Archive for the ‘Geek’ Category

DEFCON 21 update: August 5, 2013.

Monday, August 5th, 2013

Yeah, I know, I’ve been quiet. Much of Friday’s blogging time was eaten by Bluehost instability, and Saturday and Sunday were busy.

But I do have some updates and links.

I’m going to cut things off here for right now. I’m still trying to find links to some of the other presentations I mentioned (in particular, I’d love a link of some sort to Anch’s “Pentesters Toolkit” if anyone has one) and will post updates as they come in. Depending on what I dig up, there may be a second post tomorrow. In the meantime, this should keep you busy.

DEFCON 21, BlackHat, and related stuff: August 2, 2013.

Friday, August 2nd, 2013

The questions ask themselves:

Trustwave SpiderLabs Security Advisory TWSL2013-020:
Hard-Coded Bluetooth PIN Vulnerability in LIXIL Satis Toilet

Did that say “toilet”?

The Satis is a “smart” toilet. It is controlled using LIXIL’s “My Satis” Android application, which communicates with the toilet using Bluetooth.

Yes. Yes, it did. A toilet with an Android application. And a hardcoded Bluetooth PIN of “0000”.

An attacker could simply download the “My Satis” application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner.
Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.

I have no joke here, I just like saying “discomfort or distress to user”.

On a more serious note, Borepatch has a post up about one of the Black Hat presentations. The math is a little over my head, but the short version is that there’s been a lot of progress made recently in the mathematics that underpin some of the fundamental cryptography used to secure the Internet. According to the presenters:

There is a small but real chance that both RSA and non ECC DH will soon become unusable.

The link above will take you to a PDF of the presentation from Black Hat. Worth noting: Thomas Ptacek is one of the people behind this.

I’m trying to find copies of the presentations I’m interested in; as I dig stuff up and have time, I’ll post links, but I’m not having a lot of luck right now.

More bookmarks.

Thursday, August 1st, 2013

Thanks to Joe D. for the SQL injection by automobile photo in the earlier post.

Something else I happened to stumble across, while reading a Stack Overflow thread (“We have an employee whose last name is Null. He kills our employee lookup application when his last name is used as the search term (which happens to be quite often now).”). There’s a website devoted to preventing SQL injection.

Is that unusual? No. But the URL sent me into giggling fits. My hat is off to the folks behind this site.

Something else I’ve been meaning to link, and which Tom Ritter’s Twitter feed reminded me about: “Applied Cryptography Engineering“.

Applied Cryptography is a deservedly famous book that lies somewhere between survey, pop-sci advocacy, and almanac. It taught two generations of software developers everything they know about crypto. It’s literate, readable, and ambitious. What’s not to love?
Just this: as an instruction manual, Applied Cryptography is dreadful.

Applied Cryptography was an important book for me, and I don’t have the chops that would allow me to intelligently criticize Schneier or Thomas Ptacek. But even I have to admit that AC is almost twenty years old; that’s two or three lifetimes in cryptography. (Also, that makes me…f’ing old.)

DEFCON 21: -1 day notes.

Wednesday, July 31st, 2013

Just because I’m not going to DEFCON 21 doesn’t mean I can’t try to cover it. From 1,500 miles away. Sort of half-assedly.

DEFCON hasn’t even started yet, but Black Hat is going on, and some stuff is coming out. The biggest story so far has been Barnaby Jack’s death. I haven’t mentioned it previously because I’ve felt like it was well covered elsewhere (even FARK).

Another “big” (well, I think it is) story that I haven’t seen very much coverage of is the phone cracking bot. Justin Engler (@justinengler on Twitter) and Paul Vines, according to the synopsis of their talk and the linked article, built a robot for under $200 that can brute force PINs. Like the one on your phone.

Robotic Reconfigurable Button Basher (R2B2) is a ~$200 robot designed to manually brute force PINs or other passwords via manual entry. R2B2 can operate on touch screens or physical buttons. R2B2 can also handle more esoteric lockscreen types such as pattern tracing.

This is one I’ll be keeping an eye on.

Borepatch is in Vegas this year, attending both Black Hat and DEFCON. He’s got a couple of posts up: a liveblog of the NSA director’s presentation at Black Hat, and another post about the links between black hats and political candidates.

So the DEFCON schedule is up. If I was going, what would get me excited? (I’ve included the Twitter handles of the speakers from the DEFCON 21 schedule information; I figure this gives a central source for looking up someone’s feed and getting copies of their presentation.)

