Difference between revisions of "User:M3m0r3x"
(→Day One) |
(→Day One) |
||
| Line 93: | Line 93: | ||
'''Attacking OpenSSL using Sidechannel Attacks''' <br /> | '''Attacking OpenSSL using Sidechannel Attacks''' <br /> | ||
| − | Not seen live but later in the recording because of the parallel keynote from Phil Zimmermann. But it was very interesting how to get on Information on Side channels. An embedded device or a computer has some interfaces like Keyboard, Monitor, Speaker etc. that are intended. But there are also some unintended interfaces. They are there and you can't do anything to hide them. For example: Time, power consumption electro magnetic radiation etc. On a short example they demonstrated a 4 digit brute force attack on how they exploit the side channel. On a given 4 digit pin they monitored the normal power behavior. Then they started with figure one to brute force the pin. on one number (8) they saw that the pattern of the verification was shifted a little bit to the right. This means more power was used due to a abnormal behavior. Same with the second digit. when the correct number was entered the pattern for verification moved again a bit to the right, and so on. For a four digit pin this can be done in short amount of | + | Not seen live but later in the recording because of the parallel keynote from Phil Zimmermann. But it was very interesting how to get on Information on Side channels. An embedded device or a computer has some interfaces like Keyboard, Monitor, Speaker etc. that are intended. But there are also some unintended interfaces. They are there and you can't do anything to hide or manipulate them. For example: Time, power consumption electro magnetic radiation etc. On a short example they demonstrated a 4 digit brute force attack on how they exploit the side channel of power / EM. On a given 4 digit pin they monitored the normal power behavior. Then they started with figure one to brute force the pin. on one number (8) they saw that the pattern of the verification was shifted a little bit to the right. This means more power was used due to a abnormal behavior. Same with the second digit. when the correct number was entered the pattern for verification moved again a bit to the right, and so on. For a four digit pin this can be done in short amount of time. But on a 2048bit RSA secret key this would take years. In the further talk the presenters explained how to solve this by math and improve the efficiency. Unfortunately this is not my grade of math :-) <br /> |
'''Famous C&C servers from inside to outside''' <br /> | '''Famous C&C servers from inside to outside''' <br /> | ||
Revision as of 14:12, 11 August 2017
| m3m0r3x | |
|---|---|
| | |
| Generated SHA Flag with Name (experiment here) | |
| Arrival | 2017/08/03 00:00 |
| Departure | 2017/08/09 10:00 |
| BuildupVehicle | Car, Transporter |
| Bringing | Arduinos, Raspies, LTE-Router, Switch, Powercoard, some soldering stuff, Hacking Gadgets, UpriBox, FruityWiFiPi |
| Village | Village:1838, Village:Foodhackingbase |
| Working on | |
| Contributions | |
| Contact | |
| @_m3m0r3x_
| |
Contents
Orga
Things I want to visit
Talks (Live or Recording)
Friday
SHA2017 Opening
Cryptowars 2.0: Lessons from the past, for the present
Attacking OpenSSL using Side-channel Attacks
Computer crime and criminal law 101
Famous C&C servers from inside to outside
Blockchain beyond the buzz and hype
icibici workshop: a brain-computer interface for your phone/tablet/etc
Saturday
Android Application Pentesting 101
Tor de-anonymization techniques
An academic's view to incident response<--
Smart Home Security with Tor
Network concepts introduction & wireshark workshop
Modern Digital Forensics analysis, where to find evidence
Sunday
Data Exploitation
TLS Pool: Security orthogonal to Applications
A look at TR-06FAIL and other CPE Configuration Management Disasters<--
Anonymous, secure and easy. You can have them all
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Making bombs
Secure communications hardware
Monday
Blockchains for a Better World
Physical Penetration Testing
Windows forensics
FaceDancer 2.0
Tuesday
Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
Exploiting Twitter with Tinfoleak for investigative purposes
Infrastructure review
SHA2017 Closing
SHA2017 Closing Simulcast
Self organized sessions
Flamethrowers_101
The_One_Ring_Workshop
Open_Molecular_Cooking_Night
Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_&_interactive)
FPGAs_for_Newbies
LearnToSolder
Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools
Secure_communications_hardware
Modern_Digital_Forensics_analysis,_where_to_find_evidences
Windows_forensics
Projects
Camp Notes
Things done on Camp
Day Zero
We arrived at Zeewolde at approximate 01:00 pm. Of course first we build up our village "1838". The rest of the day we were carrying our luggage and equipment from the parking lot to the camp at the Turing field. Then of course we built up the infrastructure to our tents (power and LAN from the Datenklo). I was setting up an accespoint for our village wich is based on an raspberry-pi wich connects all the traffic by tor and separates us from the Camp LAN. It is not that we don't trust the SHA2017 people but...
After work was done we drank some beer and walked over the camp ground to check out different locations. We of course visited the SHA-Habour wich was build up just for this event for people who come by (House)boat. After that we tried to find the food curt. As we found it, it was unfortunately closed. Some people of our village registered their DECT phone at event phone. There was not much built up at day zero. Just some big projects built up there stuff but most of the people where normal campers. We visit also the so called "Food Hacking Base" were a bunch of people do all things with food. There are also workshops like a cheese and a whisky tasting, molekular kitchen and so on. And we all donated a bit of money to get three meals a day (breakfast, lunch and dinner) on every day.
Fun Fact of the day The Finish Embassy have their own sauna.
