fabio ghioni asymmetric warfare and interception revealed

42
www.zone-h.org the Internet thermometer Asymmetric warfare and interception revealed Asymmetric warfare and interception revealed

Upload: fabio-ghioni

Post on 25-Jan-2015

1.219 views

Category:

Technology


1 download

DESCRIPTION

Fabio Ghioni Asymmetric Warfare and Interception revealed

TRANSCRIPT

Page 1: Fabio Ghioni Asymmetric Warfare and Interception revealed

www.zone-h.orgthe Internet thermometer

Asymmetric warfareand

interception revealed

Asymmetric warfareand

interception revealed

Page 2: Fabio Ghioni Asymmetric Warfare and Interception revealed

THE LECTURERS

Fabio Ghioni

Roberto Preatoni

www.zone-h.orgthe Internet thermometer

Page 3: Fabio Ghioni Asymmetric Warfare and Interception revealed

MailServ

er

WebServ

erDB

DB

Webapp

WebClient

Webapp

Webapp

Webapp

HTTPrequest

(cleartextor SSL)

HTTP reply(HTML,

Javascript,VBscript,

etc)

Plugins:•Perl•C/C++•JSP, etc

Databaseconnection:•ADO,•ODBC, etc.

SQLDatabase

•Apache•IIS•Netscape

Firewall

Why Zone-H ?

YOU!

www.zone-h.orgthe Internet thermometer

Page 4: Fabio Ghioni Asymmetric Warfare and Interception revealed

D i g i t a l a t t a c k s a m o u n t s i n c e 2 0 0 2

1 6 0 0 1811 23413652 3907 3468

41755279

9884

14575

12739

16393 1672415638

16924 17329

25273

0

5000

10000

15000

20000

25000

30000

2002-

01

2002-

02

2002-

03

2002-

04

2002-

05

2002-

06

2002-

07

2002-

08

2002-

09

2002-

10

2002-

11

2002-

12

2003-

01

2003-

02

2003-

03

2003-

04

2003-

05

D a t e

D i g i t a l a t t a c k s a m o u n t

www.zone-h.orgthe Internet thermometer

In 2004 35.000+ / months

Page 5: Fabio Ghioni Asymmetric Warfare and Interception revealed

Internet today

www.zone-.orgthe Internet thermometer

INTERNET

TODAY

40 millions of servers

MOBILECELLPHONES

TODAY

APPROAX 1BILLION

Page 6: Fabio Ghioni Asymmetric Warfare and Interception revealed

Internet today

www.zone-.orgthe Internet thermometer

INTERNET

TODAY

MOBILECELLPHONES

CONVERTED INTO3G / 4G+

= EXTREME PAIN

Page 7: Fabio Ghioni Asymmetric Warfare and Interception revealed

- Protocol- Telco network component- OS- User application level- SIM / USIM toolkit application level

www.zone-.orgthe Internet thermometer

3g exploitable points

Page 8: Fabio Ghioni Asymmetric Warfare and Interception revealed

TERRORISM ?

www.zone-.orgthe Internet thermometer

About terrorism

Page 9: Fabio Ghioni Asymmetric Warfare and Interception revealed

WHAT IS IT?

“threats outside the range of conventional warfareand difficult to respond to in kind “ U.S. Dictionary of Military

Terms

Asymmetric warfare

WHEN IS IT USED?

“If the enemy is superior in strenght, evade him. Ifhis forces are united, separate them. Attack him

where he is unprepared; appear where you are notexpected.” Sun Tzu

www.zone-h.orgthe Internet thermometer

Page 10: Fabio Ghioni Asymmetric Warfare and Interception revealed

Asymmetric warfare and infowar

www.zone-h.orgthe Internet thermometer

Asymmetric Warfare (AW)

“Battlefield” where small groups of individuals can producemassive damage with minimum effort and risk from virtuallyanywhere in the world.

Information Operations (IO)

Hit the adversary’s information and IT systems andsimultaneously defend one’s own information and IT systems.

Information Warfare (IW)

Information Operations conducted in moments of crisis orconflict, aimed at reaching or promoting given objectivestowards given adversaries.

Page 11: Fabio Ghioni Asymmetric Warfare and Interception revealed

ICT WARFARE

“It’s the best strategy foran asymmetric conflict”

www.zone-h.orgthe Internet thermometer

•Distributed attacks, high anonimity

•Possibility to use the same enemy’s infrastructures

•Low cost of technology implementation and R&D

•Wide range of critical infrastructures to be attacked

•Possibility to carry out unconventional activities

•Direct contact with the enemy’s command andcontrol center at the highest ranks

Page 12: Fabio Ghioni Asymmetric Warfare and Interception revealed

The heritage:mechanical war

Dirty war Systemic war

PeaceWar ICT War

Future conflicts dimensions

www.zone-.orgthe Internet thermometer

Page 13: Fabio Ghioni Asymmetric Warfare and Interception revealed

Technology highlow

Po

wer

Forte

Debole

Mechanicalwar

War andPeace

Systemic warDirty war

ICT War

Future conflicts dimensions

www.zone-.orgthe Internet thermometer

Page 14: Fabio Ghioni Asymmetric Warfare and Interception revealed

Usage of different conflict unconventionaltipologies to defy an enemy with a superiorwarfare capability

