And now I’ll show you a video that explains why I hate Bluetooth headsets. In the video, the girl is talking to a guy.
D: what are you doing tonight? P: nothing! D: do you want to go to the party with me? P: Yes, I want to! D: and before that we can come to me ... P: Sounds amazing! D: wait! (answers the phone) ')
How many times have you had in your life when a phone call is heard at the most inappropriate moment? That's why I don't hate these things.
So let's start a new section. I try to stay serious, although I called him "Taking Bob's Wife." After a good look at Bob's phone, we are making a discovery: there must be something inaccessible through a wireless connection on the phone, I think you will agree with that. These are special SMS messages with a header of 5 or 6 digits, after studying which, you come to the conclusion that they are addressed to Bob’s wife.
Now we know the code, we know his wife's phone number ... who the hell thought that would be a good idea?
The inscription on the slide: "Toy." The inscription on the photo: "Just imagine ... a secret mischief that can be shared ... tease me, please excite, control ...".
And here is the “toy” itself - a Bluetooth-vibrator! I warned that I was trying to stay serious. So, this is a vibrator that responds to special SMS messages when paired with a compatible phone. Each letter in the text causes a certain vibrator reaction, any character that you enter from the phone gives the vibrator a different movement. You can force the vibrator to perform hundreds of different movements in response to the characters you enter. This piece is produced by thetoy.co.uk.
But discarding the insinuations like “Penetration test”, “Hacking a device without a trojan”, “Reach out and touch”, “Do you hear me now?” Or “I can’t wait until the site has a poll on this topic” to the side and try to be serious.
If you don’t even consider the teledildonics (technology of sex at a distance) to be a relevant area of research and start googling to find examples of such devices, I note that all of them also need security, but no one has reviewed the security of such devices. So attention, this is a new area of research (laughter in the audience)!
In any case, this bluetooth vibrator is a really bad idea of using wireless technology for completely stupid things. But there are serious consequences.
Would rape be considered if someone else sent these messages instead of Bob? “Dear, thank you for sending me this message 7-30! “But I did not send you any message!” This may cause a trial in the near future, and if this happens, it will cause many questions to anyone.
Another question: can non-printing characters lead to potentially dangerous actions of this device? Well, for example, it starts behaving incorrectly or gets stuck ... It sounds ridiculous, but it is quite serious, because theoretically you can hurt someone with such a vibrator. “To hurt someone with an SMS” sounds awful enough.
I will answer the question - I do not have such a device, my wife helps me with a lot of different projects, but does not want to participate in such research. But if someone doesn't mind 300 bucks, he can buy this thing, bring it to DefCon next year, put it on the table and give people the opportunity to do something with it. Present the announcement of the presentation: “Next weekend you will be shown a bluetooth vibrator hacking!”
Consider how to prevent the threat of using Bluetooth:
turn off the bluetooth itself or at least the automatic search mode of the device to connect. It saves a great battery, because my phone works without recharging for 8 hours, and if you turn off the bluetooth, it will work for several days;
change the default pin code. Some models of headsets can be connected to a computer via USB and with the help of a small program change the pin code;
if possible, limit the number of simultaneously connected devices Use the hints to determine the name of the device with which you are connecting.
If your phone asks for permission to pair with some device, do not automatically agree, but check every request;
Turn off the headset if you are not using it. So you will get rid of this stupid blue light that hurts the eyes;
Consider ensuring the safety of your devices and assess the consequences of using bluetooth, remember a hacker who is bored and who wants to hack you.
Now let's talk about the keys of Bob. He has a pass card to enter the office. She is tied to his badge - ID. He wears it without removing it all the time. You’ve seen Johnny Long’s low-tech hacking presentation, this is a really good story about hacking without the use of technology. He talked about how easy it is to take photographs of the identity cards of people who hang out on their laces, and then he makes his own card with his photo.
