User:M3m0r3x

From SHA2017 Wiki
Revision as of 09:57, 12 August 2017 by M3m0r3x (talk | contribs) (Day Three)

Jump to: navigation, search
m3m0r3x Verfied.png
User-M3m0r3x.jpg
Generated SHA Flag with Name (experiment here)
Arrival 2017/08/03 00:00
Departure 2017/08/09 10:00
BuildupVehicle Car, Transporter
Bringing Arduinos, Raspies, LTE-Router, Switch, Powercoard, some soldering stuff, Hacking Gadgets, UpriBox, FruityWiFiPi
Village Village:1838, Village:Foodhackingbase
Working on
Contributions
Contact
Twitter @_m3m0r3x_




Orga

Things I want to visit

Talks (Live or Recording)

Friday

SHA2017 Opening
Cryptowars 2.0: Lessons from the past, for the present
Attacking OpenSSL using Side-channel Attacks
Computer crime and criminal law 101
Famous C&C servers from inside to outside
Blockchain beyond the buzz and hype
icibici workshop: a brain-computer interface for your phone/tablet/etc

Saturday

Android Application Pentesting 101
Tor de-anonymization techniques
An academic's view to incident response<--
Smart Home Security with Tor
Network concepts introduction & wireshark workshop
Modern Digital Forensics analysis, where to find evidence

Sunday

Data Exploitation
TLS Pool: Security orthogonal to Applications
A look at TR-06FAIL and other CPE Configuration Management Disasters<--
Anonymous, secure and easy. You can have them all
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Making bombs
Secure communications hardware

Monday

Blockchains for a Better World
Physical Penetration Testing
Windows forensics
FaceDancer 2.0

Tuesday

Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
Exploiting Twitter with Tinfoleak for investigative purposes
Infrastructure review
SHA2017 Closing
SHA2017 Closing Simulcast

Self organized sessions

Flamethrowers_101
The_One_Ring_Workshop
Open_Molecular_Cooking_Night
Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_&_interactive)
FPGAs_for_Newbies
LearnToSolder
Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools
Secure_communications_hardware
Modern_Digital_Forensics_analysis,_where_to_find_evidences
Windows_forensics

Projects

KillerBee
RaZberry

Camp Notes

Things done on Camp

Day Zero

SHA2017.jpg

We arrived at Zeewolde at approximate 01:00 pm. Of course first we build up our village "1838". The rest of the day we were carrying our luggage and equipment from the parking lot to the camp at the Turing field. Then of course we built up the infrastructure to our tents (power and LAN from the Datenklo). I was setting up an accespoint for our village wich is based on an raspberry-pi wich connects all the traffic by tor and separates us from the Camp LAN. It is not that we don't trust the SHA2017 people but...

Parts of luggage.jpg
Powerup.jpg

After work was done we drank some beer and walked over the camp ground to check out different locations. We of course visited the SHA-Habour wich was build up just for this event for people who come by (House)boat. After that we tried to find the food curt. As we found it, it was unfortunately closed. Some people of our village registered their DECT phone at event phone. There was not much built up at day zero. Just some big projects built up there stuff but most of the people where normal campers. We visit also the so called "Food Hacking Base" were a bunch of people do all things with food. There are also workshops like a cheese and a whisky tasting, molekular kitchen and so on. And we all donated a bit of money to get three meals a day (breakfast, lunch and dinner) on every day.

Fun Fact of the day The Finish Embassy have their own sauna.

Finish sauna.jpg

Day One

Opening Talk
This was just the opening talk for the awesome SHA2017 Camp. Stitch, the main organizator of this event told in this Talk who it was rganizing the camp and what has gone wrnge at the very first beginning for example with the batch production. But in the end all has gone good and he celebrated with us the opening of this camp.
Recording: sha2017_opening

Crypto Wars 2.0: Lessons learned from the past, for the present
Phil Zimmerman, founder of PGP, held a very political keynote at the beginning. In his talk he speaks about the willing from different politics to backdoor or harm cryptography for instigation purposes. This was in the history done on many other technologies. For example in the time of Bonnie and Clyde, the police was not able to catch them up because after every robbery the drove away fast. As consequences the politics wanted to shorten the tanks of the car so that the police is able to catch them up while they were going out of gas. The main statement of his talk is: backdoors for the good guy are backdoors for the bad guys.
It was really an honor to se the man live on stage who brought the people PGP, strong Crypto for the masses.
Recording: cryptowars_2_0_lessons_from_the_past_for_the_present

Attacking OpenSSL using Sidechannel Attacks
Not seen live but later in the recording because of the parallel keynote from Phil Zimmermann. But it was very interesting how to get on Information on Side channels. An embedded device or a computer has some interfaces like Keyboard, Monitor, Speaker etc. that are intended. But there are also some unintended interfaces. They are there and you can't do anything to hide or manipulate them. For example: Time, power consumption electro magnetic radiation etc. On a short example they demonstrated a 4 digit brute force attack on how they exploit the side channel of power / EM. On a given 4 digit pin they monitored the normal power behavior. Then they started with figure one to brute force the pin. on one number (8) they saw that the pattern of the verification was shifted a little bit to the right. This means more power was used due to a abnormal behavior. Same with the second digit. when the correct number was entered the pattern for verification moved again a bit to the right, and so on. For a four digit pin this can be done in short amount of time. But on a 2048bit RSA secret key this would take years. In the further talk the presenters explained how to solve this by math and improve the efficiency. Unfortunately this is not my grade of math :-). After that they showed some lab setups how they analyze those side channels for example by the use of an oscilloscope.
Recording: attacking_openssl_using_side-channel_attacks

Famous C&C servers from inside to outside
The speaker gave a in depth look in botnet architectures. He describes who he brokes in the cryptolocker botnet and shows how a Man in the browser Attack works.He speaks about the NAS Botnet which infected QNAP devices, hack them, infected them, armed them and patched them. He gives an overview of the Kins Botnet which has a better E-Banking web application as his bank. :-). He discloses in the End the PoC of the "Vodafone NL Dray Tek Vigor2132FVn Hack" which was already fixed by VF-NL.


