Tuesday, 9 September 2014

Looking for devices for real pentest


Once a couple years ago was an article in a magazine  wiyh the name  "suitcase of a hacker", in which we reviewed the devices for everyday life situations - hacking the Wi-Fi, intercepting of keystrokes and so on. But  time was passing, technology did not stand at the same point, new challenges and new devices appeared. On it today we will pat an attention.

Pwn Pad
1095 $ (bit.ly/1g3J0xa)

Pwniepad
Electronic devices  penetrate deeper into our lives. Recently, personal computer was only in elected people. Some time had passed and this electric helpers appeared almost in each house. Then begun a time of mobile devices. After the appearance of Apple iPad, people went crazy about  tablets.  Now it is a difficult to find a person , who had no smartphone or tablet.  Pace of life keeps growing and growing, and it is needed to fit it , to be in touch , promptly respond on messages to be ready to join the job at any time. All the same requirements apply to pentest / ​​hackers - a laptop you will not take everywhere with yourself, but the tablet is almost always in your hand. So why not to  turn it into a full-fledged tool for pentest? And such decision is coming. Look at -   Pwn Pad from people from PwnieExpress. The device is equipped with a powerful quad-core processor (Qualcomm Snapdragon S4 Pro, 1,5 GHz), 7-inch screen 1900 × 1200 and a powerful battery that provides up to nine hours of active work (3950 mAh), 2 GB of RAM and 32 GB of internal memory. There are three adapters: two powerful external antennas for pentest 802.11b / g / n wireless networking and Bluetooth, also USB adapter - Ethernet, that allows you to check the strength of the wired network. But the main is  a software component: Metasploit, SET, Kismet, Aircrack-NG, SSLstrip, Ettercap-NG, Bluelog, Wifite, Reaver, MDK3, FreeRADIUS-WPE, Evil AP, Strings Watch, Full-Packet Capture, Bluetooth Scan and SSL Strip. What else do you need for happiness? So let ‘s ordinary people dream about iPad, and at present the hacker must be exactly with such tablet.

CreepyDOL


CreepyDOL
I thin all people remember a story when Google was accused of gathering information of  Wi-Fi-points by car Google Street View. The collected information could be used for many purposes, including the geolocation of users, which caused numerous holivary in  the web. How it was, but now you have the opportunity to build your own geolocation service through the development called CreepyDOL (Creepy Distributed Object Locator), which was presented at the last conference last year by  Black Hat. What is it? This is a special software and device based on the Raspberry Pi, they can be used to create a network that will intercept the Wi-Fi-traffic and collect sensitive information about users - in fact, in practice, any modern smartphone sends a large amount of information about the owner openly . And the most important - using CreepyDOL can position the device owner. All information is processed on a central server, where you can monitor in real time the movement of the user and his captured data.


Positioning of the individual with the help of CreepyDOL

And from the surveillance will not help usage of VPN, since, for example, on iOS devices, you can connect to the VPN, you must connect to Wi-Fi, and during this time apple phone already manages somewhere to climb. Thus,  considering the small size of the devices (it can be easy to hide), low price (about $ 60) you can afford to build a network to track users and it can now do not only government agencies. To create a network of ten devices you need only $ 600.

DEMYO POWER STRIP
750 $ (bit.ly/PpUpCw)


DEMYO POWER STRIP
Another device that it will be useful to have in the arsenal - it Demyo Power Strip. But it is not budget, it costs 750 dollars. But on the other hand, his colleague in the shop and the main competitor Power Pwn costs $ 1,495. As you already have guessed, Demyo Power Strip is designed to test the strength of Ethernet-, Wi-Fi- and Bluetooth-networks. It is built on the popular Raspberry Pi single-board computer and is equipped with ARM-processor 700 MHz, which can be overclocked to 1 GHz. Also on board there are 512MB of RAM, SD-card to 32 GB, and, of course, Ethernet-, Bluetooth-, Wi-Fi-adapters. As used Debian Linux OS with a set of pre-defined security-TOOLS: Nmap, OpenVPN, w3af, aircrack-ng, btscanner, ophcrack, John the Ripper, and others. Missing tools you can always bring your own. For example, to get Metasploit Framework you can use the following commands:
wget http://downloads.metasploit.com/data/releases/framework-latest.tar.bz2
tar -xvvf framework-latest.tar.bz2
apt-get update
apt-get dist-upgrade (can take a bit)
apt-get install postgresql-9.1 postgresql-client-9.1 postgresql-contrib-9.1     postgresql-doc-9.1 postgresql-server-dev-9.1
gem install pg


