Hide And Seek, Post-Exploitation Style
ShmooCon IX - 2013
Presented by:
TJ O'Connor,
Tim Tomes (LaNMaSteR53)
Date: Friday February 15, 2013
Time: 17:30 - 17:55
Location: Regency A
Track: One Track Mind
Geo-location allows us to translate the virtual location of an object to its physical location on Earth. For benign reasons, applications permit the use of different geo-location techniques. Some methods are transparent to users while others require explicit permission. Our talk briefly covers how geo-location works, discusses specific API Calls and available geo-location databases, and releases several new geo-location tools.
- The first tool, Honey Badger, is a robust web based framework built for geo-locating targets. Through native HTML5 and client-side Java, Honey Badger forces the browser to reveal its current physical location to a remote command and control platform. Honey Badger will be released during the talk.
- Next, Pushpin is a Python script that scrapes social media around specific geo-coordinates to reveal discussions, images, and videos that might assist during the physical reconnaissance phase of a penetration test. PushPin is currently available.
- Finally, we will release a series of Metasploit post/exploitation scripts that can assist in physically identifying a target following a successful compromise. From using a victim’s wireless card against them, to scanning the machine for exif enabled imagery and parsing browser databases – these scripts will assist in getting the “pattern of life” of a hooked victim.
Tim Tomes
Tim Tomes is a Senior Security Consultant for Black Hills Information Security with over 15 years' experience in information technology and application development. Tim spent three years as the Army Red Team Senior Team Leader and managed the Army’s first Cyber Defense Training Program. Tim has presented at Hack3rCon, Colorado Springs ISSA, and DerbyCon.
TJ O'Connor
TJ O’Connor is DoD Expert on information security. He is the National Defense University Cyber Challenge Champion and co-coached two winning teams at the National Security Agency’s Cyber Defense Exercise. TJ authored Violent Python.