Recording: famous_c_c_servers_from_inside_to_outside#video&t=428
PDF-File: Research_Articles_.pdf
Batch soldering
In a soldering session in our village we soldered the SMA LEDs and the vibrating motor to our Batch. For me SMA soldering was a new experience. We got different tips how to do this best. For me the best methods is to give a bit solder on the soldering pads, attach the SMA LED with a tweezers and heat the solder on the pads again. Another tip was to only to give solder to one pad heat it again an push the SMA LED with your finger to the pad. So the SMA LED is fixed and play to the circuit board. Then just add solder to the other three pads.

Fun Fact of the day A driving sofa was at the camp site. Under the sofa was chassis mounted which is controlled by a RC remote. Later one there were more driving things like a Kartent (Kartents were tents made of carton).

Day Two

TOR de-anonymization techniques
An academic view on incident response
Modern digital forensic analysis
Cidre Tasting
At the food hacking base there was a ciders tasting. Our complete village took part there. Different ciders were presented from low cost supermarket ciders to really high cost ciders from the Normandy. For me cider is not my taste. It doesn't matter which one I tasted. The best drink during the tasting was an apple juice from the Normandy :-).

Day Three

Data Exploitation
This talk is manly about data privacy. The speakers are from Privacy International. For introduction the speakers make aware of different privacy failes were data of persons were leaked. They descibed the roomba case were Roomba is selling the maps their robots make while cleaning. Or different GSM Codes on Smartphones wich users not aware of. The main part of their Talk is about who they do reversing differnt types of connected thing (IoT) One examle is who they reversed cars (Jaguar/Landrover/BMW) by the CANbus, a protocol for connected cars. Their Aim is to have a look on the collected data by the cars. Another Topic was healthcare products (Drug pumps, defibrillators, pacemakers....). Even data from those devices whil givven to third partyes. A special guest speaker from camaeo with an implanted pacemaker told about her Projekt "Pacemaker Hacking". She was able to hook up to the device and was able to read out all collected data. She called it a project of her own critical infrastructure. She startet her project after she was in hospital because of a malfunction of her pacemaker. She was interested in the data output. She even asks if she can get that file. The doctor even copied it on her flash drive. After analyzing she noticed, it is a memory dump (of her heart). This guest speaker part of the talk was very scary to me.
Recording: data_exploitation
A look at TR-06 FAIL and other CPE Configuration Management Disasters
Secure Communications hardware
Cheese Tasting
In the evening there was another tasting like yesterday. This time cheese. Different sorts were presented from mild to strong. Highlight was a truffle cheese from the Normandy. It was really delicious. But there were other sorts from Germany, the Netherlands (old Amsterdam, old Rotterdam...) and the Normandy (Camembert and Brie). This tasting was really good to get an overview of different cheese sorts.
Fun Fact of the Day
Late at night some people noted a notice on their badge that said: Your Badge is locked! Please go to ### to unlock it. Unfortunately on the given location nobody was there to unlock it. A member of our village was infected, too by this malware and he only flashed his badge to the current firmware and all was fixed again...

Day Four

Blockchains for a Better World
MISP threat sharing platform
It was a very interesting talk about the MISP tool. It is a free an open source threat information sharing platform with tons of different features for sharing information and collaboration. You can input for example IOCs from an email in raw format and MISP filters out all relevant information. The collaboration factor helps by eliminating false positives because other people can have look over provided information so they can correct for example typos of an IP-address. MISP is a community driven Project initiated an supported by CIRCL (Computer Incident Response Center Luxembourg). A tool which is really a look worth for us.
Recording: misp_threat_sharing_platform
Regulating Law Enforcement use of Trojans
Computer crime and criminal law 101
Physical Penetration Testing
Windows forensics
Fun Fact of the Day
On the camp ground there was a little lake with an island. With an inflateable boat we went to the island. As we just arrived there was an octacopter drone flying over the lake. It seems someone was trolling the people that were swimming in the lake with it. Suddenly the drone motors turned off a few centimeters above the water level the motors turned on again on high power. But, too late :-) It crashed into the water.

Day Five

Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
FaceDancer 2.0
Infrastructure review
Lockpicking and IT Security
SHA2017 Closing Event
In this last talk the event was recapped and celebrated. It is a must see talk on every conference to say bye!
Recording: SHA2017-252-sha2017_closing
Fun Fact of the Day
No Fun Fact due to tear down and bad weather :-)

Day Six

Since it rained yesterday all the day we waited for the sunny weather to get our tents dry. We carried our luggage back to the cars and later at about 14:00 o'clock we left the camp ground. It was an awesome event and I am really thankful to be part of it. I will definitely be at CCCamp in 2019 in Germany, too. It was a great chance to talk to awesome people who had different knowledge. Quiet good for networking. Chaos Communication Congress is quiet good but camps can top this atmosphere... It is hard to describe it if you was not there.