bo0om - deanonymization and total espionage (zeronights, 2014)

Post on 02-Jul-2015

13.686 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

This talk is dedicated to de-anonymizing active Internet users. We will give a hands-on demonstration of various Internet resources tracking and/or storing user data, and explain how this data can be used to find out the identity on the other side of the screen for your own (either good or evil) purposes. Доклад посвящен деанонимизации активных пользователей интернета. На практике будет показано, как различные интернет-ресурсы следят или содержат информацию о пользователях и как ее можно использовать, чтобы вычислить, кто находится по ту сторону монитора для собственных (как плохих, так и хороших) нужд.

TRANSCRIPT

Deanonymization and total espionage

Dmitry «Bo0oM» Boomov

Tits and

kittens.

Hopefully, now

you like my

report.

Deanonymization

Passive Active

Password retrieval

Password retrieval

Getting information from email

Getting information from email

Getting information from email

Getting information from phone. Viber

Getting information from phone. Whatsapp

Getting information from phone. Banks

Getting information from phone. Banks

Getting information from phone

Getting information from phone

http://numbuster.com/

Find friends

← Anonist

Apps

https://developers.facebook.com/

Apps

https://vk.com/editapp?act=create

Apps

Demo: bo0om.ru/zn2014/vk/1/

Online users

https://letters.yandex.ru/promo

Clickjacking

Clickjacking

Demo: bo0om.ru/zn2014/vk/2/

Clickjacking

Demo: bo0om.ru/zn2014/vk/3/

CSRF + XSS + BUGS = PROFIT

Click, click…

Click, click…

<a href='tel://1234567890'>Click me</a>

Callback

Callback

Thx @black2fan ;)

Social detector

Demo: bo0om.ru/zn2014/sd/

Вate of birth

Nicknames

Nicknames

Friends and relatives

Friends and relatives

Friends and relatives

Tinfoleak

http://vicenteaguileradiaz.com/tools/

Exif

Analytics

Analytics

Banners

Social buttons

BIG DATA

http://bo0om.ru/zn2014/wtf/

GEO

https://maps.google.com/locationhistory/

Cookie Matching

Specifically, when creating a new cookie, it uses the following storage mechanisms when available:

- Standard HTTP Cookies - Local Shared Objects (Flash Cookies)- Silverlight Isolated Storage - Storing cookies in RGB values of auto-generated, force-cached PNGs using HTML5 Canvas tag to read pixels (cookies) back out- Storing cookies in Web History - Storing cookies in HTTP ETags - Storing cookies in Web cache - window.name caching

- Internet Explorer userData storage- HTML5 Session Storage - HTML5 Local Storage - HTML5 Global Storage - HTML5 Database Storage via SQLite- HTML5 IndexedDB

- Java JNLP PersistenceService- Java CVE-2013-0422 exploit (applet sandbox escaping)

http://samy.pl/evercookie/

Js: onflash: on

Js: onflash: on

Js: onflash: on

Js: onflash: on

Js: onflash: on

Js: onflash: on

Js: offflash: off

Providers

http://imarker.ru/

Evil

Twi: @i_bo0om

top related