Starting tonight at 8pm PST. I am running a test pilot stream with my twitch
Topic is going to recap last weeks vulnerabilities, what they are, what they mean, and how to protect yourself.
Weekly – Quickcast – Vulnerability topics – test pilot.
WR’s DC702 – Monthly meet & greet.
Date / Time: 11/10/2018 (Saturday) starting at 6pm till 10pm.
For a temp location: Until we get more Members will be held at a sonic as there is a ton of seats not too cold out.
Location is: Sonic Drive-In, 6135 S Pecos Rd, Las Vegas, NV 89120
At this same time another group I am apart of is also there named “Ratsun” so if you have an Nissan / Old Datsun bring it by.
inquiries of the location [email protected]
Cyber Awarn3ss v1.7 – Agenda for the podcast.
This talk is about Cyber Awar3ness v1.7 – Skimmers and Robocalls
- Skimmers
- ATM Skimmers
- Preventative – Stay Safe tips
- Robocalls and…
- What is a Phreaker?
- What is a spammer?
- Scams Scams Scams…
Cyber Awareness v1.6 What is phishing scams?
What is phishing scams?
Phishing is the fraudulent attempt to obtain sensitive information such as
- Usernames
- Passwords
- Credit Card Information
- Misc information
Often used for malicious reasons by disguising as a trustworthy entity via electronic communications.
- Spear Phishing
- Phishing attempt directed at a specific individual or companies that have been termed spear phishing in contrast to builk phishing. Spear phishing attackers often gather and use personal information (kallador, old password, threatening email) about their target to increase their probability of success.
- Clone Phishing
- Phishing is a type of attack whereby a legitimate or previously deliver email containing an attachment or link has had its content and recipient address taken and used to create an almost identical or cloned email. (bank email looks legit, but contains bad links to bad places)
- Whaling
- The term whaling has been coined for spear phishing attacks directed specifically at senior executives and other high-profile targets. (I was a VIP Tech, I handled a lot of tech issues with SVP’s and CEO of of the company. I would get a call every once a week about a special email from the CEO to one of the SVP’s asking to paypal some money, they where pretending to be the CEO in this situation asking for a red flag item paypal as the CEO would never ask for this from any of the SVP’s) Senior Vice Presidents
- Red flags
- Stuff you don’t use (paypal, btc)
- Link manipulations
- Filter Evasions
- Social networks Evasions
- Website forgeries (banks, blizzard)
- Covert redirects (banks, blizzard )
- Social engineering
- Smishing – SMS Phishing
Email: keep your email client (outlook, thunderbird, etc.. ) updated.
Browsers: Keep your browser updated, if allowed install extensions such as “adblockers, script blocking, etc..” IE: Chrome->Adblock+ or uBlock Origins, no script for advanced stuff.
Don’t click on links directly, always hover over them to see if the link is legit and not something like
“bankofamerica.com.i.am.an.ding.donger.cw”
Anti-Viruses, they normally have a tool for such things phishing attempts.
Aug. 9-12th
Defcon -> PiraboxBOX on a Rasberry Pi 3b+ +logging of mac addresses of who connected.
Cyber Awar3ness v1.5 – Usb Flash Drives of Death!
Cyber Awar3ness v1.5 – USB stuff… yeah if you have seen Mr Robot, then you are really in for a surprise of how real that show is (as it is shown the director wanted to make everything as real as possible, no fiction)
Sorry if I am spoiling last season’s stuff and if you have not seen it yet, please go do so.
https://motherboard.vice.com/en_us/search?all=true&model=articles&q=a%20round%20table%20of%20hackers
Do not try any of this on a system you do NOT own, if you do such things be sure you are in a test environment of a systems you own or have authorization to run such experiments as everything below is an experimental (hacking)
This is a demonstration to give an insight of what “a wild usb appears” can do if you find one out in the wild.
Contents
- Reprogrammable microcontroller USB attacks. 2
- Maliciously reprogrammed USB peripheral firmware attacks. 3
- Attacks based on unprogrammed USB devices. 4
- Electrical attacks. 5
Reprogrammable microcontroller USB attacks
- Rubber Ducky – a commercial keystroke injection attack platform released in 2010. Once connected to a host computer, the Rubber Ducky poses as a keyboard and injects a preloaded keystroke sequence.