Dimensions of this device are 5,56 × 5,72 × 20,96 sm, so it is quite possible to always carry with you.

Glitch
(bit.ly/1fAsydr)

There is no ack of hacker HID-device in the network. We have once examined in detail the Teensy, talked briefly about the USB Rubber Ducky (so if you have not heard about the data Soup, I highly recommend you to learn the material). But that's not all. If you dig, you can find a sufficiently similar in functionality projects, which, however, will require the user manual polishing to fit your needs. Glitch is an  another interpretation of this idea that is based on Arduino. According to the author, who, incidentally, collects for its project money on Kickstarter'e, his creation is designed to simplify the work of a pentest  without requiring that delve into the device and write firmware for it. That is all well and works out of the box. Glitch can emulate keyboard and when it is connected to a computer it quickly types text (which can be used for quick configuration of Windows / Linux, and for the execution of some peyloadov). However, the same can do and Teensy c Rubber Ducky. The advantage of this device that it is able logging - that is, it can be connected to the USB-keyboard and it will record all the keystrokes on a microSD-card. Also, due to the small size Glitch can hide inside other electronics, such as inside the mouse. Find a third-party device will be extremely difficult. Underestimate the usefulness of this device is not possible, so I recommend you get to know it better. I can say with absolute certainty that once a situation arises in which it will be very useful.

PlugBot

Unfortunately, not all devices, created for pentest were created to went out and to be producted. For example, such situation had happened with a device PlugBot, whose author was  not able to dial in the desired amount Kickstarter'e. PlugBot based on a mini-computer and Marvell is intended to carry out a physical pentest. The idea is as old as the world - if access to the studied network is securely closed by a firewall, take this device, secretly set it on the object under study (and its size allows it to do so) and immediately get into the internal network, by passing any firewalls.

BeagleBone + BeagleBoard + The Deck
(bit.ly/NXIef7)

BeagleBoard-xM $ 125
About the Raspberry Pi device  has been discussed many times, the usage of this tiny device just a bunch, in the field of penetration testing. But it also has an alternatives. One of them - a single board computers, developed jointly by Texas Instruments and Digi-Key: BeagleBoard and BeagleBone.  However, to be absolutely precise, the latest versions of these cards are already the names of BeagleBoard-xM and BeagleBone Black respectively. Both devices are equipped with ARM-based processors clocked at 1 GHz and 512 MB ​​of RAM. BeagleBone can be called a younger sister, as it is smaller, cheaper and not so rich in stuffing. It has in its arsenal just one USB-, HDMI- and Ethernet-port. The older model is equipped with already four USB-ports, boasts of having outputs DVI-D and S-Video. However, in the latter there is no ROM, so to store the operating system and other Stafa have to use an external micro SD-card.