The new access cards are encrypted, but most of the passes used are not encrypted. The device asks for the number, you provide it, and the system lets you inside. There is a special program cq.cx for cloning proxy cards, and you can make your own map for further use for your own purposes. Jonathan developed this wonderful device, version 1 is shown on the slide, but, in my opinion, there is a 3rd version.
You simply press a button on the map, it reads the code, press another button, and it gives the read information. So I just go up to the general manager or another person who has access to the whole building, for example, to the cleaner, and say: “hey, how are you? You really do a great job with your work! ”And shake hands with him. During this time, you are copying his card, and now the CEO must explain why he was looking at research and development data and confidential files at 3 am, because all audit logs will point to his own electronic key, which is still in his pocket. .
Traditional mechanical keys are also vulnerable. If you wear them in a bundle on a belt, they hang out there and ring, then they can also be photographed. Then you can examine all the grooves and grooves, and then purchase an exact duplicate of such a key through the Diebold online store. Even on this small photo you can see all the details of the key. It is a common practice when an office orders all equipment, cabinets, drawers, mini-bars from the same manufacturer, and the same keys are used everywhere.
In this small video, you see how the key that one guy took during an equipment audit at a university perfectly opens the lock on his home mini-bar. The next day, he returned with another key, click - and everything is ready, the lock opened. Such is democracy!
Consider Bob's passport. RFID tags in the passports of the new sample can be read very easily. How many of you have such a new passport with this little shiny label on the cover? A few people, alright. Encryption of these tags is not too serious.
Each country has its own rules for controlling such passports, but it usually happens that you come to the border guard, he takes your passport through a device that reads the string under your photo. This provides the information they need to generate a key that allows you to unlock and download the content of the RFID tag. It contains quite a lot of information, for example, your date of birth. There is a fairly limited place to place the key, especially if you know your goal, that is, where the date of birth is located approximately and the sequence of other data in this line. So you can try to guess the key, knowing where it is located approximately.
Not only in the United States, but also in other countries, people are able to crack these tags literally with the help of an envelope that is mailed, simply based on data written outside the envelope, and information to Google.
In the United States, when an e-tagged passport was identified, people were asked to comment on this situation, and the result was interesting: about 2000 comments said that it was a bad idea, and only 2 people wrote that it was a good idea. The solution that was offered to calm these disappointed people was to use a thin layer of foil. They were going to literally build a protective “foil cap” for the passport, that is, place the foil inserts on the front and back of the cover to prevent unauthorized reading of the RFID tag until the passport is opened and presented for control.
This small video shows what happens with such a passport - you are trying to close it, but it springs up and opens again. This disclosure of about 1 inch is enough to read these tags - you can see the numbers appearing on the monitor screen. So a passport with foil liners is not able to protect itself from being read, especially if it is in a free pocket or a wide wallet. Here from the audience they suggest that you can use a condom for a passport - perhaps this is a good idea to protect it.
This vulnerability was most well demonstrated in the UK this Wednesday - they were able to clone a chip from an English passport, put it in another passport, and passed border control with this passport. And this passport was recognized as authentic. So it’s not difficult to replace a child's photo in a passport with a photograph of Bin Laden and it will work.
Such dangers have not arisen today, I have been talking about them for a couple of years, but people do not understand this. I believe that it is necessary to teach the rules of safety of sellers who travel abroad. Now one of the most common fears is that if you are an American and travel abroad and you have an American passport, they will steal it from you. If someone clones your passport and before you return to the country, then you and your present passport will be delayed when returning to your homeland and will certainly not believe that you have nothing to do with it, because someone has cloned your passport.
Bob has different responsibilities. He works at trade fairs and presents his products, because the success of his work directly depends on how profitable he is to demonstrate to the potential buyer the functionality of his widgets. He tells how neat, shiny and how much they can do.
But what happens if your widgets start executing unauthorized unencrypted commands?
You know, I was a little upset when I saw the icons with the image of the guns of TV-B-Gone here in Vegas. This video shows the performance of Gizmodo at the CES 2008 conference in January last year, and I do not advise trying to repeat this extreme example at home. The video shows how in the halls of the conference all monitors located on the walls, in the hall, at the reception are turned off, the image disappears on them and they go out. The following shows how monitors are remotely turned off, on which performances are shown and a presentation is made.