From Thursday’s talks: I’d probably go to “Hacker Law School“, as I’m a frustrated wanna-be lawyer anyway. Why not?

Anch’s (@boneheadsanon) “Pentesters Toolkit” talk makes my heart skip a beat:

You’ve been hired to perform a penetration test, you have one week to prepare. What goes in the bag? What is worth lugging through airport security and what do you leave home. I’ll go through my assessment bag and show you what I think is important and not, talk about tools and livecd’s, what comes in handy and what I’ve cut out of my normal pen-test rig.

Push some more of my buttons, please.

The Aaron Bayles (@AlxRogan) “Oil and Gas Infosec 101” talk kind of intrigues me, but it would depend on my mood at the time as to whether I went to that one, or skipped out for a break.

Likewise with the Beaker and Flipper talk on robot building: yeah, robot building is something I’m interested in doing, but I might just be in a mood to visit the Atomic Testing Museum instead, and read your slides later. Nothing personal: I’m sure it will be a great talk.

I’m intrigued by the ZeroChaos (@pentoo_linux) panel on the Pentoo LINUX distribution for penetration testing. I’m not sure how that differs from, say, BackTrack, but I’d probably show up just so I could find out.

The “Wireless Penetration Testing 101 & Wireless Contesting” talk by DaKahuna and Rick Mellendick (@rmellendick) hits yet another of my hot buttons. I can’t tell from the description how much of this is going to be describing contests in the Hacker Village, and how much will be practical advice, but I’d show up anyway.

That takes us into Friday. Just from a preliminary look at the schedule, it looks like the big thing this year is hacking femtocells. Doug DePerry (@dugdep) and Tom Ritter (@TomRitterVG) are doing a talk on “I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell”:

During this talk, we will demonstrate how we’ve used a femtocell for traffic interception of voice/SMS/data, active network attacks and explain how we were able to clone a mobile device without physical access.

The Charlie Miller (@0xcharlie) and Chris Valasek (@nudehaberdasher) talk, “Adventures in Automotive Networks and Control Units“, sounds interesting as well. I’m just slightly more interested in femtocells than automotive hacking, so apologies to Mr. Miller and Mr. Valasek: if the two weren’t in conflict, I’d hit your talk for sure.

And if you haven’t been to a software defined radio talk, Balint Seeber’s (@spenchdotnet) sounds promising.

The Secret Life of SIM Cards” by Karl Koscher (@supersat) and Eric Butler (@codebutler) intrigues me the most out of the 11:00 talks. And I’m kind of interested in the Ryan W. Smith (@ryanwsmith13) and Tim Strazzere “DragonLady: An Investigation of SMS Fraud Operations in Russia” presentation because, well…

This presentation will show key findings and methods of this investigation into top Android malware distributors operating in Russia and the surrounding region. The investigation includes the discovery of 10’s of thousands of bot-controlled twitter accounts spreading links to this type of SMS fraud malware, tracing distribution through thousands of domains and custom websites, and the identification of multiple “affiliate web traffic monetization” websites based in Russia which provide custom Android SMS fraud malware packaging for their “affiliates”. During this investigation we have mapped out an entire ecosystem of actors, each providing their own tool or trade to help this underground community thrive.

There’s not much that intrigues me after Benjamin Caudill’s (@RhinoSecurity) presentation on “Offensive Forensics: CSI for the Bad Guy“. If I was at DEFCON, this is the time where I’d probably be browsing the dealer’s room, though I might go to the Amir Etemadieh (@Zenofex)/Mike Baker (@gtvhacker)/CJ Heres (@cj_000)/Hans Nielsen (@n0nst1ck) Google TV panel: these are the same folks who did the Google TV talk at DEFCON 20.

I feel kind of conflicted at 4:00. The Daniel Selifonov talk, “A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It” sounds interesting. But I’m also intrigued by the “Decapping Chips the Easy Hard Way” with Adam Laurie and Zac Franken. Decapping chips is something I’ve been fascinated by, and it looks like Adam and Zac have found methods that don’t involve things like fuming nitric acid (and thus, are suitable for an apartment).

This is also the time when we, once again, present the “Hippie, please!” award to Richard Thieme for “The Government and UFOs: A Historical Analysis“.

