SlideShare a Scribd company logo
1 of 16
Attacking The Unknown
www.dts-solution.com
Mohamed Bedewi – Sr. Security Researcher and Penetration Testing Consultant
Network+ | CCNA | MCSE | Linux+ | RHCE | Security+ | CEH | ECSA | LPT | PWB | CWHH | OSCP
mohamed@dts-solution.com | https://ae.linkedin.com/in/mbedewi | https://twitter.com/mbedewi
DTS Solution
Attacking The Unknown
Escalation
Exploitation
Enumeration
Discovery
The Unknown is
such a general term!
The Unknown can
literally be anything
You can’t attack The
Unknown!
What The Unknown
really is?
What The Unknown Really is?
• The Unknown is an internet user who think he is fully anonymous or untraceable.
• The Unknown will use anonymity technologies which never promised full anonymity.
• The Unknown can be your neighbor, friend, boss or the person sitting next to you.
• The Unknown has his own reasons to become anonymous but not all reasons are good.
Technologies
Web Proxy
Proxy Chains
VPN
TOR
Anonymity Technologies - Web Proxy
Web Proxy is a computer that acts as an intermediary and privacy shield between a client
computer and the rest of the Internet. It accesses the Internet on the user's behalf,
protecting personal information by hiding the client computer's identifying information.
Privacy Implications:
• Web Proxy servers are poorly maintained.
• The internet is full of rouge Web Proxy servers.
• DNS leakage can reveal Web Proxy users’ identity.
• The data travels unencrypted in most use cases.
• Web Proxy is vulnerable to client-side attacks.
Web Proxy is now considered as an old and
deprecated technology since it’s far away from
being stable, secure, fast, practical nor flexible
while being a single point of failure from both
security and functionality perspectives.
Anonymity Technologies – Proxy Chains
Proxy Chains is a daemon which chains a list of proxy servers and route any TCP traffic
through them. The last proxy server in the chain accesses the Internet on the user's behalf,
protecting personal information by hiding the client computer's identifying information.
Privacy Implications:
• Proxy servers are poorly maintained.
• The internet is full of rouge Proxy servers.
• DNS leakage can reveal Proxy Chains users’ identity.
• The data travels unencrypted in most use cases.
• Proxy Chains is vulnerable to client-side attacks.
Proxy Chains is now considered as an old and
deprecated technology since it’s far away from
being stable, secure, fast, practical nor flexible
even with the fact it can route any TCP traffic
through a chained network of proxy servers.
Anonymity Technologies – VPN
VPN is an intermediate computer which tunnels and encrypts all network traffic initiated or
destined to a client computer. It accesses the Internet on the user's behalf, protecting
personal information by hiding the client computer's identifying information.
Privacy Implications:
• VPN activity logs can reveal VPN users’ identity.
• The internet is full of vulnerable VPN servers.
• DNS leakage can reveal VPN users’ identity.
• Service payment can reveal VPN users’ identity.
• VPN is vulnerable to client-side attacks.
VPN is now considered as the second favorite
choice when it comes to anonymity since it's
stable, semi-fast, practical and flexible with the
ability to handle and route any IP-based service
robustly through the encrypted magical tunnel.
Anonymity Technologies – TOR
TOR is based on a VPN distributed network which takes a random pathway through several
encrypted servers to an exit node which accesses the Internet on the user's behalf,
protecting personal information by hiding the client computer's identifying information.
Privacy Implications:
• TOR exit nodes are poorly maintained.
• Compromised nodes can reveal TOR users’ identity.
• DNS leakage can reveal TOR users’ identity.
• Correlation attacks can reveal TOR users’ identity.
• TOR is vulnerable to client-side attacks.
TOR is now considered as the favorite choice
when it comes to anonymity since it's free,
stable, semi-fast, practical and flexible with the
ability to handle and route any IP-based service
robustly and securely through a VPN network.
Anonymity Technologies Facts
• If the technology in question is free of charge then it’s poorly maintained and vulnerable.
• Anonymity technologies are vulnerable to client-side attacks which will reveal users identity.
• If the technology in question is paid then it’s most probably monitored even if told otherwise.
• Anonymity technologies are vulnerable to DNS information leakage if not specially configured.
• Intermediate mediums used by anonymity technologies can be sniffing traffic for any purpose.
Privacy is an Illusion
How to Exploit The Unknown?
Attack
Any successful exploitation starts with discovering the target in question then enumerating
the target for potential vulnerabilities then exploiting the discovered vulnerabilities then
finally escalading privileges and backdooring the target in question to ensure further access.
The target in questions is anonymous and to
take the previous approach further, we need
to deanonymize and identify the target first
otherwise exploitation won’t be possible.
The entire process of deanonymizing,
identifying, attacking and profiling (DIAP)
the target needs to be automated via a
smart light weight offensive module.
Deanonymization
Identification
Enumeration
Exploitation
Escalation
Persistence
Now Since We Know How it Should be Done
Let Me Introduce to You dynamicDetect
What is dynamicDetect?
Despite it’s friendly name, dynamicDetect is a very sophisticated offensive module which
can effectively and robustly deanonymize, identify, attack and profile (DIAP) malicious users
basically behind TOR, VPN and Proxies automatically and with zero human interaction.
dynamicDetect Technical Features:
• Capable of deanonymizing any anonymous user flawlessly and accurately on the fly.
• Capable of identifying the anonymous user’s IP address, country, city and coordinates.
• Capable of enumerating the anonymous user’s machine to spot every single weakness.
• Capable of exploiting every single weakness identified in the anonymous user’s machine.
• Capable of escalading privileges under any system despite deployed security controls.
• Capable of maintaining access and staying stealthy even in the most strict environments.
• Capable of profiling every and each anonymous user efficiently with detailed activity log.
The anonymous user never suspects the activity happening in the
background and it all happens in a maximum of 3.10 seconds!
How dynamicDetect Works?
Deanonymization
Identification
Enumeration
Exploitation
Escalation
Persistence
Excellent
Alice thinks that she's fully anonymous till she clicks on a rouge link and out of the sudden,
her machine isn't hers anymore after being fully deanonymized and got her identity exposed!
The best way to deliver a malicious payload is over an encrypted channel and we don’t
even have to worry about raising any suspicions because Alice is the one who initiated it
Payload successfully
delivered and Alice
doesn’t even know!
Talk is Cheap, Show us dynamicDetect
Thanks and Have a Good Day

