We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration tests

00:00

Formal Metadata

Title
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration tests
Title of Series
Number of Parts
122
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests brings the DEF CON 19 audience the most massive collection of weird, downright bizarre, freaky, and altogether unlikely hacks ever seen in the wild. This talk will focus on those complex hacks found in real environments - some in very high end and important systems, that are unlikely but true. Through stories and demonstrations we will take the audience into a bizarre world where odd business logic flaws get you almost free food [including home shipping], sourcing traffic from port 0 allows ownership of the finances a nation, and security systems are used to hack organizations. The SpiderLabs team delivered more than 2300 penetration tests last year, giving us access to a huge variety of systems and services, we've collected a compendium of coolest and oddest compromises from the previous year to present at DEF CON. Our goal is to show effective attacks and at the same time not the trivial ones that can be found by automated methods. By the end of this presentation we hope to have the audience thinking differently about systems and applications that organizations use every day, and how they may be used against them. Rob Havelt is the director of penetration testing at Trustwave's SpiderLabs, the advanced security team within Trustwave focused on forensics, ethical hacking, and application security testing for premier clients. Rob has worked with offensive security seemingly forever, and from running a start-up ISP, to working as a TSCM specialist, he's held just about every job possible in the realm of system administration and information security. Formerly a bourbon-fueled absurdist, raconteur, and man about town, currently a sardonic workaholic occasionally seeking meaning in the finer things in life - Rob is, and will always be, a career hacker. Wendel Guglielmetti Henrique is a Security Consultant at Trustwave's SpiderLabs, the advanced security team within Trustwave focused on forensics, ethical hacking, and application security testing for premier clients. He has over 11 years experience in Information Technology, where the last 6 years were dedicated to penetration testing. He has performed security focused code reviews, secure development training, forensics analysis and security assessments. Wendel has performed countless network, application and web application penetration tests for various organizations across the globe, including government, banking, commercial sectors, as well as the payment card industry. Recent presentations include Black Hat Arsenal 2010 (USA), OWASP AppSec Research 2010 (Sweden) and Black Hat Europe 2010 (Spain). Previously, Wendel spoke in Troopers 09 (Germany), OWASP AppSecEU09 (Poland), YSTS 3.0 (Brazil), and has spoken in well known security conferences such as DEF CON 16 (USA) and H2HC (Brazil). Wendel developed a tool to detect and remove the famous BugBear virus, before most of the antivirus companies around the world in 2002. During his career, he has discovered vulnerabilities across a diverse set of technologies including webmail systems, wireless access points, remote access systems, web application firewalls, IP cameras, and IP telephony applications. Some tools he wrote already were used as examples in national magazines like PCWorld Brazil and international ones like Hakin9 Magazine.
54
106
112
Real numberStatistical hypothesis testingStatistical hypothesis testingWeb crawlerSoftware testingReal numberWindowRight angleInformation security
Computer fontInformation securityIn-System-ProgrammierungPersonal digital assistantDifferent (Kate Ryan album)Cartesian coordinate systemProjective planeFirewall (computing)Statistical hypothesis testingRemote procedure callSystem administratorSet (mathematics)Web applicationProcess (computing)Vulnerability (computing)Product (business)Hacker (term)Web crawlerPhysical systemComputer animation
Physical lawCartesian coordinate systemExploit (computer security)Vulnerability (computing)Information securityPhysical systemPresentation of a groupSelf-organizationSoftware testing