I’m slightly intrigued by Nicolas Oberli’s (@Baldanos) talk about the ccTalk protocol, “Please Insert Inject More Coins”:

The ccTalk protocol is widely used in the vending machine sector as well as casino gaming industry, but is actually not that much known, and very little information exists about it except the official documentation. This protocol is used to transfer money-related information between various devices and the machine mainboard like the value of the inserted bill or how many coins need to be given as change to the customer.

Saturday morning, we have the second femtocell talk, “Do-It-Yourself Cellular IDS”, by Sherri Davidoff (@sherridavidoff), Scott Fretheim, David Harrison, and Randi Price:

For less than $500, you can build your own cellular intrusion detection system to detect malicious activity through your own local femtocell. Our team will show how we leveraged root access on a femtocell, reverse engineered the activation process, and turned it into a proof-of-concept cellular network intrusion monitoring system.

Opposite that, and worth noting, are the annual Tobias/Bluzmanis lock talk, and the David Lawrence et al talk on using 3D printers to defeat the Schlage Primus.

More than likely, I’d hit the Daniel Crowley et al (@dan_crowley) talk, “Home Invasion 2.0 – Attacking Network-Controlled Consumer Devices“, and the Philip Polstra (@ppolstra) presentation “We are Legion: Pentesting with an Army of Low-power Low-cost Devices“. I’m particularly intrigued by the Polstra talk, as one of my areas of interest is how small can we make devices that can still do useful hacking? What’s the smallest feasible wardriving system, for example?

I do want to give Jaime Sanchez (@segofensiva) a shout-out for his talk on “Building an Android IDS on Network Level“. This is worth watching.

I’d have to go to the Phorkus (@PeakSec)/Evilrob “Doing Bad Things to ‘Good’ Security Appliances” talk:

The problem with security appliances is verifying that they are as good as the marketing has lead you to believe. You need to spend lots of money to buy a unit, or figure out how to obtain it another way; we chose eBay. We now have a hardened, encrypted, AES 256 tape storage unit and a mission, break it every way possible!

Because, tape! But the Wesley McGrew “Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices” talk also interests me.

The PIN cracking device talk is on Saturday, opposite Amber Baldet’s (@AmberBaldet) talk on “Suicide Risk Assessment and Intervention Tactics“. I’m glad DEFCON accepted her talk, and I am looking forward to seeing the presentation online.

Also noteworthy, I think: James Snodgrass and Josh Hoover (@wishbone1138) on “BYO-Disaster and Why Corporate Wireless Security Still Sucks“.

Todd Manning (@tmanning) and Zach Lanier (@quine) are doing a presentation on “GoPro or GTFO: A Tale of Reversing an Embedded System“. I don’t have a GoPro (yet) or much of a use for one (yet) but I think they are interesting devices, so I’ll be watching for slides from this talk. Same for the conflicting Melissa Elliott talk, “Noise Floor: Exploring the World of Unintentional Radio Emissions“.

This takes us to Sunday. There’s not a whole lot that really turns me on early, though I admit to some interest in the Jaime Filson/Rob Fuller talk on harvesting github to build word lists:

After downloading approximately 500,000 repositories, storing 6TB on multiple usb drives; this will be a story of one computer, bandwidth, basic python and how a small idea quickly got out of hand.

I like the idea behind John Ortiz’s “Fast Forensics Using Simple Statistics and Cool Tools“, and he teaches at the University of Texas – San Antonio, so I’d probably go to that.

Now is when things start heating up from my perspective. Joseph Paul Cohen is giving a talk on his new tool, “Blucat: Netcat For Bluetooth“:

TCP/IP has tools such as nmap and netcat to explore devices and create socket connections. Bluetooth has sockets but doesn’t have the same tools. Blucat fills this need for the Bluetooth realm.

Holy crap, this sounds awesome. All I ask for is code that compiles.

(Unfortunately, this is up against the Eric Robi (@ericrobi)/Michael Perklin talk on “Forensic Fails“, which sounds like fun. But Bluetooth hacking is a big area of interest for me; sorry, guys.)

Speaking of Bluetooth hacking, Ryan Holeman (@hackgnar) is doing a talk on “The Bluetooth Device Database”. Which is exactly what it sounds like:

During this presentation I will go over the current community driven, distributed, real time, client/server architecture of the project. I will show off some of analytics that can be leveraged from the projects data sets. Finally, I will be releasing various open source open source bluetooth scanning clients (Linux, iOS, OSX).