More Related Content

What's hot

The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 

What's hot (20)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
IOT Security FUN-damental
IOT Security FUN-damentalIOT Security FUN-damental
IOT Security FUN-damental
 
IoT Security - Preparing for the Worst
IoT Security - Preparing for the WorstIoT Security - Preparing for the Worst
IoT Security - Preparing for the Worst
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 

Viewers also liked

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 

Viewers also liked (20)

Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
10 Google Analytics Features You Need to Know
10 Google Analytics Features You Need to Know10 Google Analytics Features You Need to Know
10 Google Analytics Features You Need to Know
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcing
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Logs & Visualizations at Twitter
Logs & Visualizations at TwitterLogs & Visualizations at Twitter
Logs & Visualizations at Twitter
 
Big data-analytics-trends-2016
Big data-analytics-trends-2016Big data-analytics-trends-2016
Big data-analytics-trends-2016
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 

Similar to BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 

Similar to BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi (20)

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communications
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Internet security
Internet securityInternet security
Internet security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 

More from Shah Sheikh

DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 

More from Shah Sheikh (13)

ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 

Recently uploaded

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 

Recently uploaded (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 

BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi

  • 1. Attacking The Unknown www.dts-solution.com Mohamed Bedewi – Sr. Security Researcher and Penetration Testing Consultant Network+ | CCNA | MCSE | Linux+ | RHCE | Security+ | CEH | ECSA | LPT | PWB | CWHH | OSCP mohamed@dts-solution.com | https://ae.linkedin.com/in/mbedewi | https://twitter.com/mbedewi
  • 3. Attacking The Unknown Escalation Exploitation Enumeration Discovery The Unknown is such a general term! The Unknown can literally be anything You can’t attack The Unknown! What The Unknown really is?
  • 4. What The Unknown Really is? • The Unknown is an internet user who think he is fully anonymous or untraceable. • The Unknown will use anonymity technologies which never promised full anonymity. • The Unknown can be your neighbor, friend, boss or the person sitting next to you. • The Unknown has his own reasons to become anonymous but not all reasons are good. Technologies Web Proxy Proxy Chains VPN TOR
  • 5. Anonymity Technologies - Web Proxy Web Proxy is a computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information. Privacy Implications: • Web Proxy servers are poorly maintained. • The internet is full of rouge Web Proxy servers. • DNS leakage can reveal Web Proxy users’ identity. • The data travels unencrypted in most use cases. • Web Proxy is vulnerable to client-side attacks. Web Proxy is now considered as an old and deprecated technology since it’s far away from being stable, secure, fast, practical nor flexible while being a single point of failure from both security and functionality perspectives.
  • 6. Anonymity Technologies – Proxy Chains Proxy Chains is a daemon which chains a list of proxy servers and route any TCP traffic through them. The last proxy server in the chain accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information. Privacy Implications: • Proxy servers are poorly maintained. • The internet is full of rouge Proxy servers. • DNS leakage can reveal Proxy Chains users’ identity. • The data travels unencrypted in most use cases. • Proxy Chains is vulnerable to client-side attacks. Proxy Chains is now considered as an old and deprecated technology since it’s far away from being stable, secure, fast, practical nor flexible even with the fact it can route any TCP traffic through a chained network of proxy servers.