WaveComputer wormExecution unitRule of inferenceHacker (term)Web crawlerCycle (graph theory)Gateway (telecommunications)ModemPasswordCapability Maturity ModelSystem administratorSpacetimeCASE <Informatik>Goodness of fitWebsiteNumberWeb browserCross-site scriptingDirectory serviceInternetworkingSystem callWordDifferent (Kate Ryan album)Database transactionCartesian coordinate systemStatistical hypothesis testingInformation securityDialectInformationField (computer science)Series (mathematics)Device driverGeneric programmingProduct (business)MathematicsDemosceneNegative numberParameter (computer programming)Random number generationResultantInjektivitätDependent and independent variablesHacker (term)Pattern languageFlash memoryJava appletSoftware
Hacker (term)Rule of inferenceExtension (kinesiology)Online helpStatistical hypothesis testingSet (mathematics)EmailCuboidCloningPoint (geometry)Service (economics)Virtual machineMereologyDisk read-and-write headMessage passingVideo gamePasswordFreewareMobile appComputer animationLecture/Conference
Rule of inferenceHacker (term)Maxima and minimaVirtuelles privates NetzwerkDependent and independent variablesTouch typingOpen setServer (computing)Metropolitan area networkSuite (music)Statistical hypothesis testingCuboidWindowSoftwarePlastikkarteCartesian coordinate systemAxiom of choiceConnected spaceResultantDatei-ServerCellular automatonDifferent (Kate Ryan album)Order (biology)Public key certificateMultiplication signProxy serverInternetworkingVulnerability (computing)Data centerFlow separationEqualiser (mathematics)Content (media)Field (computer science)Similarity (geometry)HTTP cookieWebsiteException handlingLecture/ConferenceComputer animation
Virtuelles privates NetzwerkGamma functionHacker (term)Different (Kate Ryan album)Workstation <Musikinstrument>Interface (computing)PerimeterInformationDatabase transactionTouch typingRight angleVulnerability (computing)PlastikkarteDatabaseInstance (computer science)Level (video gaming)MehrplatzsystemSelf-organizationFirewall (computing)BuildingSystem administratorMultiplication signDirectory serviceCoprocessorCodeMobile appPhysical systemNeuroinformatikWeb 2.0Absolute valueSource codeInternetworkingStack (abstract data type)Process (computing)Computer animation
Hacker (term)Service (economics)CodeInformationStatistical hypothesis testingInternet forumSource codeProfil (magazine)User interfaceCartesian coordinate systemArmMetadataWeb pageFacebookSystem administratorGroup action1 (number)
Hacker (term)Electronic mailing listCartesian coordinate systemMultiplication signVulnerability (computing)SoftwareStatistical hypothesis testingInterface (computing)PasswordProfil (magazine)Service (economics)RootLocal ringPhysical systemWeb 2.0WordVirtual machineMereologyWebcamProxy serverAuthenticationBasis <Mathematik>Gastropod shellFirmwareComputer animation
Hacker (term)OracleService (economics)Scaling (geometry)Keyboard shortcutServer (computing)Goodness of fitPasswordMultiplication signDifferent (Kate Ryan album)SatelliteStatistical hypothesis testingDatabase1 (number)Zoom lensSoftwareType theoryConnected spaceWorkstation <Musikinstrument>Information securityData managementProcess (computing)VideoconferencingBuffer overflowVirtual machineOracleRight angleSQL ServerEncryptionVulnerability (computing)System administratorUbiquitous computing
OracleHacker (term)Range (statistics)Connected spaceSource codeLevel (video gaming)Statistical hypothesis testingGoodness of fitDifferent (Kate Ryan album)VideoconferencingLine (geometry)Software testingInternetworkingLecture/Conference
DatabaseGamma functionQuery languageClient (computing)Connected spaceCASE <Informatik>InjektivitätAuthenticationWindowPoint (geometry)DatabaseWeightSelectivity (electronic)Server (computing)Virtual machineReverse engineeringGastropod shellScripting languageTable (information)SoftwareLattice (order)OracleInterface (computing)Line (geometry)VideoconferencingStatistical hypothesis testingSQL Server 7.0Latent heatError messageComputer animation
Hacker (term)OracleAmenable groupComputer animation
Lattice (order)Statistical hypothesis testingReal numberComputer fontMultiplication signComputer animation
Zoom lensComputer fontVirtuelles privates NetzwerkHacker (term)OracleLattice (order)Multiplication signComputer animationXML