Dude lives in Austin, too! Holy crap^2!

And that takes us through to the closing ceremonies and the end of DEFCON 21. I will try to link to presentations as they go up, significant news stories, other people’s blogs, and anything else I think you guys might be interested in. If you have specific requests or tips, please either let me know in comments or by email to stainles at mac dot com, stainles at gmail dot com, or stainles at sportsfirings dot com.

Time, time, time, see what’s become of me…

Wednesday, July 31st, 2013

I can’t believe Lawrence isn’t all over this like a fat man on a Chinese buffet.

Bookmarks.

Tuesday, July 30th, 2013

The camera that shot Che. And a bunch of other people, too.

I’ve been going to Precision Camera about once a week to poke around and drool over the used Leicas. One of these days…

Everything you wanted to know about SQL injection (but were afraid to ask). My only complaint about this article is that the author failed to include the XKCD link required by Internet Law.

Don’t be evil. Again.

Thursday, July 25th, 2013

A while back, I wrote about the Knife Depot and their battle with Google’s Adwords people over selling “assisted opening” knives. The Knife Depot lost their Adwords account because they refused to cave in to Google’s demand that they stop selling (not just advertising, but selling) “assisted opening” knives, which are legal in every state of the Union.

Dan Lawton over at the Knife Depot was kind enough to share a couple of his followup posts with me. Adwords restored the Knife Depot’s account in May, but imposed a requirement that the Knife Depot couldn’t have “assisted opening” knives on any of the landing pages.

Then Google yanked the Adwords account again…this time, because Google has a problem with “throwing knives”.

Could you injure someone with a throwing knife? Sure, in the same way you could injure someone with a baseball, a frying pan, a brick, a bottle, a rabid cat or a slew of other projectiles that can become weapons if paired with malicious intent.
However, a throwing knife is poorly suited for criminal activity. These knives are generally large, making them hard to conceal; they have blunt edges and they’re damn hard to throw with fatal accuracy.

I have no joke here, I just wanted an excuse to post this:

But wait, there’s more! You know who else doesn’t like knives? Yes! Facebook!

But surely Google has learned their lesson, and these policies are being applied equally to all vendors? Unlike the “assisted opening” advertising ban, in which Google allowed big vendors like Amazon and Walmart to advertise those knives, while cutting off the Knife Depot and smaller vendors? Right?

Hahahahahahahaha. Nope. Google is still operating on the same double standard they had back in March – the same double standard that was openly called out by a Google employee in internal communication – and refuses to offer any explanation of why certain vendors are allowed to advertise “assisted opening” knives, “throwing knives”…or “herbal incense”, for that matter.

Thanks to Mr. Lawton for bringing my attention to these posts. And, as a side note to people who want me to write about their stuff, this is the way to do it: Mr. Lawton sent me a nice, personalized email summarizing his posts, politely suggesting that I might want to write about them based on my previous coverage, and even provided some evidence that he’s actually read more of the blog than just that one post. He had my curiosity when I saw the email; by the time I finished reading it, he had my attention.

(For the record, the Knife Depot hasn’t given me anything – money, knives, gift certificates, or anything of value – in exchange for this post. Nor have I asked for anything.)

Squee!

Thursday, July 25th, 2013

Donald Norman, along with a couple of other folks, is teaching a series of courses based on “Design of Everyday Things” through Udacity.

Let me repeat this: Donald freakin’ Norman, one of my personal heroes, is teaching free online courses based on his most famous and influential work. My mind, it is blown.

Seriously, Donald Norman’s work was a huge influence on me when I was younger, and the idea of being able to take design courses from him, online, for free…well, “squee!” is the only word I can find to express my feelings on that subject.

Ad astra per aspera.

Sunday, July 21st, 2013

I was busy yesterday (the fun kind of busy, shopping for guns and drinking saké) so Lawrence beat me to posting about Apollo 11. Let me see if I can trump him.

From PetaPixel, here’s NASA video of the first few seconds of the Apollo 11 launch, originally shot on a 16mm camera at 500 frames per second.

From Wired, a tribute to the Hasselblad camera used by NASA.

(If I ever get a little ahead, I’d like to pick up a used Hasselblad. And a used Leica, too.)

Random notes: July 17, 2013.

