SlideShare a Scribd company logo
EVIL DATA MINING
 FOR FUN AND PROFIT!
Contents
● Web Scraping
● Quick and Dirty SQL Injections
● iPhones, WiFi and Evil Twins
● Hacking Neighbours
● Port scanning on Steroids
Introduction
●   Fredrik Nordberg Almroth (@Almroot)
    Head application engineer and co-founder @ detectify.com
    IT-security guy
    Hacked Google. Twice.

●   Johan Edholm (@norrskal)
    Server administrator and co-founder @ detectify.com
    Worked with IT security analytics and anti-scraping
    Studied system and network management in Linux
What is Detectify?




Detectify is an automated vulnerability scanner.
●   You sign up using beta code.
●   You press start!


●   Detectify emulates a hacking attack.
●   You get a report regarding your vulnerabilities.
●   Detectify is currently in closed beta!

●   You may try it for free using the beta code: HyperMine

●   http://detectify.com/

●   We love feedback! :)
What is data mining?
●   Data mining is mostly associated with statistics and machine learning.

●   ...or discovery of patterns (intelligence) in large datasets...

●   No fancy algorithms! Just real life examples.
Web scraping
● Grab content from websites
● Host somewhere else
● Study the data
● Sell the data
Web scraping
● Manual copy-paste
Web scraping
Web scraping
● Googlebot
Web scraping
● Bad scrapers
  ○ Downloadable or online tools
  ○ Homemade scripts
  ○ HTTP rewriters
Web scraping
● Homemade scripts
  ○   Made for one site/purpose
  ○   No hacking
  ○   May be against ToS
  ○   Probably legal
Web scraping
● Sosseblaskan.se
  ○   Copy of aftonbladet (rewrite)
  ○   A joke
  ○   Not ads for aftonbladet
  ○   Not phishing
  ○   Illegal
SQL
● Structured Query Language

● Used to talk with databases. MySQL, PostgreSQL, etc...
How it's used
● Websites use databases to maintain data.

● The SQL queries often contain user-data.

● You search on a website for a few keywords.

● The odds of it being done by some SQL dialect is huge.
What could possibly go wrong?
● User supplied data may alter the SQL query.

● Example:
   SELECT title FROM blog WHERE title = '$search_keywords';


● If the searched data contain a quote, the SQL query will
   break.

● Attackers may gain other data than just the "blog title".

● Usernames, passwords, emails, credit-cards...
SQL Injections
● Devastating attack.

● Worst part. It's really common.

● Remember Sony last year?
● Victims 2012.
  ○   eHarmony
  ○   last.fm
  ○   Yahoo!
  ○   Android Forums
  ○   Billabong
  ○   Formspring
  ○   nVidia
  ○   Gamigo
  ○   ...List goes on...
● Thousands of sites attacked daily.

● Incredibly easy to get going.

● Loads of guides and tools on the internet.

● Devastating for the vulnerable organizations.
LIVE DEMO!
(This is the time we'll stand here and struggle with the equipment.)
Fun with WLAN
● Create an evil twin
● Jasager
Evil twin
● You connect to eg. "espresso house free"
● iPhone will save and remember that network
● When you come back it will automatically
  connect
Evil twin
● Someone creates a network called
  "espresso house free"
● Your phone will automatically connect
What if the attacker don't know which
networks you've been connected to?
Hyper Island - 2012
Jasager
Fun with WLAN
● Works on everything
  ○ Windows, linux, Mac, Android, iPhone etc
● Can be monitored
  ○ See which networks you are looking for and in which
    order
Fun with WLAN
WiGLE.net
IT-Security @ Home
● Devices on local networks.
  ○   Routers
  ○   Printers
  ○   Heat Pumps
  ○   Laptops
  ○   PC's
  ○   Tablets
  ○   Cellphones
  ○   XBOX'es
  ○   ...etc...
Telecom operator ComHem provide "Tre-hål-i-väggen"
● Routers may act as switches

● IP Forwarding

● You can see your neighbours devices
Hyper Island - 2012
● Portscan!

● A port scanner finds open services on IP-
  addresses.

● nmap
Hyper Island - 2012
● Find vulnerability
  or
● Weak (default) password
  or
● No password!


  Protip:
  http://www.routerpasswords.com/
GAME OVER
Conclusion
You can with ease gain access to your
neighbours data.
Speaking of portscanning...
● Spring 2010, the "spoon" project.

● Got interested in packet crafting.

● 3000 packets/second
● Sweden got 25.000.000 allocated IPv4-addresses.

● ...Results in a timeframe of 2 hours and 20 min to scan.

● Resolve all servers on a given port in a Sweden.

● Could of course be applied to any country.
● Early 2011, "spoon2".

● 30000 packets/second. Ten times as fast!

● From 2½ hour, to approximate 15 minutes.

● Same result.
● Imagine a company. Like ACME Corp.

● 10 servers running "spoon2".

● Get a fresh map of Sweden every 90 second.

● 100 servers, every 9'th second second.
● ACME Corp got potential to become a global "pingdom".

● Results in large scale data mining.

● Would require loads of clever algorithms and
  infrastructure to maintain it all though.
shodanhq.com
● The firm shodanhq already crawls countries for open
  services.

● Identified ~438.000 web servers in Sweden alone.

● Mostly devices found on local networks.
  (routers / printers).

● No security. Loads of vulnerable devices.
● Eavesdrop your neighbour? No problem.

● Why bother?