BeagleBone Black $ 45
But for pentest this devices have no value - just a set of transistors, resistors and other elements. What is making from baseboard excellent instrument for penetration?  That's right - it's the software.  And here I would like to pay  attention  on  very interesting development called The Deck - operating system based on Ubuntu, capable of operating on the specified single-board computers. If you try to describe it briefly, we will say this - it's all what you would like to have from Kali Linux (BackTrack), ported on ARM-platform.
Do not be in a hurry and  buy hacker Soup - in the presence of direct hands and head on his shoulders analogues for some of them are quite capable to build yourself. For example, you can save a lot of independently collected analogue MiniPwner, which, incidentally, is 99 dollars, which is too much. To do this, you will need to purchase a router TP-Link TL-WR703N (or TP-Link TL-MR3020), which will cost just $ 20-25, plus a USB flash drive to it (better to take some miniature, such as Cruzer Fit), as well as charging by phone on 5 with microUSB-connector. All together in the end  it will cost about $ 50 that will be a two-time savings compared to the original (which, incidentally, is based on the same router). Once all the electronics come from China (or wherever you booked there), you will need to download the installation package MiniPwner. After that, you need to merge with the web OpenWrt-firmware for the router, for example here, and install on your computer utility netcat, to carry out further manipulation with the router. In addition, it will be necessary to prepare a USB flash drive, breaking it into two sections (the first - swap-partition, the second - ext4), and insert it into the router. After OpenWrt download, reflash the device. I do not need to explain how it's done - all is rather corny, I will connect via the web interface (the address of the router in a standard - 192.168.1.1), enter the username / password admin / admin, and from the menu choose your firmware. In general, as usual. The next point we will need to transfer the downloaded package MiniPwner on the router. To do this on the computer go to the folder where it lies, and execute the following command:
nc -l -p 3333 <minipwner.tar
Then using Telnet connect to the router and perform:
cd /usr/share
nc 192.168.1.111 3333 > minipwner.tar

where 192.168.1.111 –is an address of the computer. Well, then unzip the downloaded file and follow the instructions for setting up of this manual (from step 19). Perform a sequence of the remaining 14 items, you will receive a full MiniPwner all at half price. Profit!

HackRF & bladeRF
~ 300 $ (bit.ly/1gtRJxg) & (kck.st/1gqXiba)

HackRF
A lot of interesting things in recent years can be found on kickstarter.com. This applies to different electronic / hacking devices. In particular, a universal transmitter (SDR) is able to read and transmit a signal over a sufficiently wide frequency range. The range includes almost all the frequencies that are used by mankind for data transmission, whether 3G, Wi-Fi, FM, GPS, police radio, remote control key from the machine or RFID-tag - unimportant.
To recent time , the only available SDR-platforms with a wide range of companies was USRP Ettus, which costs about  thousand dollars (based on it was even built project OpenBTS). But as time had  passed, appeared new solutions, primarily focused on the amateur radio enthusiasts and hackers. Two of the most notable of them are presented on Kickstarter.
The first, developed by legendar hacker Michael Haussmann, bears the name of HackRF. The device supports a frequency range of 30 MHz - 6 GHz sampling rate up to 20 MHz and works in Half-duplex'nom mode. Sample size is 8 bits, and to connect to the computer using the interface USB 2.0. This device is fully open - from circuit design to firmware and management software, all of this is in the official repositories. Therefore, it is able to collect by yourself. But as the project gained an amount seven times the statement, in the near future there will be the emergence of serial samples.
The second successful project - bladeRF.

BladeRF
He is the brainchild of a California team Nuand. Support the frequency range of 300 MHz - 3.8 GHz sampling rate up to 28 MHz and Full-duplex mode. The size of the sample is 16 bits, and the USB interface is already 3.0. Both projects provide a minimum set of software for working with devices, as well as support for their software layer gr-osmosdr, so you can use it in conjunction with iron monstrous that  combine signal processing GNURadio. So now the hacker movement have the tools to look into the most remote, previously available only to specialized devices corners of radio.
Telephone - gun pentest
In general, if you do not want to solve some specific problems, the complete tool of pentest can turn an ordinary phone based on Android. Fortunately, the relevant applications for this OS is enough.
1. dSploit - a set of utilities for the pentest  with your smartphone. It consists of: a utility for port scanning, vulnerability scanner, the application for the selection of a login / password tool for MITM-attacks and much more. In order to use the whole set, you must first install the compromised device and it BusyBox.
2. Network Spoofer - utility for spoofing websites on wireless networks.
3. Network Discovery - utility that allows you to find all the devices and networks that are connected to your Wi-Fi-point
4. Shark for Root - network sniffer, works perfectly with 3G- and Wi-Fi-networks. The resulting dump can then be analyzed in the Shark Reader or Wireshark.
5. Penetrate Pro - pretty nice app to decrypt the Wi-Fi-traffic, which is able to calculate the WEP / WPA-keys for some models of routers: Discus, Thomson, Infinitum, BBox, Orange, DMax, SpeedTouch, DLink, BigPond, O2Wireless and Eircom (the original version of the utility was sawn from Goole Play, therefore, downloaded from the installation package, be sure to check it before installing).
6. DroidSheep - a tool to hijack sessions, with which you can quickly gain access to other accounts Facebook, Twitter, LinkedIn and Gmail.
7. WPScan - Vulnerability Scanner for popular engine WordPress.
8. FaceNiff - another tool to intercept web sessions.
9. WebSecurify - cool web vulnerability scanner available for all desktop and mobile platforms.
And this is not an exhaustive list, so as you can see, for the initial exploration and enough conventional smartphone.

