Small changes…

DC702, is getting a separation but still a part of the network.
dc702 is also getting it’s 3rd monthly meet at sonic at Patrick and McCloud. 6pm pst till late this Saturday.

 

Posted in Podcasts, Project, wrnet | Comments Off on Small changes…

DC702 – 2nd meet 12-8-2018

Monthly meet returns!

Come hang out at sonic, will be discussing a few talks that will be on the dc702 podcasts that is still in the works.

Agenda: Latest vulnerability coverage,  if you are new an intro into cyber security stuff.

For a temp location: Until we get more Members will be held at a sonic as there is a ton of seats not too cold out.
Location is: Sonic Drive-In, 6135 S Pecos Rd, Las Vegas, NV 89120

At this same time another group I am apart of is also there named “Ratsun” so if you have an Nissan / Old Datsun bring it by.

inquiries of the location [email protected]

 

Posted in Podcasts, Project, wrnet | Comments Off on DC702 – 2nd meet 12-8-2018

Added Discord and re-linked my stream

Check out from the navigation menu above.

I have added the Discord and Relinked my stream.

I stream Monday – Friday from 8pm till 11pm
If you watch the stream you will earn loyalty points that can be redeem’d for cyber and computer related questions and every Monday night at 8pm pst is the dc702 Podcast for q/a and vuln talks. (If a turn out shows, if no turn out I will move it for the next week)
 

Posted in wrnet | Comments Off on Added Discord and re-linked my stream

DC702 – Meet 11/20


This meet was a short brief talk about in a week of vulnerabilities.

Small turn out wasn’t expecting much as of yet.
venue will change as the group grows.

for now I have a discord open for the server and will update with a  link soon.

Posted in Project, wrnet | Comments Off on DC702 – Meet 11/20

Warframe streams lately – yo fortuna is here!

Well I don’t need to be a Warframe Partner regardless that it is a small time streamers nightmare (catch22 see previous post)

I’ve decided to keep up with stream what I like and do my best to build something from it. I may not be someone awesome and super people skills, I am a bit technical and a nerd when it comes to games and when I get involved I tend to learn everything about it as much as I can.

You don’t need to be a partner to help others and you don’t need to be a partner to be a consultant with warframe. I encourage anyone who visits my stream if they need help just let me know and I’ll help you especially getting started with Warframe. I struggled to get started as much as you are right now! (if you are reading this and is new to warframe) There is hacks and tips you can do to avoid spending cash for plat!.

Fortuna update is wild tho, only thing I hate about it is the rep grind is a bit way too much too soon.
But so far I like it, it’s fun.

Fishing has improved, mining omg! is much better now. tracking pets is cool and the best of all Kboards, seemed to be designed on the kung fury style of hoverboards and the theme of the 80’s really gives it a nice touch.

Doing tricks is easy and fun.

well anyways, catch me in game later on.

Posted in Project, Warframe, wrnet | Comments Off on Warframe streams lately – yo fortuna is here!

Weekly – Quickcast – Vulnerability topics – test pilot.


Starting tonight at 8pm PST. I am running a test pilot stream with my twitch
Topic is going to recap last weeks vulnerabilities, what they are, what they mean, and how to protect yourself.

Posted in Podcasts, Project, wrnet | Comments Off on Weekly – Quickcast – Vulnerability topics – test pilot.

WR’s DC702 – Monthly meet & greet.

Date / Time: 11/10/2018 (Saturday) starting at 6pm till 10pm.

For a temp location: Until we get more Members will be held at a sonic as there is a ton of seats not too cold out.
Location is: Sonic Drive-In, 6135 S Pecos Rd, Las Vegas, NV 89120

At this same time another group I am apart of is also there named “Ratsun” so if you have an Nissan / Old Datsun bring it by.

inquiries of the location [email protected]

Posted in wrnet | Comments Off on WR’s DC702 – Monthly meet & greet.

Cyber Awarn3ss v1.7 – Agenda for the podcast.

 

This talk is about Cyber Awar3ness v1.7 – Skimmers and Robocalls

  • Skimmers
    • ATM Skimmers
    • Preventative – Stay Safe tips
  • Robocalls and…
    • What is a Phreaker?
    • What is a spammer?
    • Scams Scams Scams…
Posted in Podcasts | Comments Off on Cyber Awarn3ss v1.7 – Agenda for the podcast.

Cyber Awareness v1.6 What is phishing scams?

What is phishing scams?

Phishing is the fraudulent attempt to obtain sensitive information such as

  • Usernames
  • Passwords
  • Credit Card Information
  • Misc information

Often used for malicious reasons by disguising as a trustworthy entity via electronic communications.