- PHUKD/URFUKED attack platforms – similar to Rubber Ducky, but allows an attacker to select the time when it injects the malicious keystrokes.
- USBdriveby – provides quick covert installation of backdoors and overriding DNS settings on an unlocked OS X host via USB in a matter of seconds by emulating an USB keyboard and mouse.
- Evilduino – similar to PHUKD/URFUKED, but uses Arduino microcontrollers instead of Teensy. Also works by emulating a keyboard/mouse and can send keystrokes/mouse cursor movements to the host according to a preloaded script.
- Unintended USB channel – a proof of concept (POC) USB hardware trojan that exfiltrates data based on unintended USB channels (such as using USB speakers to exfiltrate data).
- TURNIPSCHOOL (COTTONMOUTH-1) – a hardware implant concealed within a USB cable. Developed by the NSA.
- RIT attack via USB mass storage – attack described in a research paper. It relies on changing the content of files while the USB mass storage device connected to a victim’s computer.
- Attacks on wireless USB dongles – a category of attacks first explored with the release of the KeySweeper attack platform by Samy Kamkar, a tool that covertly logs and decrypts keystrokes from many Microsoft RF wireless keyboards.
- https://www.mousejack.com/
- https://samy.pl/keysweeper/
- Default Gateway Override – an attack that uses a microcontroller to spoof a USB Ethernet adapter to override DHCP settings and hijack local traffic.
Maliciously reprogrammed USB peripheral firmware attacks
- Smartphone-based HID attacks – first described in a research paper for which researchers created custom Android gadget drivers to overwrite how Android interacted with USB devices. The malicious driver interacted with the Android USB gadget API to simulate USB keyboard and mouse devices connected to the phone.
- DNS Override by Modified USB Firmware – researchers modified the firmware of a USB flash drive and used it to emulate a USB-Ethernet adapter, which then allowed them to hijack local traffic.
- Keyboard Emulation by Modified USB Firmware – several researchers showed how poisoning the firmware of USB flash drives, an attacker could inject keyboard strokes [1, 2, 3].
- Hidden Partition Patch – researchers demonstrated how a USB flash drive could be reprogrammed to act like a normal drive, creating a hidden partition that cannot be formatted, allowing for covert data exfiltration.
- Password Protection Bypass Patch – a small modification of a USB flash drive’s firmware allows attackers to bypass password-protected USB flash drives.
- Virtual Machine Break-Out – researchers used USB firmware to break out of virtual machine environments.
- Boot Sector Virus – researchers used a USB flash drive to infect the computer before it boots [1, 2].
- iSeeYou – POC program that reprograms the firmware of a class of Apple internal iSight webcams so that an attacker can covertly capture video without the LED indicator warning.
Attacks based on unprogrammed USB devices
- CVE-2010-2568 .LNK exploit used by Stuxnet and Fanny malware
- https://www.cvedetails.com/cve/CVE-2010-2568/
- USB Backdoor into Air-Gapped Hosts – attack used by the Fanny malware, developed by the Equation Group (codename for the NSA). Attack uses USB hidden storage to store preset commands that map computers in air-gapped networks. Info on networks saved back to the USB flash drive’s hidden storage.
- Data Hiding on USB Mass Storage Devices – a large collection of tricks of hiding malware or stolen data inside a USB flash drive (eg.: storing data outside of the normal partitions, hiding the file inside an invisible folder by making that folder’s icon and name transparent, etc.).
- AutoRun Exploits – depending on how host computers were configured, some PCs would auto-execute predetermined files located on a USB device’s storage. There’s an entire malware category dedicated to this called autorun malware.
- Cold Boot Attacks – aka the RAM dump attack. Attackers can store a memory dumper on a USB flash drive and extract left-over data from RAM by booting from a USB device.
- Buffer Overflow based Attacks – Several attacks that rely on exploiting OS buffer overflows when a USB device inserted into a computer. This happens because operating systems will enumerate the devices and functions (run certain predetermined operations) when a USB device is inserted [1, 2, 3, 4].
- Driver Update – very complex attack that relies on obtaining a VeriSign Class 3 Organizational Certificate and submitting drivers to Microsoft that are automatically delivered and installed on user PCs when a certain SUB device inserted. This attack is possible, but very hard to pull off in the real world.
