List of Affected Devices Technical Details Crazyradio USB Dongle
List of Affected Devices Technical Details Crazyradio USB Dongle
This attack is made possible due to keyboard vendors (Logitech and Dell) failing to
encrypt data transmissions between the keyboard and USB adapter or failing to
properly authenticate devices communicating with the adapter. It's been over two
years since the vulnerabilities were disclosed but there are reportedly more than a
billion affected devices worldwide as Logitech and Dell are extremely popular
manufactures of wireless keyboards.
For more information on this attack, check out Bastille's official website for a list
of affected devices and technical details.
The "Crazyradio USB Dongle" used in these attacks is a 2.4 GHz bi-directional
transceiver which can send and receive radio telemetry. Essentially, this USB
dongle is capable of observing, recording, and injecting wireless radio waves.
GeForce graphics cards are a great starting point for hackers who are considering
building a dedicated brute-force machine. At just $189, the GeForce GTX 1050 Ti is
a good starter GPU.
Pocket-sized PCs are growing in popularity due to their small size, physical
keyboards, ability to handle high-performance games, and Intel CPUs which are
superior to ones found in Raspberry Pis and smartphones.
Pentesters can easily install a variety of Linux operating systems on this device
including Ubuntu, Kali Linux, and BlackArch in place of the default Windows 10.
If you're looking for a bit more power in a slimmer laptop, the latest GPD Pocket
2 features better hardware specs and is 50% thinner than the previous model.
Null Byte has covered how to build a hacking Raspberry Pi, use VNC to remotely
access it, and create a portable pentesting Pi box, to name just a few tutorials.
Using a Raspberry Pi as a hacking tool has been covered at length, so I'll move on.
5The USBarmory
The USB Armory is a computer about the size of a USB flash drive designed to
deliver a number of advanced security features. It was built to support the
development of several security software and applications while reducing power
consumption. As per the developer's keynote at FSec 2016, the USB Armory can
be used for:
6VPS Subscriptions
A virtual private server (VPS) is a computer we can control remotely from any
internet-connected device in the world. Adding a reliable VPS subscription to your
arsenal is essential to any penetration tester and professional security researcher.
From a remote VPS, penetrations testers can:
7Hak5 Gear
Hak5 is an award-winning podcast that offers immersive information security
training and renowned penetration testing gear. Below are some of the excellent
tools Hak5 has to offer.
Bash Bunny
The Bash Bunny is a multi-functional USB attack tool similar to the USB Rubber
Ducky. However, the Bash Bunny is a full-featured Linux operating system which
gives it a number of advantages over the USB Rubber Ducky such as carrying
multiple advanced payloads, emulating a combination of devices, and performing
numerous advanced attacks. Penetration testers with a need to take their physical
attacks to the next level will appreciate this one.
Packet Squirrel
The Packet Squirrel is a pocket-sized man-in-the-middle attack tool designed for
covert packet capturing and secure remote access to target networks. Ports on
this small network implant include a USB and Ethernet.
LAN Turtle
The LAN Turtle is a covert penetration testing tool great for network intelligence
gathering, advanced surveillance, and man-in-the-middle attacks all available via a
graphical shell. It ships equipped with SIM (3G) functionalities and a modular
framework that allows hackers to very easily execute and automate advanced
network attacks.
WiFi Pineapples
The WiFi Pineapple and WiFi Pineapple Nano are excellent rogue access
point and Wi-Fi auditing devices. Their suite of Wi-Fi auditing tools is designed to
make reconnaissance, man-in-the-middle attacks, and hacking wireless networks
quick and painless. Best of all, all of these features can be accessed using any
phone or web browser via the easy-to-use graphical interface.
The Tupavco TP512 Yagi Wi-Fi Directional Antenna has customer reviews reporting
up to 300 feet of range. Some reports online claim up to 1 mile of range where an
unobstructed line of sight to the target router is permitted. There are other
vendors selling similar Yagi products and bundles. For example, ALFA's Yagi
Antenna includes an ALFA hacking chipset and the necessary cable adapter.
3D printers on Amazon (of decent quality) start at around $299. Add the price of
the materials, individual drone components, and a remote control — that's well
over $500 spent building a hacking drone from scratch. If you're looking for a
quicker solution or lack the patience to deal with the technical ins and outs of 3D
printing and drone building, there are alternatives.
The DJI Spark Drone is a small, lightweight drone that includes a remote control
for a total of $399. With up to 15 minutes of flight time, a range of up to 1.2 miles,
and an attached 12 MP 1080p video camera, this is possibly the best, most
affordable little drone currently on the market.
If your budget allows for a wider range of drones, the "DJI Mavic Drone" may be a
better option. It features a higher resolution camera, up to 2.4 miles of range, 8
GB of internal storage (for video recording), 3-axis mechanical gimbal (for
improved stability), and over 20 minutes of flight time.
Null Byte is an excellent repository for learning how to use Metasploit as well as
how to hack macOS and Windows 10. However, e-books and certification exam
preparation cookbooks contain vast amounts of information. These materials are
often created by veteran pentesters with over a decade of hands-on professional
experience. Novice hackers who have prepared for any kind of ethical hacking
exam will tell you how valuable these learning materials can be.
A variety of learning materials can sometimes be found for free on websites like
"All IT eBooks." While some of these e-books are several years old, they still
contain relevant and useful information. Other (non-free) titles include:
This list of hacker gear might not appeal to everyone, however. Did we miss any
noteworthy or new gizmos hackers should know about? Be sure to leave a
comment below with your picks for the essential gadgets hackers should try!
Step 4Exploit!
At last type: exploit to start the listener.
Copy the application that you made (Upgrader.apk) from the root folder, to
you android phone.
Then send it using Uploading it to Dropbox or any sharing website
(like: www.speedyshare.com).
Then send the link that the Website gave you to your friends and exploit
their phones (Only on LAN, but if you used the WAN method then you can
use the exploit anywhere on the INTERNET)
Let the Victim install the Upgrader app(as he would think it is meant to
upgrade some features on his phone)
However, the option of allowance for Installation of apps from Unknown
Sources should be enabled (if not) from the security settings of the android
phone to allow the Trojan to install.
And when he clicks Open...
Step 5BOOM!
There comes the meterpreter prompt:
EECS 710: Information Security and Assurance
Contents
-Department of Justice –CCIPS
-Department of Justice – FBI
-National Security Agency – NSA
-Department of Homeland Security
-CMU/SEI Coordination Center
-Conclusion
*The IA provides a Business Affairs Office and has many partnerships with
the private industry.
*The NSTAC has been around for over 30 years with partnerships in the
telecommunications and aerospace companies.
*Similar to the DHS Cert team CERT.org also provides a response team
available to assist with security issues.
Conclusion
*There are many agencies and websites that are both government and
private sector that provide valuable resources for cyber security.
*Learn how to use the tools provided and contact the agencies in the event
of a cyber crime.
Terminology Overview
-Attacks, Services and Mechanisms
-Security Services
-Threats, Attacks and Vulnerabilities
-Security Policies and Mechanisms for Defense
-Readings, standards, etc.
Definitions
*Confidentiality – concealment of
information or resources. Includes
whether or not data exists. Implies
“authorization” so that only authorized
people can access confidential data.
-Additional Threats/Attacks
Security Mechanisms
Prevention:
Encryption
Physical Controls
Prevention Mechanisms
Detection Mechanisms
Recovery
Example E-Commerce
Prevention: encrypt your orders, rely on the
merchant to perform checks on the caller, don’t
use the Internet (?) …
Other Terminology