart-rate monitors, glucometers, respirators, hearing aids, patient data  Should this stuff really rely on a framework built for inexpensive cost instead of security?

This guy meets with a hospital floor of Bluetooth™ enabled heart rate readers? Can you DOS a floor of Nurses?

 Average consumer communication devices become vulnerable…  Nokia 6310 Bluebug  iPhone SDP Attack  Broadcom WiFi Drivers

 ….I see targets.  Many vectors for attack.  Quick rush to market.  Unlikely average consumer will update (firm|soft)ware.

 Goal is to have it cost less than $300  Goal is to always be connected to your network

 Lots of great work done on Bluetooth / WiFi Intrusion Detection  Virginia Tech doing a lot of great anomaly / signature detection on attacks.  Signatures are obvious and easy…..  Unauthenticated RFCOMM connect to 13; followed by AT Commands == BlueBug

Mahaffey-MobileFuzzing-PAPER.pdf 1. Discover WiFi MAC Address passively. 2. MAC + 1 = Bluetooth Address 3. Send Malformed SDP Packet to BT Address 4. Read your texts from last night.

 Starting to get really popular  See Mahaffey’s paper at Blackhat 2009  Makes really evil things possible like device driver exploits

 We really don’t know what is out there.  We need to collect mobile device zero day.  Take lessons learned from wired IDS  Honeypots for the win!

Necessary to examine all vectors to analyze an attack. - Attacker jams 3G to force user on WiFi - Passively observes WiFi Traffic to find MAC - Begins Bluetooth Fuzzing - Finds Vulnerability - Listens to Lindsey Lohan’s Voic

 Bluetooth  WiFi  GPS  Infrared  Zigbee  WiMax  (2|3)G,  CDMA, EDGE

 Applications  Integrated Browsers ▪ Mobile Safari ▪ BlackBerry ® Browser  Bundled Software  3 rd Party Applications  Homebrew Apps

 Bluetooth MAC Address  Registered OUI  04:1E:64:xx:xx:xx tells us you are an iPhone  Discoverability  RFComm Ports  UUID16 : 0x0003 – RFCOMM –  L2CAP (PSM) Ports  UUID16 : 0x L2CAP  Service Discover Profile (SDP)

sdptool browse --l2cap 00:23:6C:60:21:12 Attribute Identifier : 0x1 - ServiceClassIDList Data Sequence UUID16 : 0x111f - HandsfreeAudioGateway UUID16 : 0x GenericAudio Attribute Identifier : 0x2 - ServiceRecordState Integer : 0x0 Attribute Identifier : 0x4 - ProtocolDescriptorList Data Sequence UUID16 : 0x L2CAP Data Sequence UUID16 : 0x RFCOMM Channel/Port (Integer) : 0x8

 MAC Address  Registered OUI again  may be increment of BT  Wireless Fingerprints  TCP Fingerprints  POF, Queso  TCP SERVICES  Banner Grabs  UDP SERVICES

Mozilla/5.0 (iPhone; U; CPU like Mac OS X; en) AppleWebKit/420+ (KHTML, like Gecko) Version/3.0 Mobile/1A543a Safari/419. BlackBerry9630/ Profile/MIDP-2.0 Configuration/CLDC-1.1 VendorID/105 MOT-L6/0A.52.45R MIB/2.2.1 Profile/MIDP-2.0 Configuration/CLDC-1.1

 Introduce a whole new realm….

A realm that we just can’t keep up with…..

 Do we emulate all of this, while still inviting attacks and logging?  Emulate Bluetooth  Emulate WiFi / TCP / UDP  GPS  Match all the signatures.

…lot of open source tools to make a audit device signature  Btaudit  Nmap  Sdptool  POF  Hcitools

… open source tools together for traffic generation  bccmd  Scapy  PyBluez  POF

…lot of open source tools to log interaction with devices  Wireshark  Kismet  tpcdump  Spectools  gpsd

 bccmd – utility for flashing Cambridge Silicon Radios  Written by Marcel Holtmann and Adam Laurie  Allows us to flash a $25 dongle into anything

# Bind a Bluetooth RFCOMM Socket server_sock=BluetoothSocket( RFCOMM ) server_sock.bind((dev,PORT_ANY)) server_sock.listen(1) # Advertise a vulnerable Bluetooth Phonebook advertise_service( server_sock, "Contacts", service_classes = [ SERIAL_PORT_CLASS ], profiles = [ SERIAL_PORT_PROFILE ] ) client_sock, client_info = server_sock.accept()

 Willing to pay Windows Tax for AirPcap TX card.  One of few cards able to change MAC OUI  Supported Traffic Injection via Compat- Wireless (zd1211rw); you’ll just need to add the USB Vendor ID.

 So easy, even Army officers can write packet injection code…  Total Packet Manipulation Library  Supports multiple protocols  Supports Bluetooth / WiFi Code  Great references and examples out there  Scapy TCP Finite State Machines  Adam Pridgen over at TheCoverOfNight.com

# Create an Packet dnsResp = Dot11(type = "Data", FCfield = "from- DS”, addr1 = addr1, addr2 = addr2) # Append DNS Reply to Packet dnsResp /= DNS(id = id, qt = qt, qd = qd, an = DNSRR(rrname = rrname, ttl = ttl, rdata=rdata)) # Send Packet sendp(dnsResp)

# Use POF to impersonate a TCP SYN from # SymbianOS phone pkt = p0f_impersonate(IP(dst=' g')/ TCP(sport=1025, dport=80, flags=’S'), osgenre='SymbianOS') send(pkt)

 Mimicking users is difficult.  LARIAT project up at MIT.  We can’t just fire off wget scripts to to pretend to be a college student.

 In honeyM, you can select a profile….  University Student  Top Secret Government Agent  My Mom  Corporate Employee

 Top Secret Government Agents do things like VPN, SSH, use PKI… (no really, they do.)  Corporate employees do things like browsing financial news, logging into webmail.  University students do things like….. (well university student things)  Don’t even ask about my Mom.

 Any communications activity to the device is suspect.  Doesn’t mean every Bluetooth NAME_REQ is bad though… this happens all the time.  How do we reduce false positives in logging?

 Is this just a malformed frame or is it more?

 Recording all Bluetooth hci layer information.

 Everyone would have a Bluetooth Protocol Analyzer for logging Piconets.

 Oh look, Al Qaeda just got bluebugged.

 Kismet-NG now supports Spectools traffic as a plugin.  Can correlate spectrum activity to management frames. Auxiliary/wireless/dos_ctf_flood

 Unique legal constraints to mobile device honeyclients not found on wired networks  Typically we relied on Expressed Consent or Trespasser Consent to allow us to capture on a honeyclient.  Unfortunately we cannot get the entire consent of all users on 2.4GHz.

 Can only do full BT packet capture with specialized equipment  CATC Merlin  Frontline  USRP

 Subject to chaff  What if I just send a 1,000,000 packets to obscure my actual attack?  These are the same problems for wired honeypots.

 Make the targets so attractive, nobody thinks it is a honeyclient  #hcitool scan - Paris Hilton’s iPhone

 Mobile Device attacks are dynamic, relying on multiple vectors for attack.  We can use honeyclients to discover novel attacks on mobile devices.

TJ OConnor Nathan Grunzweig David Brasefield