F-BOMB
250 $ (bit.ly/1fUSwIR)

F-BOMB
Sufficiently curious development, presented to the world at the conference Shmoocon'12 by the researcher named Brendan O'Connor. The name of this device represents a reduction of Falling / Ballistically-launched Object that Makes Backdoors. It was founded by a mini-computer equipped with PogoPlug and several small antennas, 8 GB of flash memory and the body, printed on the 3D-printer. The aim was to create a cheap Brendan spy device that could be discreetly mounted on the object under study (in the ventilation shaft under the ceiling), and it would collect the information and sends it back through the available Wi-Fi-network. And at the same time that it was peaty  to leave or to lose - in fact, if you set the device costs several dollars, it will have to take. And if it is discovered, there is a chance not to get it back. In this regard, with the F-BOMB is much easier -  PogoPlug worth $ 25 on Amazon, further equipment used in the prior art, there were Brendan back in a few tens of dollars. Total first prototype cost somewhere $ 50. Now F-BOMB is available for purchase from the online store Brendan already for $ 250. The latest version of device is based on the Raspberry Pi, includes two Wi-Fi-adapter, USB-hub and SD-card to 8GB. At the rear of the unit is now located USB-connector, however, it is intended not to connect the device to the computer and to the power.
Considering the small size and light weight of  device, it can be placed on the drone (eg, controlled with iPhone Parrot 'AR.Drone, powering F-BOMB from its battery, and thus deliver the spy to the place of "special operations." It can also be easily hidden in a carbon monoxide detector, where it will operate undetected for months. And if invisibly connect the device to the power supply does not work, you can use normal AA batteries, which last for about a few hours of battery life.
I must say that you can use this device everywhere not just in hacking. For example, further equipping the device temperature and humidity sensors, can do your own his small laboratory.

OpenVizsla


OpenVizsla
Well, the last device on which I would like to pay  attention, - OpenVizsla. It is developed by a group of enthusiasts, cheap device for reading from USB-connector mobile data, which are then used in the procedures of engineering analysis and debugging. I just need to jailbreak techniques now in demand and removal of operator binding. The project has already collected on Kickstarter'e donations in the amount of 81 thousand dollars, so the creators are ready to begin large-scale production of inexpensive sniffer-products. If we consider that current hardware analyzers USB-data rather expensive toy (price starts at $ 1,400), OpenVizsla sure will be very popular among hackers and security researchers. After removal of USB-data stream at one time helped to break the spatial controller Microsoft Kinect, give Apple-Linux-support equipment, as well as to carry out jailbreak Sony PlayStation 3. am particularly pleased that the project is completely open - circuit device, but also the source code of the firmware and client software to work with the device can be downloaded from the official website of the project. Therefore, if you are friends with a soldering iron, you made OpenVizsla by yourself. Or wait for the device in the series.
Finally
Here ia an end of our small review. Unfortunately (or perhaps fortunately), the subject of hacking devices we can not fit in a single article, we are only able slightly look at what's new had happened in this area in recent years. But the web is still full of manual about how to gather such a device by yourseelf. I hope that one day I will see great stuff on the subject, written by you. Good luck!

Source : xakep.ru




No comments:

Post a Comment