Lattice (order)ChainSelf-organizationDatabase transactionNumberElectronic mailing listCASE <Informatik>TrailPersonal area networkCoprocessorPlastikkarteType theoryFiber bundleEntire function
Menu (computing)Hacker (term)Multiplication signRevision controlBootingDefault (computer science)Physical systemStatistical hypothesis testingGame controllerGame theoryIntegrated development environmentHand fanVirtual machineSelf-organizationReal numberCASE <Informatik>Line (geometry)Personal identification numberLoginControl systemData centerServer (computing)Software bug
Transcript: English(auto-generated)
Thanks, everyone, for coming out. Welcome to Earth versus the giant spider, amazingly true stories of real penetration tests. My name is Rob Havelts and I'm the director of penetration testing for Trustwave spider labs. Over to my right, left, my other right, is my
Brazilian friend Wendell Henrique. I work on the Trustwave spider labs penetration team for almost three years, I guess. I have over nine years in the security industry. I have found some different set of products, web application firewalls, camera, remote application
systems and probably a lot of others. I represented at Black Hat, Waspy and the other big conference. We are in the process of getting up and painting technology for penetration test, project 3D and a few other things. That's me. And like I said, I'm the
director of pen testing at Trustwave spider labs. I've been around the security industry kind of forever. I've worked from starting up an ISP to doing TSCM to just
about every possible job in system administration and information security. I spoke at a lot of venues and this is a great opportunity for us to speak to you guys at probably one of
the best security conferences ever, DEF CON. Greatest crowd. So what's this all about? Basically we put together a collection of the weirdest, freakiest and most unlikely hacks
that we've ever found. And we'll walk you through these weird, freaky, unusual, just out of the ordinary stuff. We'll let you meet the victims of these odd hacks because some of these actually have serious implications. And we'll kind of walk you through a few of
these things and kind of wrap it up after that. So basically we've been in a unique opportunity to see some very real, interesting, uncommon and very non-trivial things that
can't really be found either using traditional attacking methods, vulnerability exploits or straight on technological methods or even ways that make sense and follow the laws of
seemingly the laws of physics. And we've done this because we have a huge team that only the coolest and freakiest stuff were selected to present to you guys. So by the end of
this presentation we hope to have you thinking about these systems and applications that organizations use every day and how even like the most basic things, security tools,
security systems, coffee machines and things like that might be used against them. So on with the Earth versus the giant spider. Do you want to talk about this one?
This is a big network around the world that sells food over the internet. They have some good maturity of security. So for example, the application we couldn't find any cross-site scripting, cycle injection or things like that. The application was
basically created in Java and Flash and no common pattern manipulation was working. For example, including negative values on products and things like that. However, during the
transaction we detected that the checkout was redirected to a third party gateway. And this gateway went and got this information and sent the information to a security channel directly to this company and they just got a response like approved or not
approved. So what we did is manipulate this request to change the response to the transaction itself on the gateway since it was a directory over JavaScript from our
browser by the main application. Consequently, the final price that appeared on the website and all the stuff was the real price of the products. But when we conclude the transaction, we could put any kind of price that we would like. And they just got accepted
or not. In this way you could get almost any kind of food for any value.