Last January, the MakeMagazine portal provided the guys at CES with a bunch of TV-B-Gone pistols that can remotely and seamlessly turn off any television receiver. We can only regret these guys from Motorola, whose performance was interrupted in a similar way. Such a gun can ruin any presentation by simply not allowing our Bob to demonstrate his product.
I do not admire people who are doing such things, because these unfortunate guys are sitting there, showing off their goods, trying to earn a living. So it's not at all cool to deprive them of work in this way. But the wall of screens - it looked cool! I mean, you don’t have to be a complete jerk when you demonstrate hacker devices just to get attention.
A couple of years ago at the Shmoocon conference, I found myself in an interesting position. They sold USB hubs, they had LEDs inside, and they lit when these hubs were connected to a computer.
The sellers had a whole bunch of such devices, they connected them to each other in the form of "daisies" and wanted to show how they all sparkle, so they needed to connect them to some kind of computer. There was a demo notebook on which the password stood. I will tell you that the hacker this time was in the right place, at the right time and with the right tool. I missed waiting for registration and just stood next to these guys. I fished a USB flash drive out of my pocket and told these guys: “Look what I have with me!”. They inserted it into a laptop, dragged it out, inserted it again — useless. I said that I do not remember all the passwords by heart, but I will try to do something.
I did not want to do this imperceptibly, I wanted to attract more attention. I decided, like a complete jerk, to publicly crack passwords, and I ran a script that scrolled through a projector that was standing next to the table and transmitting the image to the big screen behind us. Then I got up on a chair and made an announcement, they say, ladies and gentlemen, you are at a security conference, this means ensuring security not only for network ports, but also for USB ports, and went on to explain what I just did.
The most interesting was the fact that there was a woman who worked at one of the stands. It was a new job for her, and there was another guy with her who left for lunch at that time. It turns out that before the start of the action he explained to her all day that this was a hacker conference, there are a lot of hackers here, so you don’t need to connect anything that requires you to enter your password, be very careful with these guys, because it’s unknown who is watching and listening. Therefore, she behaved like a paranoid in relation to her laptop and did not do anything, except for checking e-mail, any actions requiring the transfer of a password. As it turned out, I was showing my “work” on this particular guy’s laptop. When he returned from dinner, this woman began to convince him that she did not reveal any passwords, and I had to prove that I did it myself. By the way, they had one interesting custom in the office - if someone did something stupid, then he had to wear a big cowboy hat on his head all day.
So, we proved that Bob was completely "fucked":
took possession of his laptop;
took possession of his data;
took possession of his cell phone;
took possession of his wife!
took possession of his keys;
seized his presentation materials;
seized his ability to work.
Do you have any suggestions? I know that now Blackberry is becoming more and more popular - a platform for mobile devices with enhanced security. Its developers have done a solid job of maintaining the relative security of Bluetooth device connections on their own network.
How many of you have seen people turn into heaps of seething mucus on the floor trying to access email through their Blackberry devices during large outages or similar failures of this network? Unfortunately, people are becoming increasingly dependent on technology.
I wonder what you are doing to teach your staff and responsible people mobile security rules, what are you doing to teach them to keep their devices safe? What are you doing to help them learn to help themselves?
It may be worth considering the use of wireless microphones for presentations or broadband jammers that can suppress unwanted digital communications and control signals - GSM, Wi-Fi and Bluetooth. It is possible that such devices will provide some confidentiality of communication.
As I have already said, people use wireless communication where it cannot be used, for example, in medical equipment, and this is scary.
If you still have any questions, please email me at render@renderlab.net. Thank you so much Robert T Firefly from New York for the illustrations of Bob. I suggest you also buy WPA cracking kits, 9 DVDs, they cost 50 bucks each. So I can recoup my expenses for a trip here, and besides, I don’t want to drag them back home.