TC7 Day 2 – Alternative Uses For Portable Gaming Consoles

fruit boat
UPDATE: Slides

I was disappointed in this talk, so here is a picture of a fruit boat. Squidly1 covered the history of hacking the PSP. It wasn’t really that bad, but as regular readers of Hack-A-Day you would have been bored. For the uninformed though, it provided a great overview of the software available for the PSP and the history of its development. It was obvious that Squidly1 is not a hardware person: she admitted to attempting the PSP USB keyboard hack, described the PSP iTrip hack as receiving FM and had a photo of a 10GB Duo (coincidently the same color as the 1.0GB Duo). To her credit, she did have pictures of using an IR keyboard and I hadn’t seen PSPInside, which looks really cool. Check out her blog for PSP links and her development work.

Continue reading “TC7 Day 2 – Alternative Uses For Portable Gaming Consoles”

TC7 Day 1 – 802.11 Bait: Badass Tackle For Wireless Phishing

beetle
UPDATE: Slides

The Shmoo group (Beetle pictured, blurry in real life) presented phishing using rogue access points. The demo showed a rogue access point serving pages and gathering usernames and passwords as they came in. This could become a real problem in areas where there is heavy demand for wireless access like airports. With an EVDO card you could be the only AP in the area. They are developing user tools to watch the the local wireless infrastructure and warn you when things are going pear shaped and it is really unsafe to connect in that area.

Continue reading “TC7 Day 1 – 802.11 Bait: Badass Tackle For Wireless Phishing”

TC7 Day 1 – Anon. Communication For The U.S.DoD… And You

roger
UPDATE: Slides

Roger Dingledine gave a presentation on Tor, which we’ve covered before. It was really interesting and covered common misconceptions. People often talk about Tor being abused, but the fact is true criminals have far better botnets that they can use for their work instead of Tor. Something that I hadn’t realized before is that if you have a Tor exit node on the same IP address as your web server all of the Tor users will get the benefit of a fully encrypted link to your website instead of the usual plain text final hop. The EFF is currently running a GUI competition. Somebody needs to build a Sneakers style Google map of hops. Any takers?

Continue reading “TC7 Day 1 – Anon. Communication For The U.S.DoD… And You”

TC7 Day 1 – The Fragmentation Attack In Practice

andrea
UPDATE: Slides, paper and code

Andrea Bittau (not blurry in real life) gave a demo of the WEP fragmentation attack. The attack only requires one sniffed packet from the WEPed network unlike replay attacks which usually require you to get an ARP packet. He built a simple tool to sniff a packet and then build packets to create a legitimate connection to the access point. At this point a server on the internet is contacted to flood the network with packets at up to 1400 packets per second. This generates a ton of unique IVs and aircrack is called every 100000 packets till the WEP key is cracked. In the demo it took under 5 minutes for the automated process to complete.

Continue reading “TC7 Day 1 – The Fragmentation Attack In Practice”

TC7 Day 1 – Bastille Hardening Assessment Tool

jay beale
UPDATE: Slides

Bastille is an OS hardening tool for Linux. Jay Beale gave a presentation on how to “lock down” a system using it. Bastille can analyze your current setup and give you a rating based on how secure your system is. The program asks you questions based on your configuration (“Do you want to turn off ### service?”). It explains the possible consequences of taking the suggested actions. The process can be very educational. The system is modular so you can add your own modules by writing a few lines of Perl. Bastille can also generate configurations that can be deployed across multiple machines.

Continue reading “TC7 Day 1 – Bastille Hardening Assessment Tool”