Talk to them, not me. Yeah, well, basically, as a result of this penetration test, we
could get some good amount of food delivered to our home with almost 50 cents at the end of the engagement. One of the cool things was we actually did engage a delivery driver that came out with bags of food and everything like that and took a bunch of pictures. And
it was all kinds of fun. But it's just a weird thing that, you know, and kind of a bad thing to do to let somebody kind of manipulate things and just kind of trust that everything is happening behind the scenes the way it should be. So moving on. So
this one was called the one PBX will rule them all kind of hack. This was a large financial institution that had a lot of different technologies in place, some new
technologies, but some like ancient technologies. In the course of like testing this institution, you know, one of the things that you normally want to do is kind of dial the space. Sometimes you do it just to voicemail surf and see who is out, who is
in, who is doing what, what people's names are and, you know, things like that. A side benefit of just kind of calling random numbers and listening is sometimes you run into something where you get a modem tone. Well, in doing this, you know, we
called a number, got a modem tone and just a weird like kind of series of characters and a login prompt that was kind of generic. But kind of dissecting like the series of
characters and what we got back from the modem over making like several calls, figured out that it was an old Siemens Rome PBX. Well, in this case, that's great. You
know, you get a PBX kind of manual. It turns out that they changed the administrator password, they changed the user, the upper password on it. But there was one account that actually had better credentials than administrator. It was field
tech account. And they didn't change that password. When you get into the field tech account, it actually lets you go into like any user account that you want. So went into the Rome PBX's administrator and, you know, just kind of browsed that. Having like done
some voicemail surfing previously, I knew that the extension for the help desk. So one of the features is to like clone a voicemail box. So one of the things we did is created a new extension, cloned the voicemail box for the corporate tech support. And at
the end of the day, we'd kind of listen to the various messages. Well, it turns out that there was some dude that was traveling on the road and called in frantically to tech support after hours when they weren't picking up asking a problem about a VPN problem.
It just so happens that in a previous life, I was a certified checkpoint instructor and I happened to know a lot about checkpoint. In a previous life, I actually like sat on the app desk and did like checkpoint like managed services. And the problem he was
describing, I knew exactly what it was right away. It was a stupid like settings problem. So I actually just called the guy back. I called the guy back and I walked him through like his problem. First I asked him for his username. Then I asked him for his
password. You know, so that I can check and verify his account. And then I fixed his machine. Afterwards, like, you know, he logged in and, you know, he logged out and
bingo, logged in as himself, bang, free credentials. The funny part about that was in the wrap up of testing, we found out that this guy actually sent an email to the head of
tech support like praising them for like the wonderful tech support they got and the quick responsiveness of the tech. So that one was kind of awesome and freaky and weird.
And, you know, sometimes you just kind of have to think outside the box. But, you know, something stupid like, you know, not realizing that, hey, the field tech has their own like super account on this piece of antiquated technology can, you know, have kind of
severe implications. So. Well, this penetration test on the reality happened at least three or three times. Similar wishes like this one. Well, we were doing an internal penetration
test and during the internal penetration test, the network segmented was very limited. We had almost very few things to test like one open SSH server very well updated. One
Samba server that's almost without sharing no folders, nothing in the windows box or a few windows box that just block everything except ping like echo request and echo response.
Also, villain attack bypass or villain hoping was not possible on the specific customer and neither on this older two or three that used a similar attack during the last year. However, our spoofing that everybody knows and is very common was present, was
possible to be executed. But it gave no juice. We couldn't get any credential or anything special. However, during the previous external penetration test, we figured out that this
customer had an external site in a data center that had a VPN SSL and these external VPN SSL use a self-signet certificate and they use this a lot but we couldn't compromise during the external. So during the internal, we saw some traffic over the SSL port and
we did a man in the middle. Since it was a self-signet certificate, probably the users did not figure out the difference. When we dumped the contents, we saw connections to these
external VPN SSL server with self-signet certificates. So we just got the cookies and the quantity in our box with a burp suite and the access again, the same external data center server. And as a result, we get the whole VPN over SSL getting access to file
