logo FEDIDEVS

38C3 2024

Day 3 (3573) Jared Naude (140)

Power over Ethernet? 🧐

(Photo @leah)

32 10 3

Does any of this work? Looking at the statistics, from 264 000 cases:
1) Average take down time is 5 days.
2) China Telecom does not accept abuse reports.
3) Digital Ocean supports XARF and average takedown is 28 Hours.
4) Tencent does not care about abuse notification unless it comes from government or law enforcement.

6 4 1

Attack Mining: How to use distributed sensors to identify and take down adversaries by Lars König

Buckle up for a deep dive into the constant battle to protect systems on the internet against adversaries gaining access, and how you can help make the internet a safer place!

🧵

8 3 2

Adversaries will often brute force well known user names (Root, admin, user, test, etc). However, they will also create a list that is specific to a domain and site. The next set of users that are targeted are accounts created by applications that are installed (e.g. postgres)

2 1 1

From the data, Lars has created these 2 diagrams. The first diagram shows where the attacks come from. The second diagram shows the map of IOT devices.

3 1 1

The speaker has automated this process by monitoring IP addresses, identifying the ISP contact, send abuse notification and then monitors for replies which goes to a LLM which will respond with any additional information as needed.

2 1 1

You can get involved by using the data which is available on GitHub, deploying or own attack pod or joining the team to fight against these groups.

7 1 1

The challenge with honey pots is doing target emulation is hard and adversaries could determine that it is a honey pot. By modifying the openssh-server it can help with the emulation without the adversaries knowing what is going on.

1 1 1

When these IPs are looked up in Shodan, they are residential IP addresses which shows either infected home or IOT devices. The speakers dives into a specific example of an adversary trying a set of specific passwords over and over again.

1 1 1

The graph shows a subset that was investigated. This shows 238 unique IPs between Feb - Dec. Each IP scan contains 169 username and password combination.

3 1 1