Saturday, October 17, 2009

Evil Maid - Pwnie for Overhyped bug

Hey dudes, and dudettes, Happy Diwali to y’all !

Today’s post is about the Evil maid's exploits on an unsuspecting computer user...

Scenario
Full disk encryption with Truecrypt in this case...

The author mentions PGP whole disk encryption but never mentions about testing it on the humor-me FAQ, LOL! :D


Attack
Joanna of Invisible things has come up with an attack (social engineering + physical access + usb drive?!) - WTF I say... If a person has physical access to your box, it is pretty much a goner... what difference does it make if I boot from a live-cd and use a keylogger or do the same thing from an USB drive?

Solution
Disable USB boot from BIOS options (this ain't nothing new to talk about, building a custom USB drive with a small kernel and a simple keylogger is NOT new)

If you know your way around in Linux, and you use it as a base for your penetration testing laptop. Try modprobe -r usb_storage and blacklist in your conf file, if you are paranoid.

You can easily convert the install/remove commands into a shell-script. Alternately, USB devices can be disabled at the kernel level via GRUB or any other boot loader by editing menu.lst / grub.conf

There is also a humor-me FAQ that says...

Q: Is this Evil Maid Attack some l33t new h4ck?
Nope, the concept behind the Evil Maid Attack is neither new, nor l33t in any way.

Q: So, why did you write it?
Because we believe it demonstrates an important problem, and we would like more attention to be paid in the industry to solving it.


As if nobody has covered these hardware based and/or social engineering attacks in the past?

Q: I've disabled boot from USB in BIOS and my BIOS is password protected, am I protected against EM?
No. Taking out your HDD, hooking it up to a USB enclosure case and later installing it back to your laptop increases the attack time by some 5-15 minutes at most. A maid has to carry her own laptop to do this though.


I loved this part... Every maid knows how to pull apart a laptop and remove the hard-drive enclosure without damaging the drive... Do all maids have prior training in corporate espionage, and basic computer/laptop hardware and operations? LOL!

Q: Why did you choose TrueCrypt and not some other product? Because we believe TrueCrypt is a great product, we use it often in our lab, and we would love to see it getting some better protection against such attacks.

Encryption must protect against physical attacks? Since when did that become a pre-requisite for a fool-proof encryption system/software... since the day "Evil maid was coded" I guess... ;))

Their solutions: Protect your laptop (wow, you discovered something here…), TPM (aka snake oil), Disk Hasher (oh, hashing is a “reasonable” solution even though it is broken)

Let me get this straight, you invent a problem out of nothing and you suggest YOUR own solution, roflmao!

Bottom-line
General unsuspecting public will leave a laptop like this fine lady here suggests. If a person identifies himself/herself a hacker, they are NOT supposed to leave their laptops in a hostile environment... When you leave like that, don't identify yourself as a hacker.

Acknowledgments
Thanks to the ennead@truecrypt.org for all the polemics we had which allowed me to better gather my thoughts on the topic. The same thanks to Alex and Rafal, for all the polemics I have had with them (it's customary for ITL to spend a lot of time finding bugs in each other's reasoning).


The person demonstrating such a GREAT attack will go to any extent to prove that an attack is possible, but will not think one bit as to whether it is practical??

Truecrypt clearly mentions about physical attacks in their documentation, which means they are not addressing the issue, and they want you to find something more serious and interesting to work on and if you don’t have a lot of ideas, ping Halvar Flake – He’s a smart guy with a lot of ideas which are innovative. Stop rehashing old attacks and building small Linux kernels with a simple keylogger and write a humor-me FAQ with “we want more attention” (you want the industry to pay attention to the attack or you?)

Truecrypt Dev: My answer was a good safety case or strongbox with a good lock. If you use it, then you will notice that the attacker has accessed your notebook inside (as the case or strongbox will be damaged and it cannot be replaced because you had the correct key with you). If the safety case or strongbox can be opened without getting damaged & unusable, then it's not a good safety case or strongbox. ;-)

Well, what can I say, except … he pwned you!

I nominate “the Evil Maid” for the Pwnie Awards 2010 - Most Overhyped bug… perhaps someone can beat Joanna to the race… Let’s see… hehe!

Errr...Where's all the rum gone?

Thursday, July 30, 2009

R.I.P - Fravia, the master

Fravia (Fjalar Ravia) from Germany is amongst one of the most finest and brave human beings on this planet. He was an ardent reverse-engineer and a master at what he did. In early 2005/06 he gravitated on to search related stuff. He's a good friend and a great guy personally... I didn't know he was dead until I was talking to a friend on RCE.

Without your teachings, emails and your website, I will not be where I am today.

R.I.P Fravia, the brave may not live forever, but the cautious don't live at all !

Monday, May 04, 2009

Warning: Don't be conned

Warning: Don't be conned

This POST is about an exceptionally serious issue, so don't be conned, or fall prey to impostors, and bad guys...

Message:

Don't dial 90# or 09#, #09 or any other combination requested by any technician / serviceman CLAIMING TO BE from your subscriber, on Nokia, and Motorola mobiles these codes are used by telephone service men to test line connectivity, these codes can also steal your number, and enable the caller to use your mobile to make calls, and bill it on your number.

Technically,the caller can SPOOF HIS NUMBER to make calls, which will be routed through and billed on your number so stay alert, terrorists have used these type of conning tricks in the past,and use it now so be careful, and spread the word ...

The information has been confirmed, by Nokia, Motorola, and CNN websites.

Saturday, April 25, 2009

Getting passwords with P2P

Getting passwords with p2p softwares
(Limewire/Bearshare/Kazaa/Shareaza/emule)

1. First you need to get any p2p software,download it with the crack.
2. When you get bearshare and have set it up, click the Search button.
3. Click on 'Documents' in the search section, and type anything like: My Passwords,Yahoo Passwords, Ebay Passwords, My Passes, Rapidshare Pass,XXX Pass, your best bet is My Passwords.txt
4. Now the syntax : Passwords or pass , you can include txt extension if required.
5. Search and download the files and you can see clear text passwords.

How is this possible?
Simple answer, most p2p are illegal, they share your whole hd even if you set restrictions to prevent the sharing of entire hd or ur best collections.

Wrote this a while ago, in some forum (this is from my 2006 scribbling), the funny thing is
"it still works!"

/Quit

Thursday, April 23, 2009



Recession ? Okay, but still cigarettes, gutkha, and beers cost the same amount ... ;)

Recession isn't something amazing, it's just another rough patch ... Get over it already!

Cheers,
Kish

Saturday, March 07, 2009

How to get Examworx dumps for FREE, with a specially crafted URL (similar to my Actualtests bug)

Example PoC: http://www.examworx.com/qadownsession365/BE-100W.exe

URL syntax: http://www.examworx.com/qadownsession365/exam-code.exe

Demos are hosted within the demo directory, as for the earlier example:
http://www.examworx.com/qadownsession365/demo\BE-100W.exe

Screenshot



Examworx is usually, a Pass4sure clone, but no guarantees !
Why pay for the dumps, when you can practically download them for FREE ;)

Cheers,
Kish

Friday, February 27, 2009

My good friend and fellow hacker, Digi from Crimemachine has been chosen to as VMWare vExpert. Only 300 people in the world have made it to the list... John Troyer of VMWare will publish the list sooner or later, on the website, and there's exclusive access to VMworld materials, and more in a private community just for these vetted list of vExperts.

I sincerely wish him, the best of luck to succeed in more of his endeavors with VMware and his consulting projects !

Cheers,
Kish