  • Spear Phishing
    • Phishing attempt directed at a specific individual or companies that have been termed spear phishing in contrast to builk phishing. Spear phishing attackers often gather and use personal information (kallador, old password, threatening email) about their target to increase their probability of success.
  • Clone Phishing
    • Phishing is a type of attack whereby a legitimate or previously deliver email containing an attachment or link has had its content and recipient address taken and used to create an almost identical or cloned email. (bank email looks legit, but contains bad links to bad places)
  • Whaling
    • The term whaling has been coined for spear phishing attacks directed specifically at senior executives and other high-profile targets. (I was a VIP Tech, I handled a lot of tech issues with SVP’s and CEO of of the company. I would get a call every once a week about a special email from the CEO to one of the SVP’s asking to paypal some money, they where pretending to be the CEO in this situation asking for a red flag item paypal as the CEO would never ask for this from any of the SVP’s) Senior Vice Presidents
  • Red flags
    • Stuff you don’t use (paypal, btc)
    • Link manipulations
    • Filter Evasions
    • Social networks Evasions
    • Website forgeries (banks, blizzard)
    • Covert redirects (banks, blizzard )
    • Social engineering
    • Smishing – SMS Phishing

 

Email: keep your email client (outlook, thunderbird, etc.. ) updated.
Browsers: Keep your browser updated, if allowed install extensions such as “adblockers, script blocking, etc..” IE: Chrome->Adblock+ or uBlock Origins, no script for advanced stuff.
Don’t click on links directly, always hover over them to see if the link is legit and not something like
“bankofamerica.com.i.am.an.ding.donger.cw”

Anti-Viruses, they normally have a tool for such things phishing attempts.

 

 

 

 

Aug. 9-12th

Defcon -> PiraboxBOX on a Rasberry Pi 3b+ +logging of mac addresses of who connected.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Posted in Project | Comments Off on Cyber Awareness v1.6 What is phishing scams?

Cyber Awar3ness v1.5 – Usb Flash Drives of Death!

Cyber Awar3ness v1.5 – USB stuff… yeah if you have seen Mr Robot, then you are really in for a surprise of how real that show is (as it is shown the director wanted to make everything as real as possible, no fiction)

Sorry if I am spoiling last season’s stuff and if you have not seen it yet, please go do so.
https://motherboard.vice.com/en_us/search?all=true&model=articles&q=a%20round%20table%20of%20hackers

Do not try any of this on a system you do NOT own, if you do such things be sure you are in a test environment of a systems you own or have authorization to run such experiments as everything below is an experimental (hacking)

This is a demonstration to give an insight of what “a wild usb appears” can do if you find one out in the wild.

Contents

Reprogrammable microcontroller USB attacks

  • Rubber Ducky – a commercial keystroke injection attack platform released in 2010. Once connected to a host computer, the Rubber Ducky poses as a keyboard and injects a preloaded keystroke sequence.
    1. https://hakshop.com/products/usb-rubber-ducky-deluxe
  • PHUKD/URFUKED attack platforms – similar to Rubber Ducky, but allows an attacker to select the time when it injects the malicious keystrokes.
    1. https://www.irongeek.com/i.php?page=security/homemade-hardware-keylogger-phukd
  • USBdriveby – provides quick covert installation of backdoors and overriding DNS settings on an unlocked OS X host via USB in a matter of seconds by emulating an USB keyboard and mouse.
    1. http://samy.pl/usbdriveby/
  • Evilduino – similar to PHUKD/URFUKED, but uses Arduino microcontrollers instead of Teensy. Also works by emulating a keyboard/mouse and can send keystrokes/mouse cursor movements to the host according to a preloaded script.
    1. https://www.slideshare.net/Rashidferoz1/evilduino
  • Unintended USB channel – a proof of concept (POC) USB hardware trojan that exfiltrates data based on unintended USB channels (such as using USB speakers to exfiltrate data).
  • TURNIPSCHOOL (COTTONMOUTH-1) – a hardware implant concealed within a USB cable. Developed by the NSA.
    1. http://www.nsaplayset.org/turnipschool
  • RIT attack via USB mass storage – attack described in a research paper. It relies on changing the content of files while the USB mass storage device connected to a victim’s computer.
    1. https://pdfs.semanticscholar.org/70d7/d873c72d0db9968650ad359c6ef915ffbb42.pdf
  • Attacks on wireless USB dongles – a category of attacks first explored with the release of the KeySweeper attack platform by Samy Kamkar, a tool that covertly logs and decrypts keystrokes from many Microsoft RF wireless keyboards.
    1. https://www.mousejack.com/
    2. https://samy.pl/keysweeper/
  • Default Gateway Override – an attack that uses a microcontroller to spoof a USB Ethernet adapter to override DHCP settings and hijack local traffic.
    1. https://support.symantec.com/en_US/article.HOWTO98519.html