Day One
Opening Talk
This was just the opening talk for the awesome SHA2017 Camp. Stitch, the main organizator of this event told in this Talk who it was rganizing the camp and what has gone wrnge at the very first beginning for example with the batch production. But in the end all has gone good and he celebrated with us the opening of this camp.
Recording: sha2017_opening
Crypto Wars 2.0: Lessons learned from the past, for the present
Phil Zimmerman, founder of PGP, held a very political keynote at the beginning. In his talk he speaks about the willing from different politics to backdoor or harm cryptography for instigation purposes. This was in the history done on many other technologies. For example in the time of Bonnie and Clyde, the police was not able to catch them up because after every robbery the drove away fast. As consequences the politics wanted to shorten the tanks of the car so that the police is able to catch them up while they were going out of gas. The main statement of his talk is: backdoors for the good guy are backdoors for the bad guys.
It was really an honor to se the man live on stage who brought the people PGP, strong Crypto for the masses.
Recording: cryptowars_2_0_lessons_from_the_past_for_the_present
Attacking OpenSSL using Sidechannel Attacks
Not seen live but later in the recording because of the parallel keynote from Phil Zimmermann. But it was very interesting how to get on Information on Side channels. An embedded device or a computer has some interfaces like Keyboard, Monitor, Speaker etc. that are intended. But there are also some unintended interfaces. They are there and you can't do anything to hide or manipulate them. For example: Time, power consumption electro magnetic radiation etc. On a short example they demonstrated a 4 digit brute force attack on how they exploit the side channel of power / EM. On a given 4 digit pin they monitored the normal power behavior. Then they started with figure one to brute force the pin. on one number (8) they saw that the pattern of the verification was shifted a little bit to the right. This means more power was used due to a abnormal behavior. Same with the second digit. when the correct number was entered the pattern for verification moved again a bit to the right, and so on. For a four digit pin this can be done in short amount of time. But on a 2048bit RSA secret key this would take years. In the further talk the presenters explained how to solve this by math and improve the efficiency. Unfortunately this is not my grade of math :-)
Famous C&C servers from inside to outside
Batch soldering
In a soldering session in our village we soldered the SMA LEDs and the vibrating motor to our Batch. For me SMA soldering was a new experience. We got different tips how to do this best. For me the best methods is to give a bit solder on the soldering pads, attach the SMA LED with a tweezers and heat the solder on the pads again. Another tip was to only to give solder to one pad heat it again an push the SMA LED with your finger to the pad. So the SMA LED is fixed and play to the circuit board. Then just add solder to the other three pads.
Fun Fact of the day A driving sofa was at the camp site. Under the sofa was chassis mounted which is controlled by a RC remote. Later one there were more driving things like a Kartent (Kartents were tents made of carton).
Day Two
TOR de-anonymization techniques
An academic view on incident response
Modern digital forensic analysis
Cidre Tasting
At the food hacking base there was a ciders tasting. Our complete village took part there. Different ciders were presented from low cost supermarket ciders to really high cost ciders from the Normandy. For me cider is not my taste. It doesn't matter which one I tasted. The best drink during the tasting was an apple juice from the Normandy :-).
Day Three
Data Exploitation
A look at TR-06 FAIL and other CPE Configuration Management Disasters
Secure Communications hardware
Cheese Tasting
In the evening there was another tasting like yesterday. This time cheese. Different sorts were presented from mild to strong. Highlight was a truffle cheese from the Normandy. It was really delicious. But there were other sorts from Germany, the Netherlands (old Amsterdam, old Rotterdam...) and the Normandy (Camembert and Brie). This tasting was really good to get an overview of different cheese sorts.
Fun Fact of the Day
Late at night some people noted a notice on their badge that said: Your Badge is locked! Please go to ### to unlock it.
Unfortunately on the given location nobody was there to unlock it. A member of our village was infected, too by this malware and he only flashed his badge to the current firmware and all was fixed again...
Day Four
Blockchains for a Better World
MISP threat sharing platform
It was a very interesting talk about the MISP tool. It is a free an open source threat information sharing platform with tons of different features for sharing information and collaboration. You can input for example IOCs from an email in raw format and MISP filters out all relevant information. The collaboration factor helps by eliminating false positives because other people can have look over provided information so they can correct for example typos of an IP-address. MISP is a community driven Project initiated an supported by CIRCL (Computer Incident Response Center Luxembourg). A tool which is really a look worth for us.
Recording: misp_threat_sharing_platform
Regulating Law Enforcement use of Trojans
Computer crime and criminal law 101
Physical Penetration Testing
Windows forensics
Fun Fact of the Day
On the camp ground there was a little lake with an island. With an inflateable boat we went to the island. As we just arrived there was an octacopter drone flying over the lake. It seems someone was trolling the people that were swimming in the lake with it. Suddenly the drone motors turned off a few centimeters above the water level the motors turned on again on high power. But, too late :-) It crashed into the water.
Day Five
Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
FaceDancer 2.0
Infrastructure review
Lockpicking and IT Security
SHA2017 Closing Event
Fun Fact of the Day
No Fun Fact due to tear down and bad weather :-)
Day Six
Since it rained yesterday all the day we waited for the sunny weather to get our tents dry. We carried our luggage back to the cars and later at about 14:00 o'clock we left the camp ground. It was an awesome event and I am really thankful to be part of it. I will definitely be at CCCamp in 2019 in Germany, too. It was a great chance to talk to awesome people who had different knowledge. Quiet good for networking. Chaos Communication Congress is quiet good but camps can top this atmosphere... It is hard to describe it if you was not there.