servers, applications and a lot of stuff that was not accessible before including credit card data and a lot of interesting stuff. So it's very interesting demonstration of how
sometimes a vulnerability that you couldn't exploit from the external side and is not easily detected by the automated tool can be exploited, for example, from the inside network. It's kind of interesting because it could have produced the same kind of vulnerability at least in three different customers during the last year. So this kind
of vulnerability is the kind of vulnerability we would like to show you. They are kind of different and not easy to find. We felt automated and stuff like that. And that's always interesting because you're taking an external, you know, and organizations tend to
think of the perimeter is the perimeter and the inside is the inside. And, you know, we need to secure the perimeter and the things that we do to secure the perimeter, you know, that's out there. And, you know, that's basically our wall against the big bad
Internet. And inside we need to do different things. But like Wendell said, you know, as a malicious attacker or a malicious insider could use external systems just as easily,
you know, against internal resources. There was another instance of something like akin to that where we were taking a look at a phone directory and from the inside of a
computer on the outside there was actually like an HR system with the vulnerability but you had to have like people's name and their like HR code. Well, when used with the
phone directory inside, it had the HR code and the vulnerable app from the outside, you know, gave enough information to kind of go through and like actually get like HR data from every single user at that company including the CEO's payroll information. So, those
are always interesting. And it's interesting because somehow it was internal that you have to compromise external to come back to internal. This one, this one makes no sense
and we're still trying to figure out how this even worked. But we were taking a look at a card processor for actually like an entire country that processed most of the MasterCard and
Visa transactions. And they were able to, you know, get a lot of information from them. We had a transaction switch that they couldn't touch that was from the card brands
and there was kind of a war of we suspect that's not secure, no it's not, yes it is, no it's not, yes it is kind of thing. And it was very much, you know, they said this, they said that kind of going back and forth. The best they could do is kind of like
build a wall around it. So, because of their, you know, their idea that it wasn't very secure, they put some very restricted firewall policies in place. They were using some weird old like technology that as it turns out was very misconfigured. Nothing would get
through to the transaction switch. It was kind of set down and you could only actually reach it from a couple of stations inside that were kind of like the major databases. Yeah, absolutely. That's exactly what I was getting at. Yeah. Right. And so what he's saying
is then that's exactly what we found out is so they spent all this time like building this firewall around it on like this legacy equipment and, you know, basically like things
source from port zero like being a wild card on a legacy stack. It like actually kind of sailed right through. So it turned out that, you know, the people that said like no it's not secure was actually right because sourcing traffic from port zero we found out a web
min interface on this transaction switch with an admin admin user pass pair. That's always the thing that you want running every financial transaction from your country from.
And, you know, because of that, like, you know, the web min interface, you're able to get in at an OS level and basically like, you know, see processing for basically the whole country. This one's really funny. All right. So, yeah. So, yeah. So, yeah.
There was an external pen test, you know, just as an outside in kind of thing. Very few services. A couple applications. There was an administrative like web interface. And it
was some cheesy thing we thought might be vulnerable but, you know, we were able to get like some of the code to leak and things like that enough so that, you know, you could Google it and kind of search for it. So it turned out that that led us to looking at
like comments and metadata in there. We actually found a news group where the administrator actually like posted like huge snippets of the source code for it as well as like all of his information. It was very, very chatty on the news groups.
Unfortunately, that didn't get us much. You know, so looking through like the snippets, like, you know, you think like bingo, I have like source code here. You know, surely I can get like something from that. It didn't end up getting much. However, we ended up
like looking up the guy by name and we found his Facebook page and like, you know, nicknames and a bunch of stuff about it. Which led us to a forum called Caucasian Asian Love. And it was a forum for Caucasian men to find Asian women to love. Yeah. So
this guy had a full profile on there. Apparently he was really, really into it and
really, really active in the Caucasian Asian Love. So anyway, we ended up building up a word list from his dating profile and his password was a variant of love machine with
the common U spelling of love. Which is actually rather awesome. So we ended up getting into the administrative interface which actually like yielded like a ton. So.
