Here we go with a review of the last day. As usual, the social event had huge impacts on some attendees but after coffee everything was almost back to normal. The day started with Braden Thomas who presented â€œReverse engineering MSP 430 deviceâ€ or reverse engineering a real-estate lock box.
In US/Canada, such devices are used by real-estate agencies to store the keys of homes for sale. They allow to access the key when the owner is not present. Why focus on such devices? First, because they are used by many people and, usually, they tend to store crypto secrets into the flash. Itâ€™s cheap and easy but notÂ necessarilyÂ nice. There is a legacy key using cell radio but more andÂ more users use the eKey (an IOS/Android app). Braden explained with many details all the steps he performed to be able to access the firmware and then to extract the crypto key. Guess what? The presentation ended with a live demo: Braden just successfully unlock a lock. During the presentation, he explained the different attacks that are available and a special one (that was successful) called “Paparazzi” attack: the goal is to use the flash from a camera against a decap chip to make it behave differently.
Then, Peter Hlavaty talked about â€œAttack on the coreâ€. This talk went in the same direction as the one presented yesterday about bypassing security controls in Windows 8.1. On most operating systems, the kernel is the nice place to place malicious code. Why? Because modern oÂ operatingÂ systems are more and more protected by implementing multiple controls. The talk focused on CLP3 to CPL0 (â€œCurrent Privilege Levelâ€). Level 3 being the user mode and levelÂ 0 the kernel mode. Peter not only focussed on Windows but also on Linux and Android. That’s clear: the kernel is the new target!
After a welcomed coffee break, Jean-Philippe Aumasson, renowned cryptographer, talked aboutâ€¦ cryptography with a talk called â€œCryptographic backdooringâ€. Usually, cryptography means a lot of formulas, etc but Jean-Philippe’s talk was very didactic! Why speak about backdoors? Because they are present in many crypto implementation and there is no official research paper on this topic. A backdoor can be used for surveillance, deception, â€¦ and also terrorists! There are also more and more backdoors in products and applications today.
Jean-Philippe explained what is a backdoor. His definition is:
A feature or defect that allows surreptitious access to data
Based on weakened aÂ algorithmsÂ or covert channels. But what is a good backdoor? It must be:
- Principle of “NOBUS” (No One But Us, NSA term)
- Reusable and unmodifiable
Then, he reviewed examples of backdoor and how they have been implemented. A very nice talk!
There was no lunch break for me because I attended a workshop about RF hardware: â€œFun with RF remotesâ€ prepared by Damien Cauquil. The goal of the workshop was to build a â€¦ RF door bell brute forcer. After an introduction to the RF technology and some demos to capture andÂ analyseÂ signals, it was a hands-onÂ session. All participants received a door bell pack (a remote controller + door bell). The challenge was to hack the remote and make Damienâ€™s doorbell rings. It was a premiere for me. After soldering some components and some stress, it worked! Very nice workshop!
And the last half-day started with Guillaume Valadon and Nicolas Vivet who presented â€œDetecting BGP hijacks in 2014â€. I arrived a bit late due to the hardware workshop. The first part was a recap about BGP, how it works, what are the features, etc. BGP hijacks are not new but they can have a dramatic effect! An hijack is a conflicting BGP announcement. It means that your packets are sent across notÂ authorisedÂ networks (from a BGP point of view). The next part of the talk focussed onÂ detected the hijacks. This is a critical step for ISP’s. Guillaume and Nicolas explained in details the platform deployed worldwide to collect BGP messages and store them, then they are processed by OCAml. They can emulate a BGP router via some Python code. By putting all the components together, they are able toÂ analyseÂ the BGP announces and detect issues. But this is offline and consumes a lot of data. They also presented a real-time detection mechanism. AÂ nice presentation with many details. I recommend to read the slides if you’re working with BGP. Their conclusions are that such attacks are a real risk and that traffic must be encrypted and authenticated to prevent it to be read by 3rd parties.
Alex Ionescu came with a â€œsurprise talkâ€. The title was â€œUnreal mode: Breaking the protected processâ€. It was a surprised talk because he received a last minute green light from Microsoft. Windows Vista introduced new protections at kernel level. In Windows 8.1, that model was extended to protect key processes even from admin and to mitigate attacks like pass-the-hash. Alex explained how digitalÂ signatuesÂ are working with the new versions of the OS. He alsoÂ explained how process protection works (even with admin rights some processes can’t be killed or accessed by debuggers. A mass of interesting information if you’re working with Windows security models.
And to close the conference, a keynote was presented by Anthony Zboralski: â€œNo Such Securityâ€. Anthony defines himself as â€œa bank robberâ€. When he was young he played with many computers and quickly started to break stuff. After some issues with the Justice, he switched to security consultancy. His keynote was a suite of reflexion about the security that is implemented today by companies but also recommended by consultancy companies.
The second edition of NoSuchCon is over! It is a great event with highly technical and nice presentation. I also met lot of new or old friends. The talks have already been published here:Â http://www.nosuchcon.org/talks/2014/.