  • 7. Anonymity Technologies – VPN VPN is an intermediate computer which tunnels and encrypts all network traffic initiated or destined to a client computer. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information. Privacy Implications: • VPN activity logs can reveal VPN users’ identity. • The internet is full of vulnerable VPN servers. • DNS leakage can reveal VPN users’ identity. • Service payment can reveal VPN users’ identity. • VPN is vulnerable to client-side attacks. VPN is now considered as the second favorite choice when it comes to anonymity since it's stable, semi-fast, practical and flexible with the ability to handle and route any IP-based service robustly through the encrypted magical tunnel.
  • 8. Anonymity Technologies – TOR TOR is based on a VPN distributed network which takes a random pathway through several encrypted servers to an exit node which accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information. Privacy Implications: • TOR exit nodes are poorly maintained. • Compromised nodes can reveal TOR users’ identity. • DNS leakage can reveal TOR users’ identity. • Correlation attacks can reveal TOR users’ identity. • TOR is vulnerable to client-side attacks. TOR is now considered as the favorite choice when it comes to anonymity since it's free, stable, semi-fast, practical and flexible with the ability to handle and route any IP-based service robustly and securely through a VPN network.
  • 9. Anonymity Technologies Facts • If the technology in question is free of charge then it’s poorly maintained and vulnerable. • Anonymity technologies are vulnerable to client-side attacks which will reveal users identity. • If the technology in question is paid then it’s most probably monitored even if told otherwise. • Anonymity technologies are vulnerable to DNS information leakage if not specially configured. • Intermediate mediums used by anonymity technologies can be sniffing traffic for any purpose.
  • 10. Privacy is an Illusion
  • 11. How to Exploit The Unknown? Attack Any successful exploitation starts with discovering the target in question then enumerating the target for potential vulnerabilities then exploiting the discovered vulnerabilities then finally escalading privileges and backdooring the target in question to ensure further access. The target in questions is anonymous and to take the previous approach further, we need to deanonymize and identify the target first otherwise exploitation won’t be possible. The entire process of deanonymizing, identifying, attacking and profiling (DIAP) the target needs to be automated via a smart light weight offensive module. Deanonymization Identification Enumeration Exploitation Escalation Persistence
  • 12. Now Since We Know How it Should be Done Let Me Introduce to You dynamicDetect
  • 13. What is dynamicDetect? Despite it’s friendly name, dynamicDetect is a very sophisticated offensive module which can effectively and robustly deanonymize, identify, attack and profile (DIAP) malicious users basically behind TOR, VPN and Proxies automatically and with zero human interaction. dynamicDetect Technical Features: • Capable of deanonymizing any anonymous user flawlessly and accurately on the fly. • Capable of identifying the anonymous user’s IP address, country, city and coordinates. • Capable of enumerating the anonymous user’s machine to spot every single weakness. • Capable of exploiting every single weakness identified in the anonymous user’s machine. • Capable of escalading privileges under any system despite deployed security controls. • Capable of maintaining access and staying stealthy even in the most strict environments. • Capable of profiling every and each anonymous user efficiently with detailed activity log. The anonymous user never suspects the activity happening in the background and it all happens in a maximum of 3.10 seconds!
  • 14. How dynamicDetect Works? Deanonymization Identification Enumeration Exploitation Escalation Persistence Excellent Alice thinks that she's fully anonymous till she clicks on a rouge link and out of the sudden, her machine isn't hers anymore after being fully deanonymized and got her identity exposed! The best way to deliver a malicious payload is over an encrypted channel and we don’t even have to worry about raising any suspicions because Alice is the one who initiated it Payload successfully delivered and Alice doesn’t even know!
  • 15. Talk is Cheap, Show us dynamicDetect
  • 16. Thanks and Have a Good Day