Well, it was another external penetration test where we couldn't find any trivial vulnerability. Basically, no kind of web vulnerability, no vulnerable services, no weak accounts, no things like that. It was a huge network. So we ended up building up
and we found that on this huge network they had almost 20 high definition IP cameras and they also a specific port that was recognized by network mapper that probably was the
application to centralize all these IP cameras into a single service. Well, these IP cameras, we looked around and we couldn't find any vulnerability. So we just looked for a
copy of these IP cameras and in our lab we tested them and we find a few vulnerabilities like authentication bypass that allowed us to dump the whole password from
the Linux-based system inside the IP camera and a lot of stuff we cracked the local root password and stuff. On the end we created a modified firmware and we uploaded over this interface and created a web shell. From this web shell on the web camera they was
connected on the inside network and consequently from these web cameras we could look for example, internal employees working, give zoom up to ten times, get screenshots, IP of systems, user names and obviously from the web shell we created on the modified firmware
we could access the whole internal network that was accessible from these IP cameras network that was on the management administrative segment. It is interesting because it resulted in an advisory. So we used the video cameras, that's a security service.
The great thing about that one is you take a look, once you're into these video cameras and these were like, by them having like the good video cameras instead of the crappy grainy black and white ones, it really helped a lot because you had an optical zoom of
ten times and some of these were trained on like machines and keyboards and things like that. So it ended up becoming like a password bonanza as you like kind of just sat there remotely in a different country, watching a user like kind of like sit down at a
station and type in their password and I'm like okay, so that user name has this password and throughout the day you end up like collecting a bunch of stuff and then once you have credentials, the stuff on that hardened exterior, you know, with the various
servers that you can do much with, isn't really like so hardened anymore. You can kind of, a lot of password reuse is problematic and all pervasive. So, you know, it tends
to lead to compromise that way. All right. So after this one, we have a video to show
you of, you know, exactly how this all works, but I'll let Wendell describe it first and do you want to like come here and then I'll hand you this? Sure. All right. Go for it.
Well, personally, I really like database security and we commonly find raw BI in the internal network penetration test. We see a lot of database, SQL server, protocols,
DB2 and the MySQL and a lot else. Well, sometimes we can compromise them with different techniques, overflows, weak accounts, problems like bad TNS configured services,
et cetera, in Oracle. However, sometimes we can get like ARP spoofing, but no new connections, not people reconnection, or they have strong passwords, so we can't get the, decrypt the credentials during the span time of the engagement. And that's a frustrating thing. You're in the middle and you're seeing all this stuff and you wish you could do
something with it and, you know, it's like, well, I have all these sessions going, why can't I just grab one? So that's what Wendell and Steve did. They wrote a tool to basically, all right, this is an already authenticated session. Let's just go ahead and
grab one. Yeah, exactly. Also, big thanks to Steve to work with us. He did a great job. And also supports the SQL server. So the main idea is if you have the sessions running for Oracle or even SQL server, why force them to disconnect and get credentials or
whatever, if you can just take this connection and send all comments and do whatever we want. So, as you know, we can show screenshots of this penetration test we are talking about because they are customer and it's not a good thing, but we created the in-house
video just to demonstrate how it works. We used it recently a lot in different internal penetration tests with a good level of success. And the tool also is free and available on the internet for who is interested. So we start off with this tool called VAMP that
actually like does the ARP spoofing. It's a pro script that does kind of like some reverse ARP spoofing. With VAMP, then you'd run this tool called Thicknet. And now we
are just showing a normal connection to Oracle database from a supposedly client. This like a client that you want to access. It's first showing that we can't log in with the credential window at the database as you can see on the first line. Then it's logged
with the user Steve that's a valid user. So Steve is executing a very simple query like select 123 from the wall or whatever. Now back to Thicknet. If you use the L S comment, we can see the sessions. And the one is marked with the I letter that means
that it's injectable. It was detected as injectable by Thicknet. So the next thing you do is you actually like go ahead and use Thicknet to steal the session. It's a real easy thing. And basically what you end up with is taking that session over and
the normal user just reconnects. In most cases, they don't know that anything really happens. It's just kind of like a blip. And a lot of database clients have connection
pools. Anyway, so they just start a new connection. You take their old one and basically end up with a shell interface to the Oracle database. At this point, we could for example send any comments. I see we've stolen the connection. So just to demonstrate, we
are sending this SQL query that you'll be creating an account that's called the window that on the beginning of the video was not an account that existed on the database. As you can see, you get on the ending the ORA error 01003. This means that
the command was sent and the parcel successfully. Now we are just stopping the
RPP poison and making sure VAMP makes sure that we are not breaking the RAP tables. And now we are trying to log in again with the same account that was the window just to make sure it really works. We use the VAMP to intercept and injecting a live
connection and to create a new account on the Oracle database. Now as you can see, we can log with the account that previously doesn't exist on the database. Now we can do any query like the privilege of this account. Just to demonstrate that it's possible to
execute any query, obviously in this case, the session that was stolen was a administrative query. So we could create an account but you can always get the
privilege of that account. For example, recently on our team meeting, we got another guy from the network penetration testing team and it's very nice to last week we got a stolen SQL server, Microsoft SQL server with this tool and they could use the
XPCM shell to execute commands just from a stolen session also. We have the other nice things from T-Connect like steal credentials and even Microsoft has some very specific stuff from Windows clients that leaky Windows authentication. So I suggest everybody that is
interested to check T-Connect. It's very interesting.
