Let's Hack a House

Download Let's Hack a House

Post on 25-Jul-2015

134 views

Category:

Technology

0 download

TRANSCRIPT

  • Lets hack a house.

    Tony Gambacortatony@synack.com

  • Im supposed to scare you.

  • Distance

    Ratio

    Physical Access Same WiFi Darkest Peru

    One-to-One

    One-to-Many

  • When is a WebCam not a WebCam?

  • Coffee Cup Ambush

  • WebCamCompliance

    Security

    A consumer sees Peace of Mind

  • WebCam

    Linux Server

    Network Access

    Microphone

    Camera

    A geek sees

  • WebCamAbility to inject data

    Eyes and ears inside

    Attack platform

    A bad actor sees

  • Variations on a theme

    Lets hack some stuff!

  • Pro Tip: Youll probably break something your first time. Plan accordingly.

  • UART

  • This adapter just lets my laptops USB talk to other devices

  • } Ill do all this stuff when Im booting up.

  • Coffee Cup Ambush

  • Eyes and Ears Inside

    See who comes and goes Listen to conversations

    Ability to inject data

    Edit live video Delete video

    Attack Platform

    Scan internal networks Distribute malware APT toe-hold

  • Bedtime Reading

    Key Takeaway:

    Everything is just parts connected to other parts.

  • Distance

    Ratio

    target-centric 1:1 ratio

    physical access { }

    vulnerability-centric 1 : many ratio remote access{ }

  • Forget Alice.

    Any Brady will do.

  • Enumerate the Widgets.

  • Thats funnyYour URL: https://FG-59301.iotco.com

    S/N = XX-00000

    26 * 26 * 10 * 10 * 10 * 10 * 10

    67.6 Million Possibilities

  • 67.6 Million Possibilities

    3,380,000 active hosts

    Thats funny

  • 123456password1234512345678qwerty

    Nope.Nope.

    Nope.

    Nope.Nope.

    Nope.Nope.

    Nope.

    Nope.Were in!

    Nope.Nope.

    Nope.

    Nope.Nope.

    Were in!Nope.

    Nope.

    Nope.Nope.

    123456789 LOCKED.

    Common Passwords

    Average Success Rate: 3-5%

    Think sideways

  • Thats (not so) funny3,380,000 Active Hosts

    1% Success Rate

    33,800 Compromised Devices

  • The one-offs are enough to make the news.

  • Bedtime Reading

    Key Takeaway:

    Statistically, if I know who your users are, youre gonna have a bad time.

  • So What? Weve seen all of these attacks before, at scale

    Learn from the lessons of fraud

    Every once in a while, get your hands dirty

  • Thanks!