Let's Hack a House

Download Let's Hack a House

Post on 25-Jul-2015

134 views

Category:

Technology

0 download

Embed Size (px)

TRANSCRIPT

<ul><li><p>Lets hack a house.</p><p>Tony Gambacortatony@synack.com</p></li><li><p>Im supposed to scare you. </p></li><li><p>Distance</p><p>Ratio</p><p>Physical Access Same WiFi Darkest Peru</p><p>One-to-One</p><p>One-to-Many</p></li><li><p>When is a WebCam not a WebCam?</p></li><li><p>Coffee Cup Ambush </p></li><li><p>WebCamCompliance</p><p>Security</p><p>A consumer sees Peace of Mind</p></li><li><p>WebCam</p><p>Linux Server</p><p>Network Access</p><p>Microphone</p><p>Camera</p><p>A geek sees</p></li><li><p>WebCamAbility to inject data</p><p>Eyes and ears inside</p><p>Attack platform</p><p>A bad actor sees</p></li><li><p>Variations on a theme</p><p>Lets hack some stuff!</p></li><li><p>Pro Tip: Youll probably break something your first time. Plan accordingly.</p></li><li><p>UART</p></li><li><p>This adapter just lets my laptops USB talk to other devices</p></li><li><p>} Ill do all this stuff when Im booting up.</p></li><li><p>Coffee Cup Ambush </p></li><li><p>Eyes and Ears Inside</p><p> See who comes and goes Listen to conversations</p><p>Ability to inject data</p><p> Edit live video Delete video</p><p>Attack Platform</p><p> Scan internal networks Distribute malware APT toe-hold</p></li><li><p>Bedtime Reading </p><p>Key Takeaway:</p><p>Everything is just parts connected to other parts.</p></li><li><p>Distance</p><p>Ratio</p><p>target-centric 1:1 ratio </p><p>physical access { }</p><p>vulnerability-centric 1 : many ratio remote access{ }</p></li><li><p>Forget Alice. </p><p>Any Brady will do.</p></li><li><p>Enumerate the Widgets.</p></li><li><p>Thats funnyYour URL: https://FG-59301.iotco.com</p><p>S/N = XX-00000</p><p>26 * 26 * 10 * 10 * 10 * 10 * 10</p><p>67.6 Million Possibilities </p></li><li><p>67.6 Million Possibilities </p><p>3,380,000 active hosts</p><p>Thats funny</p></li><li><p>123456password1234512345678qwerty</p><p>Nope.Nope.</p><p>Nope.</p><p>Nope.Nope.</p><p>Nope.Nope.</p><p>Nope.</p><p>Nope.Were in!</p><p>Nope.Nope.</p><p>Nope.</p><p>Nope.Nope.</p><p>Were in!Nope.</p><p>Nope.</p><p>Nope.Nope.</p><p>123456789 LOCKED.</p><p>Common Passwords</p><p>Average Success Rate: 3-5%</p><p>Think sideways</p></li><li><p>Thats (not so) funny3,380,000 Active Hosts</p><p>1% Success Rate</p><p>33,800 Compromised Devices</p></li><li><p>The one-offs are enough to make the news.</p></li><li><p>Bedtime Reading </p><p>Key Takeaway:</p><p>Statistically, if I know who your users are, youre gonna have a bad time.</p></li><li><p>So What? Weve seen all of these attacks before, at scale </p><p> Learn from the lessons of fraud </p><p> Every once in a while, get your hands dirty</p></li><li><p>Thanks!</p></li></ul>