Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Truly Miscellaneous :: dchacker.txt

The DCPhoneHome.com FAQ - About hacking with a Sega Dreamcast!





  August 6th, 2002 - 4:00PM PST

                                  The dcphonhome.com FAQ



FAQ
This FAQ spawned from the comments posted by slashdot'ers and the pile of email we have been getting.

Q: What is 180 degree hacking?
A: 180 degree hacking is the concept of tunneling an internal network to
an attacker system through open data paths over trusted protocols.

Q: Why did you choose the dreamcast?
A: We wanted to get the point across that any "computer" can pose a
threat to an organization. We thought the dreamcast would be a good
platform to convey this. It runs linux, and we had the broadband
adapter.

Q: If your going to sneak into a company, why not drop off a laptop?
A: Of course that would work. The point of 180 degree hacking is not to
demonstrate weaknesses in physical security; Its to focus everyone's
attention on *data* exit points and show how these exit points, when not
protected, can be used to create covert back channels into an
organizations internal network.

Q: Why not just drop off an access point? Then you could sit in your car.
A: Since nearly half of the presentations this year were about finding
rogue access points and weaknesses in 802.11b, we figured that has been
covered quite enough. Again, 180 degree hacking isn't about weaknesses
in physically security.

Q: Why did you use the dreamcast instead of, X, Y, Z...
A: In order to prove that covert back channels can originate from any
"computer" we used the Compaq iPAQ, Sega Dreamcast, and a modified
trinux ISO. What we wanted everyone to understand is that the delivery
mechanism doesn't matter. It doesn't even have to be a stand alone
"thing." The same software we use to tunnel VPN's home, runs dandy on
many OS's and could easily be ported to a software package.

Q: Wouldn't it be easy to catch you since your IP address will be
hardcoded on the CD?
A: Yes, it would. However we are not worried about being "caught" since
our clients pay for our services and expect us to try to hack their
networks.

Q: Isn't it unethical to make it easy for hacker to use their game
systems to hack networks?
A: That is a silly question. First of all, this is by no means, "easy."
We have invented nothing new. The tunneling software we use (vTUN, cipe,
proxytunnel, ssh/ppp, etc.) is already available to everyone on the
internet. If a hacker wanted to use this software to create a back
channel they are not going to spend 100+ hours porting software to a
dreamcast. A hacker would run these applications on a system they
compromised instead of wasting 150+ CD-R's perfecting the distribution.
Again, the point of this is not the dreamcast. The message we are trying
to convey is that data paths gone unchecked, can be used to compromise
perimeter security.

Q: "from sneaking in and connecting a laptop to the network? I mean,
wouldn't a Dreamcast plugged into the company network be a bit more
suspicious than a computer?"
A: (sigh) Again, this is not the point, the thing we are focusing on is
what "it" does once "it" is there. "It" could be any computer. The use
of the dreamcast illustrates that we have misconceptions of what a
computer is. We need to be aware of all computers when it comes to
security.

Q: What tunneling can your dreamcast/iPAQ/x86 perform?
A: First it checks for common TCP ports let out of firewalls. If it
finds one, it starts vtun. If no TCP port are found, it checks for UDP
ports (like 53). If it finds a UDP port, it starts cipe over UDP. It
then checks of ICMP, if ICMP is available, it starts icmptunnel. If TCP,
UDP, and ICMP fail, it attempts to discover a proxy server. If a proxy
server is found, it starts PPP over SSH, via the proxy server, using
proxytunnel. Once the device starts the tunnel, it sends its network
information over the tunnel to the phonehome system so the attacker can
setup routes to the internal network.

Q: Couldn't you stop this attack with MAC address filtering?
A: Exactly! There are many things we can do to stop this. Unfortunately
people are not using security features they have available to them on
their internal networks.

Q: The broadband adapter is hard to find and very expensive now. How do
you expect people to hack networks with their dreamcasts without the
broadband adapter?
A: (sigh)

Q: So you made a dreamcast into auto-hacking device?
A: No, we ported some network discovery/tunneling software to a
dreamcast (and other hardware) to prove a point. The dreamcast doesn't
hack anything. It simply figures out ways to build encrypted tunnels
home. Any hacking that occurs post-delivery will come across the
encrypted tunnel where it's sure to be noticed by a companies IDS and
log files right? (Defense in depth anyone?) (many slashdoter's enjoyed
discussion about how they would hide things in an organization)

Q: Why don't you guy's hide the dreamcast in a drawer or a ceiling. This
way it won't be discovered.
A: Knock yourself out.

Q: Wouldn't be better to put a wireless card in the iPAQ?
A: Been there, done that, got the tee shirt. Isn't the real question;
Why would anybody put a $100 dollar 802.11b card in a $400 dollar PDA
when they could buy a $100 linksys AP and do the same thing?

Q: I want to hack the world with a dreamcast.
A: Think about this for a second, in order for the ppp/ssh tunnel to
work, you have to hardcode your ssh key on the CD so that ppp over ssh
can be started on your system. What else could someone do with you root
ssh key besides start ppp? One more thing to think about, this builds a
VPN tunnel, which goes both ways. You can get on somebody else's
internal network, which means somebody else can get on your.....

Q: Why can't I download any of your tools?
A: We are looking for a mirror. Downloads would kill our DSL line.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH