About: Warshipping

An Entity of Type: Thing, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPh

Property Value
dbo:abstract
  • In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPhone, in order to explain the shipment. The advancement of low-power electronics, thanks in part to Maker culture, has greatly increased the effectiveness of this methodology as a credible method of attacking networks. In 2019, IBM X-Force Red coined the name “Warshipping” and described an attack platform that included several low-cost components that could be combined, shipped to targets, and controlled remotely for 2–3 weeks. A solar component was also described to allow the devices to run indefinitely. Aspects of a modern warshipping attack include the following: * Devices that are hidden from the recipient, potentially inside objects or inside the packaging material or box structure itself. * Command and Control (C2) capability via a dependable communication medium. Most commonly this is provided via cellular modems. * A power management strategy that allows the device to operate for weeks. Solar panels may be utilized to lengthen the run-time of the device. * One or more devices used for the operational attack. These can include radios that are built for protocols such as Bluetooth, Wireless LAN, Near Field Communication (NFC), and software-defined radio (SDR) devices for capturing multiple types of protocols. Microphones, cameras, and other capture devices could be included as well. * Global Positioning System (GPS) technology for reporting on the location of the device, allowing the activation of certain capabilities upon delivery to its target. * Passive triangulation to get around GPS signal issues The increasing use of large, online retailers contributes to the relevancy of this attack. In 2019, the United States Postal Service reports that they deliver 484.8 million mailpieces per day. The name is by analogy with wardriving and wardialling. (en)
dbo:wikiPageID
  • 61467609 (xsd:integer)
dbo:wikiPageLength
  • 3937 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 1115671665 (xsd:integer)
dbo:wikiPageWikiLink
dbp:wikiPageUsesTemplate
dct:subject
rdfs:comment
  • In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPh (en)
rdfs:label
  • Warshipping (en)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is dbo:wikiPageWikiLink of
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License