Wednesday, July 17th, 2013

Judging scandals have upended high-profile sports like figure skating and gymnastics before, but this possible cheating episode serves as a reminder that even in the confines of obscure sports, the competition is every bit as cutthroat.
The fallout has been swift, with one top Olympic official already expelled and six others suspended. They include Caroline Hunt of the United States, along with officials from Egypt, Japan and Russia. Dozens of judges who took the tests have been implicated and questioned by F.I.G. investigators.

The sport in question is rhythmic gymnastics.

Investigators found that Maria Szyszkowska of Poland, the former president of the governing body’s rhythmic gymnastics technical committee, interfered with the computer program that calculated the scores. As a result, Mrs. Szyszkowska was stripped of her membership and prohibited from “any form of participation in all F.I.G. events and activities.”

Obit watch: Eugene P. Wilkinson.

As commander of the 324-foot, lead-lined, dirigible-shaped submarine, Admiral Wilkinson made headlines worldwide when he steered the Nautilus, propelled by its onboard reactor, out of a shipyard in Groton, Conn., into Long Island Sound on Jan. 17, 1955, and uttered his first radio message: “Under way on nuclear power.”

(94. Damn, that was a good run. Also: “He received the Silver Star for valor in the Pacific.”)

Congrats to Lawrence on his winning the Grand Panjandrum’s Special Award in the Bulwer-Lytton Contest. Sadly, according to Lawrence, he will not be getting the complete set of Edward George Bulwer-Lytton’s novels, which is a shame, as I was looking forward to borrowing his copy of Paul Clifford.

I went back to Ohio, but my city was gone.

Monday, July 15th, 2013

Well, not really “gone”. I hadn’t been back to Ohio for nine years, and it amazed me somewhat both how much and how little has changed.

For example, there’s an entire grocery chain that I don’t remember from my last trip…that takes the Discover card and cash. No Visa/AmEx/MasterCard/Diner’s Club, not even debt cards with a PIN, just cash and Discover. Who came up with this idea?

On the other hand, the tractor tire store that was a landmark on the way to Grandma’s place is still there, after 40 something years. And Grandma’s place still feels remote from everything, even though there’s major strip centers at the end of her road, and even though much of the land was sold off over the past few years (and now has houses sitting on it).

And the old NASA hanger is still visible from the airport. That was another landmark for us kids. (My dad worked there, back when it was still the Lewis Research Center, before it was renamed “NASA John H. Glenn Research Center at Lewis Field“. Which is a mouthful. Not that I’m bitter or anything over the renaming; by gosh, if anyone deserved to have a NASA facility named after him, it was John Glenn.)

This is shaping up to be a long post, and sort of “stream of consciousness”, so I’m going to put the rest of it behind a jump. Before I do, here’s Grandma’s obituary, just for the record.

(more…)

Random notes: July 15, 2013.

Monday, July 15th, 2013

Early in his career, Stephen King published several novels using the name Richard Bachman. (In 1985, after he was exposed as the real Richard Bachman, Mr. King announced that Mr. Bachman had died of “cancer of the pseudonym, a rare form of schizonomia.”)

And King continued to publish books as Bachman long past the “early” point of his career, including The Regulators and Blaze. Sorry, something about the NYT‘s phrasing here annoys me. As does this:

He then started reading the book. “I said, ‘Nobody who was in the Army and now works in civilian security could write a book as good as this,’ ” he said.

Nice bit of casual snobbery there, pal.

(This is actually the first Rowling book I want to read, though I don’t intend to pay an inflated price for a first.)

My heart goes out to any of my readers who are in LA:

Ignite 8,500 gallons of gasoline in a two-lane freeway underpass just north of downtown, and you have a prescription for another round of Carmageddon come Monday morning.

The fire erupted when a tanker truck overturned in a small tunnel connecting the northbound lanes of the 2 Freeway with the northbound lanes of the 5. Thick black smoke was seen for miles.
The intensity of the tunnel fire has so compromised the roadbed of the 5 that freeway traffic at this point would lead to greater damage, Caltrans said.

Chandler reported that rebar was exposed. “It was so hot that the concrete is now brittle,” he said. “It is like a popcorn ceiling. Crews are chipping away at it with hammers.”
The narrow confines of the tunnel, about 300 feet long and only two lanes and a shoulder wide, magnified the intensity of the blaze.

This is one of the best things I’ve read in the past few days.

And this is another of the best things I’ve read in the past few days: “A Statistical Analysis of Nerf Blasters and Darts” by Shawn O’Neil and Kate Drueen.