Okay. So technology is against me. Okay. So it's time to, you know, talk about some of
the victims of these attacks because they all have very serious implications. You know, they make for kind of like fun stories and, you know, sometimes funny, you get a chuckle out of them. But let's talk about none of these attacks really led to anything
trivial. The reason, you know, why they're included here is all of these attacks led to ginormous compromises of huge amounts of data. You know, in some cases, CHD numbering in
the millions, PII numbering in the millions and huge, huge, huge amounts of data. So the organizations that, you know, we're talking about here are multinational banks,
global restaurant franchise, major retail chains, credit card processor for an entire nation. And the types of data stolen that we're talking about here is, you know, every
Visa and MasterCard transaction processed in the entire country, hundreds of millions of pan and track data, HR data. In one case, you know, it led to accessing like, you know, like the DHS terrorist watch list for financial institutions that they're supposed to check
against. And, you know, obviously like billions of dollars in transactions. So just kind of in conclusion to this before I say something about stuff you didn't see is, you know,
this talk was focused on those complex or uncommon hacks found in real environments. Some are very high end and important systems. And some are unlikely but true. And this is,
you know, a bizarre world where you have like old ancient anomalies, you know, like affecting like newer systems, security systems that are used to hack organizations, you
know, new techniques developed on the fly and things like that. So, you know, we're happy to be here. Hopefully you enjoyed these stories. So, I think one of the things
that we were going to do with this is we spent like two weeks setting up like this whole like hacking challenge that we were going to run during the talk. And so, you know, we checked on it when we got here. We checked on it last night. Checked on it this
morning and like three machines that we had like wouldn't boot. And that's just awesome. So, you know, the winner was supposed to get a prize. And so we still have the
prize. But I know like a lot of you out there have like bizarre and weird stories of their own. So we're going to change it. Anybody that comes up with just a truly weird fucked up
story will get the prize of a Duke Nukem Forever PC version game. Anybody want to take a
shot? Come on up. Well, yeah. We're sharing a story. We're sharing a story. We're showing you that we have the game today but you won't actually get it for another 12
years. Have a seat. What's your name? Tim. Tim, what's your weird fucked up story? Well, we were doing a pen test one time and we were war dialing all their phone lines. And like you, we found a system that was returning odd characters. And basically we
were able to determine that this was an HVAC control system. And so did some research and found that there was a default technician log in. Got into the HVAC control system. And
then we shut down the exhaust fan in their server room. So then we just sent somebody out dressed up as an HVAC technician. And we were able to get right into the data center. What do you guys think? Does Tim get the prize? Oh, yeah. Thank you. Sure.
Wait. No, no, no. Does anybody else? Like I saw a couple people that were kind of coming towards this stuff. Anybody else want to try it for the runner up prize? Anyone?
All right. Well, in that case, I'll drink the cachaca myself. Thanks, everyone. Hope you enjoyed it and thanks for coming out.