HACKING EXPOSED EMBEDDED – THE DARK ... - RSA Conference
Recommend Documents
Hacking Exposed: Embedded. Securing the Unsecurable. Billy Rios ... (HMI,
Management, Web). I/O communications ... “NONE of that stuff is on the Internet…
” ...
We define malware as âmalicious softwareâ or anything that can run on an endpoint and do bad things. This includes .
Session ID: Session Classification: Christopher Hadnagy. Social-Engineer.Com.
Human Hacking Exposed. 6 Preventative Tips. That Can. Save Your Company.
We modified an existing Apple firmware update for their chip and corrupted it. 26 ... of expensive doorstops in your ent
Co-author of Windows Internals ... Active December 2011-April 2012 ... 50,000 monitor screens are blinking 'System disk
Chapter 4: Hacking Windows 95/98 and Me. 131 ... We discuss Windows XP and
its business-oriented cous- .... MRemotely Hacking the Windows 9x Registry.
HACKING EXPOSED: BEYOND THE MALWARE. EXP-T10. ELIA ZAITSEV. Co-
Founder & CTO. CrowdStrike Inc. @DmitriCyber. Principal Solutions Architect.
Oct 17, 2012 ... Or do these hacks just get a lot of media exposure? .... broadband Internet the
use of powerful hacking tools and techniques stays unnoticed ...
"Hacking Exposed" is a book that claims to illustrate how hacking is done. ... web
server or a mail server, those addresses can easily be found, because they're ...
SESSION ID: Hacking Exposed: Day of Destruction. EXP-W01. George Kurtz.
CrowdStrike, President & CEO. Dmitri Alperovitch. CrowdStrike, Co-Founder & ...
#RSAC. Agenda. ◇ Setting the stage. ◇ Demo a working attack – Ripped from
the Headlines! ◇ Target-esqe breach. ◇ POS Malware (Dexter).
We'll need some of these items to add and remove components to the .... DigiKey. â Manufactures website. â Call the
Kiosks 101 What is an Internet Kiosk. Kiosk Software Security Model. Hacking Internet Kiosks Vulnerabilities in the Kiosk Security Model.
Cyber Security & Aviation. MASH-F01. Managing ... General Counsel & Managing Director Information. Security. TAL
Taking it all In â And Applying It to Scale ... resolve ALL potential vulnerabilities, whether reported from ..... ISO
Hacking Exposed: Web Application ... Specialized in Web Application
Assessment, Wireless Network ... World Wide Web Created by Tim-Berners Lee
in 1989.
In the 1980's, and 1990's, “hacking” was as a fun and intellectually stimulating ....
Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition by Stuart.
Securosis, L.L.C. 515 E. Carefree Highway, Suite 766 Phoenix, AZ 85085 T 602-412-3051 .... provides advanced analysis ca
vendors continue to roll their stuff into VMs and AMIs that can run in public and private clouds. So they are ready to s
The Hacks NFC Android zero shell iJacking Rogue mouse
3
Near Field Communications (NFC)
4
NFC hijacking NFC is a technology built into modern phones Active (Phone)/Passive(tag) Similar to RFID
Active (Phone)/Active(POS) Visa and Mastercard touch payment systems
A/P used in Europe for donations and other simple payments Real world attack that is happening today
5
NFC Explain Donation Poster Use Poster to donate Hijack Poster Steal Donation/Credit Card
6
Android Zero Shell
7
Android Zero Shell Which App is more Safe?
8
Android Zero Shell Install App Introduce Command and Control Demo the Zero Shell Show App Exploitation to get additional Privs
9
iJacking
10
iJacking
iPwn your iDevice 11
iJacking Show iPad connecting to Wifi Use ipad to log into gmail Show exploit on iPad Send APT/VNC Introduce C&C Show Map Dump Keychain Show Reverse Shell
12
Rogue Mouse
13
ROGUEMOUSE • Embed a USB hub and Ethernet Adapter into mouse. • Embed a miniature ARM computer with running Linux with DHCP and HTTPD. • Connect the ARM computer to the Ethernet Adapter with a crossover cable. • Control a virtualized LAN targeting ANY valid IPv4 Network ID via the ARM computer.
MALWAREINJECTION • User navigates to website hosted somewhere on the spoofed network. • Trojan mouse hosts malicious webserver and serves up infected software updates containing malware code. • Host computer now infected. Malware signals mouse to disable internal interface.
Countermeasures NFC Active/Active is safer (for now)
Android zero shell Be careful of apps, get only from legitimate sources
iJacking Keep up to date on patches, be careful where you connect
Rogue mouse Block new USB devices, or just don’t plug them in