-“Traditional terrorism”- Use of chemical/nuclear/biological weapons- Attack to the ICT infrastructures critical to theeconomy and national security

ICT war targets against e-nations-Economy-Public service infrastructures-Military and civil defenseMultiplier of the above

About terrorism

www.zone-.orgthe Internet thermometer

Page 15: Fabio Ghioni Asymmetric Warfare and Interception revealed

Sensored networks and criticalinfrastructure protection

- National security- Asymmetric warfare and infowar- Defence and uses in state of war

www.zone-h.orgthe Internet thermometer

Page 16: Fabio Ghioni Asymmetric Warfare and Interception revealed

www.zone-h.orgthe Internet thermometer

Protection of public & private critical ICT infrastructures

Reporting e support for analysts

Support Defense

Intelligence

Offensive & employee infiltration capabilities

State of alert & automatic activation of defense systems

conceived for the protection of strategic national &

economic infrastructures

Enemy analysis, counterattack, elaboration &

implementation of offensive strategies

Counterespionage

National security

Page 17: Fabio Ghioni Asymmetric Warfare and Interception revealed

National Security & CriticalInfrastructure Protection

www.zone-h.orgthe Internet thermometer

National Critical Infrastructure

COMPUTER

TELE

CO

MM

UN

ICA

TIO

NS

ELEC

TRIC

PO

WER

Public Health and Safety

Emergency Services

Water Supply and Sewage

Transports

Other Government Operations

Military Command and Control Systems

Mass media

Energy, Oil and Gas Control

Banking and Financing Activities

Industrial Production

Page 18: Fabio Ghioni Asymmetric Warfare and Interception revealed

The beginning of data interception usedto solve terrorism cases

www.zone-h.orgthe Internet thermometer

Page 19: Fabio Ghioni Asymmetric Warfare and Interception revealed

Parametric interception

www.zone-h.orgthe Internet thermometer

Listening #1

Listening #2

Pop ISP #1

Listening #3

Listening #4

Pop ISP #2

Backbone ISPProbe #1

Probe #2

Radius

Probe radius

Mediation server(storage and forwarding)

Parametricrules

configurator

Page 20: Fabio Ghioni Asymmetric Warfare and Interception revealed

- Uses and abuses- Technology involved- Reliability- Usability in investigative procedure- Legal uses in court cases and judicial use- Basic architecture in asymmetric and symmetricdeployment (same nation state standpoint)- Real cases

www.zone-h.orgthe Internet thermometer

Parametric interception

Page 21: Fabio Ghioni Asymmetric Warfare and Interception revealed

Digimetric vs. Parametric- What it is- Uses and abuses- Distributed use on asymmetric and symmetric sensored networks

www.zone-h.orgthe Internet thermometer

Return-path: <[email protected]>Received: from mail.boot.it (unverified [127.0.0.1]) by boot.it (Rockliffe SMTPRA 6.1.16) with ESMTP id <B0002856784@localhost> for<[email protected]>; Fri, 17 Sep 2004 10:43:28 +0200Date: Fri, 17 Sep 2004 10:42:58 +0200From: Fabio xxxxxxxxx <[email protected]>MIME-Version: 1.0To: roberto preatoni <[email protected]>Subject: [Fwd: R: R: report]Mailer: Mozilla 4.75 [en] (Win95; U)Content-Type: multipart/mixed;

Digimetric interception

Page 22: Fabio Ghioni Asymmetric Warfare and Interception revealed

The process of updating investigativeprocedure based on interception from voice todata: technological aspects and examples of

judicial aspects

www.zone-h.orgthe Internet thermometer

Page 23: Fabio Ghioni Asymmetric Warfare and Interception revealed

-Parametric & direct interception are passive instrumentsthat have limits & don’t allow for the analysis ofencrypted communications.

Instruments that guarantee privacy protection and/oranonimity are widely available & easy to use eg. InstantMessaging on SSL; VoIP solutions protected by AeS (eg.SKYPE); there are also systems that allow anonymousfile exchange (MUTE) o messaging (Freenet or Entropy).

- Basic technology- When to use it- Usability in investigative procedure- Can it be detected?- Real cases

www.zone-h.orgthe Internet thermometer

Injected interception

Page 24: Fabio Ghioni Asymmetric Warfare and Interception revealed

Intervene on the sourceWhat are the advantages? The possibility of having direct access to all the data that the target computer

accesses, independent of the means of data transport (physical of telematic). The possibility of tracing the target’s IP address directly or by reverse connection

techniques.