- Device Firmware Upgrade (DFU) – attackers can use the Device Firmware Upgrade (DFU), a legitimate process supported by the USB standard, to update local legitimate firmware to a malicious version.
- USB Thief – a USB flash drive based data-stealing malware that was recently discovered by ESET
- Attacks on Smartphones via the USB Port – attackers can hide and deliver malware (malicious) via USB phone chargers.
- USBee attack – make a USB connector’s data bus give out electromagnetic emissions that can be used to exfiltrate data.
Electrical attacks
- USB Killer – permanently destroy devices by inserting a USB device that triggers an electrical surcharge
Warframe – Collection of tools I currently use.
Market (These are the markets where you can trade in game currency “plat” from, you can use the markets to sell the junk you acquired to earn plat as well. )
https://warframe.market
https://riven.market/
https://tenno.zone/pricing/
Event’s and Alert status (this is a good live system to see alot of different alerts or event’s to even the day and night cycle on earth)
http://deathsnacks.com/wf old
https://hub.warframestat.us/
Builder (pre-build any ideas for your warframe )
http://warframe-builder.com
Zaw builder (check out the stats for a zaw build)
https://semlar.com/zawcalc
Zaw Guide (this is a good guide for building zaws)
https://steamcommunity.com/sharedfiles/filedetails/?id=1311112507
Syndicate Guide
https://steamcommunity.com/sharedfiles/filedetails/?id=337301539
Player Made Resources
https://www.reddit.com/r/Warframe/wiki/player-made_resources
Tier List
https://www.cephalonwannab.com
Best Farm Locations
https://forums.warframe.com/topic/929539-all-resources-best-farm-location-2018/
Ostron Standings Guide
https://todowarframe.com/advanced-guide-ostron-standing/?lang=en
Riven Challenge List
https://www.reddit.com/r/Warframe/comments/7willx/struggling_with_a_new_riven_challenge_heres_a/
Plains Material Farming Guide
https://gameplay.tips/guides/1472-warframe.html
Amp Guide
https://forums.warframe.com/topic/924749-new-to-amp-construction-fear-no-more/
Eidolon Hunting Guide
https://steamcommunity.com/sharedfiles/filedetails/?id=1407891969
Warframe Tracker
https://hub.warframestat.us/
Void Relic Drops
http://warframe.wikia.com/wiki/Void_Relic/DropLocationsByRelic
Amp crafting from 0 rep…
https://www.reddit.com/r/Warframe/comments/84nx23/guide_obtaining_a_223_amp_from_0_rep/
Cetus Wisp Farm
https://www.youtube.com/watch?v=1zH_-vPfa6s
Acolyte Tracker
https://acolyte.draak.online/?platform=pc
http://framedex.net/ for tracking all your codex needs
Fortuna Guide
https://www.framemastery.com/the-ultimate-fortuna-guide/
Rebranding is now complete…
For over 20 years,I have used the old WRNet logo,
And now a kitty replaces an old bird! time for a new change.
a warframe story – the follow up and other things.
Warframe streaming as a new affiliate is still hard to stream to build a community.
I have reached out to DE to see if there is something that can be done if I wanted to build warframe up as my community to start out as I also start out with a new community around defcon groups – DC702 as per discussion.
I can’t relay on drifting as my community builder with out doing illegal stuff in which I do not want to promote illegal street racing and drifting.
So, I have decided to push more into building the community. and the struggle is real, the viewers is bad I can’t seem to get enough viewers to launch successfully. I can’t apply for partnership because I lack parts for partnership. I get more viewers per 8 hour stream of Overwatch than I do with 8 hours of Warframe.
But if I was a warframe partner, I have created an XBoxOne account to help new users as a campaign to help new players to play. That was going into the weekly new schedule I am putting together. Especially with Fortuna coming up I wanted to be more into it. I would be more into also helping new players as I do so already and help others to learn more and get up 2 speed as like I have.
I want to also cover more Cyber Security Awareness talks as part of being towards the DC702 one of my “Niche on twitch”
So far my niche on twitch is – Cyber Security (I get views for this for some reason) but no feedback what so ever), drifting – last event I got alot of not just viewers but chatters too with lurkers that helped a ton for my confidence. Gaming is hard because I am a technical person and it’s hard to even focus on the socializing to help with my people anxiety I have.
But the games I do stream is Warframe, World of Warcraft, Overwatch, and Destiny 2 and variety of different games here and there.
