2.4 KiB
2.4 KiB
Physical attacks
Physical recon
- Google street view is handy
- can be outdated
- drive-by
- just stalk them
Physical barriers
- doors, gates
- motion sensor door locks
- canned air can trigger motion sensor from outside
- doors with keys and padlocks
- lock picking (manual and electronic) open these easily
- door unlock button
- RFID door locks
- backend systems often very dumb
- plenty of devices can copy cards
- Flipper Zero
Drop boxes
- device that gets stealthily added to local network
- preconfigured to provide connection for attacker
- make it inconspicuous
- in cable tray
- behind desktops
- ...
- when using multiple, make sure they don't communicate
- finding one shouldn't find the others
Lan turtle
- looks like USB ethernet dongle
- routes attacker traffic through VPN into victim network
Packet squirrel
- [https://shop.hak5.org/products/packet-squirrel-mark-ii]
- mostly aimed at network interception and manipulation
- logs network traffic
- captures print spool jobs
- intercepts DNS request and directs them to server of your choosing
Hidden camera
- drop boxes that contain hidden camera
- look like ordinary devices (e.g. USB charger)
- position is key
HID injection attacks
- attacks using devices that act as Human Interface Devices (HID), e.g. keyboard
- Rubber Ducky
- USB that acts like HID
- sends lots of keystrokes to e.g. install malware
- Bash Bunny
- more advanced Rubber Ducky
- emulates ethernet, serial and flash storage as well
- typical attacks
- QuickCreds: run Responder on device to extract NTLMv2 hashes
- BunnyTap: funnel cookies of user to attacker
- Kon-Boot: allows access into password-protected PC by booting with Kon-Boot enabled on USB
- drop attacks
- leave thumb drive for people to find
- curious people will plug it in
- devices that look like cables also exist
- destructive attacks
- killer USBs that send high voltage through device
- destroy mission critical devices
WiFi attacks
- capture handshakes of devices
- pass handshake to hashcat
- most tools require monitor mode
- not present on most devices
- WiFi pineapple
- preconfigured WiFi attack tool
- rogue access point
- reroute traffic
- capture handshakes
- ...
Mitigation
- proper training of staff
- network scans for unauthorised devices
- monitoring and incident response