What type of data can be accessed? Complete access to all protected data sent on network channels All data that DON’T normally transit on the network (USB keys, CDRoms, etc.). Access to crypto instruments and keys that allow to decipher the relevant data

Direct access to encrypted physical disks or logical volumes

Audio/Video interception, if a microphone and/or webcam are present on the pc Ie. SUB7 trojan

www.zone-h.orgthe Internet thermometer

Injected interception revealed

Page 25: Fabio Ghioni Asymmetric Warfare and Interception revealed

When to Use Injected Interception When the subject is able to protect its communications

When a constant & punctual monitoring of a subject’s activityis necessary

When it isn’t physically possible to do environmentalinterception with traditional methods

When the subject has an elevated mobility (e.g. notebook)

When it’s not physically possible to access the target’sresources

www.zone-h.orgthe Internet thermometer

Page 26: Fabio Ghioni Asymmetric Warfare and Interception revealed

Usability in Investigative Procedures

Forensics know that guaranteeing that all confiscatedmedia & data remain unmodified at the time of analysis,is of paramount importance.

Controversy:Controversy:- inserting an external injected agent, modifies the media

both physically & logically with its Install function- who inputs the surveillance SW has the same privileges

as the monitored subject

www.zone-h.orgthe Internet thermometer

Page 27: Fabio Ghioni Asymmetric Warfare and Interception revealed

Formal procedures for requesting the interception;

Univocal agents, guaranteed by digital signatures &

encrypted time stamping;

Non repudiable auditing of the operations that are

managed manually or automatically by the agent;

Possibility of recreating the agent’s assembly process

from the source code to the generation of the univocal

executable.

www.zone-h.orgthe Internet thermometer

Privacy vs. Security

Page 28: Fabio Ghioni Asymmetric Warfare and Interception revealed

Can the Agent be Uncovered?It depends on the motivation & the know-how used in the

attack and the defence.

In general, an agent can be discovered if the network to which

the target pc connected is correctly monitored

Therefore, the greatest effort must be funneled into reaching an

extremely high technical complexity in the functions of:

Hiding

Camouflage

Autodestruct

Non-reverse trace back

www.zone-h.orgthe Internet thermometer

Page 29: Fabio Ghioni Asymmetric Warfare and Interception revealed

Virus Technology at the Service ofJustice: an Overview

How do you inject an agent into theinterested party’s computer?The means are many but the ways to beconsidered are principally:TechnologySocial Engineering

Separately or in tandem

www.zone-h.orgthe Internet thermometer

Page 30: Fabio Ghioni Asymmetric Warfare and Interception revealed

- Usability in investigative procedures- Potentiality in sensored networks- Trojan planning and development- Real cases

- Usability of Trojans in InvestigativeProcedures

www.zone-h.orgthe Internet thermometer

Trojans

Page 31: Fabio Ghioni Asymmetric Warfare and Interception revealed

Potentiality in Sensored Networks

• Integration with parametric interception infrastructure

• Anonymity of Agent Communication through destinationIP spoofing (e.g. Mailing of a letter to a nonexistentaddress. If we control the central post office exchange,we will be able to intercept and retrieve the letter andany other mail sent to the fictitious address.)

www.zone-h.orgthe Internet thermometer

Page 32: Fabio Ghioni Asymmetric Warfare and Interception revealed

Trojan planning and development• A lot of trojans are available on the net• Many trojan coders privately sell releases of their trojans that are

not detectable by antivirus programs for less than 100-200 USD

• Trojans available on the Internet are not a good choice because:• They are undetectable by antivirus programs but are detectable

by humans• Made by script kiddies (no design, bad source code)• Not so paranoid

• No encrypted communication• No polymorphic self-encryption• No self-destruction capabilities

• Not written for usage in formal investigative procedures• Trojans used for intelligence must be written, tested and approved

with a formal development approach.• Real cases

www.zone-h.orgthe Internet thermometer

Page 33: Fabio Ghioni Asymmetric Warfare and Interception revealed

Cyber attacks : an abstract built onZone-H's experience

www.zone-h.orgthe Internet thermometer

Page 34: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 35: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 36: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 37: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 38: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 39: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBERFIGHTSKashmir relatedIraq war relatedCode red release relatedPalestine-Israel relatedNo-Global relatedwww.zone-h.org

the Internet thermometer

Page 40: Fabio Ghioni Asymmetric Warfare and Interception revealed

CYBER-ATTACKS ARE CONVENIENT BECAUSE:• Lack of IT laws• Lack of L.E. international cooperation• ISPs are non-transparent (privacy law)

CYBER-ATTACKS ARE CONVENIENT BECAUSE:• General lack of security• No need to protest on streets• No direct confrontation with L.E.

CYBER-ATTACKS WILL NEVER STOP BECAUSE:• Inherent slowness of the Institutions• The Internet is getting more complicated• Software producers are facing a market challengewww.zone-h.org

the Internet thermometer

Page 41: Fabio Ghioni Asymmetric Warfare and Interception revealed

THE NEW EXPRESSIONS OF THEASYMMETRIC CYBERWAR

www.zone-h.orgthe Internet thermometer

COMMAND & CONTROL

INFORMATION GATHERING

ON ENEMY’S TARGETS

PROPAGANDA DIFFUSION

MEDIA MANAGEMENT

“TAX FREE” MONEY

RAISING & LAUNDERING

Page 42: Fabio Ghioni Asymmetric Warfare and Interception revealed

www.zone-h.orgthe Internet thermometer