Maliciously reprogrammed USB peripheral firmware attacks

  • Smartphone-based HID attacks – first described in a research paper for which researchers created custom Android gadget drivers to overwrite how Android interacted with USB devices. The malicious driver interacted with the Android USB gadget API to simulate USB keyboard and mouse devices connected to the phone.
    1. https://null-byte.wonderhowto.com/how-to/hid-keyboard-attack-with-android-not-kali-nethunter-0164349/
  • DNS Override by Modified USB Firmware – researchers modified the firmware of a USB flash drive and used it to emulate a USB-Ethernet adapter, which then allowed them to hijack local traffic.
  • Keyboard Emulation by Modified USB Firmware – several researchers showed how poisoning the firmware of USB flash drives, an attacker could inject keyboard strokes [1, 2, 3].
  • Hidden Partition Patch – researchers demonstrated how a USB flash drive could be reprogrammed to act like a normal drive, creating a hidden partition that cannot be formatted, allowing for covert data exfiltration.
  • Password Protection Bypass Patch – a small modification of a USB flash drive’s firmware allows attackers to bypass password-protected USB flash drives.
  • Virtual Machine Break-Out – researchers used USB firmware to break out of virtual machine environments.
    1. https://whatis.techtarget.com/definition/virtual-machine-escape
  • Boot Sector Virus – researchers used a USB flash drive to infect the computer before it boots [1, 2].
    1. https://usa.kaspersky.com/resource-center/definitions/boot-sector-virus
  • iSeeYou – POC program that reprograms the firmware of a class of Apple internal iSight webcams so that an attacker can covertly capture video without the LED indicator warning.

Attacks based on unprogrammed USB devices

  • CVE-2010-2568 .LNK exploit used by Stuxnet and Fanny malware
    1. https://www.cvedetails.com/cve/CVE-2010-2568/
  • USB Backdoor into Air-Gapped Hosts – attack used by the Fanny malware, developed by the Equation Group (codename for the NSA). Attack uses USB hidden storage to store preset commands that map computers in air-gapped networks. Info on networks saved back to the USB flash drive’s hidden storage.
  • Data Hiding on USB Mass Storage Devices – a large collection of tricks of hiding malware or stolen data inside a USB flash drive (eg.: storing data outside of the normal partitions, hiding the file inside an invisible folder by making that folder’s icon and name transparent, etc.).
  • AutoRun Exploits – depending on how host computers were configured, some PCs would auto-execute predetermined files located on a USB device’s storage. There’s an entire malware category dedicated to this called autorun malware.
  • Cold Boot Attacks – aka the RAM dump attack. Attackers can store a memory dumper on a USB flash drive and extract left-over data from RAM by booting from a USB device.
  • Buffer Overflow based Attacks – Several attacks that rely on exploiting OS buffer overflows when a USB device inserted into a computer. This happens because operating systems will enumerate the devices and functions (run certain predetermined operations) when a USB device is inserted [1, 2, 3, 4].
  • Driver Update – very complex attack that relies on obtaining a VeriSign Class 3 Organizational Certificate and submitting drivers to Microsoft that are automatically delivered and installed on user PCs when a certain SUB device inserted. This attack is possible, but very hard to pull off in the real world.
  • Device Firmware Upgrade (DFU) – attackers can use the Device Firmware Upgrade (DFU), a legitimate process supported by the USB standard, to update local legitimate firmware to a malicious version.
  • USB Thief – a USB flash drive based data-stealing malware that was recently discovered by ESET
    1. https://securityaffairs.co/wordpress/45741/malware/usb-thief-trojan.html
  • Attacks on Smartphones via the USB Port – attackers can hide and deliver malware (malicious) via USB phone chargers.
  • USBee attack – make a USB connector’s data bus give out electromagnetic emissions that can be used to exfiltrate data.
    1. https://arstechnica.com/information-technology/2016/08/meet-usbee-the-malware-that-uses-usb-drives-to-covertly-jump-airgaps/

Electrical attacks

  • USB Killer – permanently destroy devices by inserting a USB device that triggers an electrical surcharge
Posted in Project, wrnet | Comments Off on Cyber Awar3ness v1.5 – Usb Flash Drives of Death!