And a quick update to this update, even though I have seen new partners that do NOT meet the requirements. I might stop streaming this game all together unless I can get some support.
I got a return email stating “we are not accepting applicants who do not meet the listed requirements,”
Yet there is a handful of partners who are partners who DO NOT fit the requirements. I wont name names, but they pop up as WF partners and is on both the twitch index and on Warframe. I don’t need to name names nor point them out for you it’s a simple quick research.
At this point, if I build a community to a point I can get warframe partnership, I wont be applying and if any of my subscribers need plat. or anytype of hook up in such things I would hook them up out of my pocket for sure.
dc702 (unofficial) lets start this…
As a new community driven start I have put together a startup. I want to be open on the main focus, this is a new group and this being a “free” group I want it to be Defcon Groups socially. I’ve been lurking at defcon for 20 years even times I sneaked into a few events and being local I don’t see why there isn’t a group already.
Currently setting up a discord for this with roles and what not. (using discord over slack for many of different reasons)
but if you are already apart of the Slack group DCG – join dc702 and lets turn this placeholder into a party.
Cyber 1.4 – f@#$& internet anonymity,
Cyber 1.4 – f@#$& internet anonymity,
Internet Privacy – why is it important?
- Because internet is a giant playground, there is people out there who like to collect you data, use your data, sell your data and limit your data.
Internet privacy
- Problems? These are the main topics of the internet privacy.
- Tracking
- Sniffing
- Vulnerabilities
- Who is listening?
- Everyone
- Kiddies, who want data for logins and stuff to troll you or steal your data (bank data etc..)
- Internet marketing tools – track what you do and where you go to resell. Tracking Cookies is a huge thing for banners and other Marketing tools – Great for Spammers.
- ISP -> Internet Service Provider Mainly ISP’s like a cable companies are known for listening in on what you are doing in the internet to charge extra and or sell different thing using different tricks, this include throttling your internet speeds to get you to pay for additional service and / or equipment.
- Example, here was my troubleshooting steps over the weekend after taking notice.
- Login router
- check ip. (Refresh IP)
- change dns server 1.1.1.1 and 8.8.8.8 (4.1.1.1)
- changed to the dns of the isp (made things worse)
- changed DNS back
- reboot router
- reboot cable modem
- Issue still persist
- isolated my connection and directly connected to the cable modem
- mac address changed seen from modem
- internet was back to 300/30 (ish)
- restored everything and everything was normal for another 30 minutes
- issue then returned while streaming again with OW.
- called isp
- isp tells me they can’t help me and that I needed to upgrade to their gigablast (1GB Down / 35Mbps up)
- They recommended that I would lease a new cable modem from them (as I own my current one bought from frys)
- frustrated I tried to do different setting with both OBS and StreamLabs OBS.
- found no real solution just to drop the quality as horrible as possible just to stream.
- Still did not resolve issue.
- So I then seeked out some help on few different discords for streaming help.
- That is when someone suggested to try a VPN service
- Monday after work I turned on my VPN that I normally use with my phone for public wifi’s
- With that, I had a solid connection, testing with a twitch bandwidth tool, I have found that I had a solid connection to even almost every twitch server and it was much better of a connection than I had with the ISP.
- I was able to test and had a solid stream for over 6 hours with no dropped frames and back to hi-def with StreamLabs OBS and with that, I had a successful stream with Overwatch.
- Moral of this story: ISP throttles stream, just google your isp + throttling twitch streamers.(IE: Cox Throttling twitch streamers)
- Tools:
- Browsers: Extensions
- Adblocking
- Not just for basic annoying ad’s it is also for protecting again possible 0day vulnerabilities that could exploit your current browser and load a ransomware into your computer.
- HTTPSEnywhere –
- Helps again Man in the Middle attacks
- VPN – Virtual Private Networks
- Tunnel your internet / network traffic
- Data is not logged (depends on VPN Service)
- ISP cannot read what you are doing (see above)
- Public Wifi’s always a must use tool
- Antivirus still a thing
- Some have extensions to help with vulnerabilities and malicious content.
- Just be mindful what you do.
- Adblocking
- This is all for now, as I review there will be a v1.4.1 by Thursday
- Browsers: Extensions
- Example, here was my troubleshooting steps over the weekend after taking notice.
- Everyone