Hacker trainer for law enforcement agents
A former intrusion specialist is training a gathering of European law enforcement agents in how the bad guys work on the Internet. Contributing editor Markus Feilner stops in for a lesson in attack techniques.
November 2008. Freiburg is supposed to be Germany's "sunniest city," but today, on my way to a special forensics conference, the rain is constant. Tobi, an ex-hacker who is now a forensics expert and trainer, is training 20 representatives from a smattering of European law enforcement agencies (Figure 1). The sessions over the next few days will cover topics such as rootkits, CSS scripting attacks, and browser compromise. The participants will also learn how attackers use professional software to create, distribute, and administer botnets, trojans, and viruses.
Even showing up for this event invites some legal risk. German law forbids such training. Yet many agencies feel it is impossible to maintain IT security without an understanding of the tools used by professional intruders.
The whole problem is that the criminal world isn't too worried about statutes. A well-trained and highly organized community of intrusion specialists even distributes user-friendly software to aspiring beginners so that anyone can get in the game. One of the agents groans, "By now, any mouse-pusher or script kiddie can practice his art at breakneck speed."
Eager to learn, the students set themselves an intense schedule for the next three days. Soon, the participants have words like Metasploit, MPack, and DreamDownloader reverberating through their heads.
Tobi is visibly pleased with Linux Magazine's presence. The chemistry works; it takes no more than a minute before a greeting turns into a conversation about the advantages of the nVidia GeForce graphics card. However, it's not about games, it's about how the card's performance is especially suited for cracking passwords.
Companies from Russia and Eastern Europe, especially the older Soviet states, provide much of the sample hacker software Tobi is demonstrating in the course (Figure 2). For instance, ElcomSoft , which is headquartered in Moscow, makes a business of cracking passwords with the nVidia GeForce graphics card.
Admittedly, Tobi's first contact with law enforcement wasn't quite voluntary. When the Phatbot attacks were happening a few years ago, he was at the wrong place at the wrong time – that is, on the wrong server and under criminal police surveillance because he maintained contact with the malware originators. "Some of the guys behaved pretty badly, even bragging on the web! No wonder they were caught." Tobi survived the ordeal, but you can tell the experience left its marks.
Tobi's hacker name is Newroot, and he writes his e-mail address like graffiti. These days, he works for one of Germany's leading pen testing and security service firms. At work, he hacks the newest aerotechnology software, outwits the firmware for VoIP phones, and informs international forensics experts about the newest software tricks.
Tools of the Trade
According to Tobi, "It takes just a few simple things to make it hard for attackers, but most admins aren't even aware of them. Just mount the right partitions with nonsuid and nonexec, and your attacker has a bad hair day. Or set the append-only attribute on logfiles or in the Bash history. It's hard to wipe away your tracks, especially when a cron job is picking them up on another system."
It doesn't take long before he starts listing a score of "gray area" websites that admins need to be aware of: InvisibleThings , Matasano , the Fake Name Generator , and the Milw0rm exploit database. He uses sites like these regularly in his training to build rootkits or demonstrate the newest Internet Explorer bug. Even seasoned Microsoft fans are speechless when Tobi shows, inside of two minutes using Metasploit or BackTrack, how an attacker on the local net can take over a Windows machine and get a full root shell on the MS server. Windows has enough back doors, says Tobi, that an attacker who knows the right websites can really do some damage .
To understand the damage introduced by client-side bugs and buffer overflows in the browser, Tobi introduces BeEF, the Browser Exploitation Framework . BeEF is a professional tool designed to demonstrate the real-time effect of browser vulnerabilities. Tobi then directs the participants to the Open Web Application Security Project (OWASP)  .
The agents take in the demonstrations with amazing calm. "Oh yeah, what we're seeing here is just the tip of the iceberg," one officer shrugs. "The reporting rate from victims is so pathetically bad because no one wants to admit they've fallen into a trap or that an attacker compromised their supposedly secure enterprise net."
His colleagues on the Swiss team (Figure 3) take a more positive approach: "Totally correct. But everyone makes mistakes. Every attacker, no matter how skilled, leaves tracks. That's where we come in." Denying the attacker a shell with admin privileges might make an attack more difficult, but Tobi shows that this isn't enough to thwart a determined intruder. The attack can still continue with help from professional solutions like MPack and DreamDownloader. "Redirecting the browser to your page is wonderfully transparent in the background over the IFrame tag, and the Windows user won't have a clue …. The port is open, and we can install whatever program we want." Even automation is easy. With a remote administration tool like Poison Ivy , execute a few mouse clicks, package the newly created trojan with DreamDownloader, infiltrate the Windows system with MPack, and you've got yourself a botnet.
The training is almost over, and it's beginning to get dark in Freiburg; The rain won't subside. Why hasn't anyone hacked the weather?
- ElcomSoft: http://www.elcomsoft.com
- InvisibleThings: http://www.invisiblethings.org
- Matasano Security: http://www.matasano.com/log
- Fake Name Generator: http://www.fakenamegenerator.com
- E-learning CD for Web Security: http://www.badstore.net
- BeEF: http://www.bindshell.net/tools/beef
- OWASP: http://www.owasp.org
- OWASP Top Ten Project: http://www.owasp.org/index.php/OWASP_Top_Ten_Project
- Cross-site-scripting: http://en.wikipedia.org/wiki/Cross-Site_Scripting
- Poison Ivy: http://www.poisonivy-rat.com
Read full article as PDF:092-093_hackers.pdf (325.35 kB)
SuggestionThis was an excellent article thanks. I only wanted to suggest if the links included in the PDF article can be clickable in next posts, it saves having to copy and paste them.
Version 16 of the popular Linux desktop reveals new tools, edge-snapping, and performance improvements.
Symantec says Linux-Darlioz burrows in through PHP.
Dell renews its quest for the ultimate developer machine.
Innovative back door looks like normal SSH traffic.
One of CeBITs most successful forums opens the new year with a new name. The popular Open Source Forum continues in 2014 under the name Special Conference: Open Source. This year, the forum will be bigger and offer a wider range of possibilities for sponsors.
New release offers better graphics drivers and expands filesystem support.
New mail protocol will shut out the NSA and prevent snooping on metadata.
A new web application helps users visualize distributed denial-of-service attacks.
Ubuntu 13.10 takes a step toward convergence, with lots of mobility, but Mir only partly here.
Galileo board is targeted to embedded developers and educational institutions.