● Can be applied to a whole country.
Summary
● Web Scraping
● Quick and Dirty SQL Injections
● iPhones, WiFi and Evil Twins
● Hacking Neighbours
● Port scanning on Steroids
Q&A
     Hack the planet!




http://detectify.com/
References
●   http://www.theta44.org/karma/aawns.pdf

●   http://timtux.net/posts/10-Vad-delar-du-ut-IT-skerhet-i-hemmet

●   http://krebsonsecurity.com/2010/06/wi-fi-street-smarts-iphone-edition/

●   http://nmap.org/6/

●   http://www.ietf.org/rfc/rfc793.txt

●   http://www.ietf.org/rfc/rfc791.txt

●   http://www.ietf.org/rfc/rfc1323.txt

●   http://www.zdnet.com/sql-injection-attacks-up-69-7000001742/

More Related Content

What's hot (14)

PDF
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
PPTX
Dark web
aakshidhingra
 
PDF
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
i_scienceEU
 
PPTX
Hacking its types and the art of exploitation
ShubhamChoudhary171
 
PPTX
Dark net
Mudasser Afzal
 
PDF
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
Jumping Bean
 
PDF
Weaponization of IoT
Jose L. Quiñones-Borrero
 
PDF
Comprehensive guide for compromising network devices.
Sri Manakula Vinayagar Engineering College
 
PDF
The Darknet Emerges
Andrew Delamarter
 
PDF
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
 
PPTX
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar
 
PPTX
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
PPTX
Darknet
innabiii
 
PDF
Darknet
Rafel Ivgi
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Dark web
aakshidhingra
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
i_scienceEU
 
Hacking its types and the art of exploitation
ShubhamChoudhary171
 
Dark net
Mudasser Afzal
 
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
Jumping Bean
 
Weaponization of IoT
Jose L. Quiñones-Borrero
 
Comprehensive guide for compromising network devices.
Sri Manakula Vinayagar Engineering College
 
The Darknet Emerges
Andrew Delamarter
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar
 
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
Darknet
innabiii
 
Darknet
Rafel Ivgi
 

Similar to Hyper Island - 2012 (20)

PDF
Don't Give Credit: Hacking Arcade Machines
Michael Scovetta
 
PDF
IT in 2017
Dhaval Anjaria
 
PPTX
Pen Testing Development
CTruncer
 
ODP
Hit by a Cyberattack: lesson learned
B.A.
 
PPTX
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
Mikal Villa
 
PDF
Internet Of Things: Hands on: YOW! night
Andy Gelme
 
PDF
Security Vulnerabilities: How to Defend Against Them
Martin Vigo
 
PDF
All Aboard The Stateful Train
SmartLogic
 
PDF
On hacking & security
Ange Albertini
 
PDF
What is being exposed from IoT Devices
The Security of Things Forum
 
PDF
IntoWebGL - Unite Melbourne 2015
Ryan Alcock
 
PDF
Python in Industry
Dharmit Shah
 
PDF
An EyeWitness View into your Network
CTruncer
 
PDF
Introduction to Exploitation
UTD Computer Security Group
 
PDF
Cc internet of things @ Thomas More
JWORKS powered by Ordina
 
PDF
IoT Session Thomas More
Kevin Van den Abeele
 
PDF
Crawling and Processing the Italian Corporate Web
Speck&Tech
 
PPTX
The internet of $h1t
Amit Serper
 
PDF
IoT Presentation slides
Muhammadreza Haghiri
 
PDF
IoT Domain Naming and Pain Points
David Fowler
 
Don't Give Credit: Hacking Arcade Machines
Michael Scovetta
 
IT in 2017
Dhaval Anjaria
 
Pen Testing Development
CTruncer
 
Hit by a Cyberattack: lesson learned
B.A.
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
Mikal Villa
 
Internet Of Things: Hands on: YOW! night
Andy Gelme
 
Security Vulnerabilities: How to Defend Against Them
Martin Vigo
 
All Aboard The Stateful Train
SmartLogic
 
On hacking & security
Ange Albertini
 
What is being exposed from IoT Devices
The Security of Things Forum
 
IntoWebGL - Unite Melbourne 2015
Ryan Alcock
 
Python in Industry
Dharmit Shah
 
An EyeWitness View into your Network
CTruncer
 
Introduction to Exploitation
UTD Computer Security Group
 
Cc internet of things @ Thomas More
JWORKS powered by Ordina
 
IoT Session Thomas More
Kevin Van den Abeele
 
Crawling and Processing the Italian Corporate Web
Speck&Tech
 
The internet of $h1t
Amit Serper
 
IoT Presentation slides
Muhammadreza Haghiri
 
IoT Domain Naming and Pain Points
David Fowler
 
Ad

Recently uploaded (20)

PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
The Future of Artificial Intelligence (AI)
Mukul
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Ad

Hyper Island - 2012

  • 1. EVIL DATA MINING FOR FUN AND PROFIT!
  • 2. Contents ● Web Scraping ● Quick and Dirty SQL Injections ● iPhones, WiFi and Evil Twins ● Hacking Neighbours ● Port scanning on Steroids
  • 3. Introduction ● Fredrik Nordberg Almroth (@Almroot) Head application engineer and co-founder @ detectify.com IT-security guy Hacked Google. Twice. ● Johan Edholm (@norrskal) Server administrator and co-founder @ detectify.com Worked with IT security analytics and anti-scraping Studied system and network management in Linux
  • 4. What is Detectify? Detectify is an automated vulnerability scanner.
  • 5. You sign up using beta code.
  • 6. You press start! ● Detectify emulates a hacking attack.
  • 7. You get a report regarding your vulnerabilities.
  • 8. Detectify is currently in closed beta! ● You may try it for free using the beta code: HyperMine ● http://detectify.com/ ● We love feedback! :)
  • 9. What is data mining? ● Data mining is mostly associated with statistics and machine learning. ● ...or discovery of patterns (intelligence) in large datasets... ● No fancy algorithms! Just real life examples.
  • 10. Web scraping ● Grab content from websites ● Host somewhere else ● Study the data ● Sell the data
  • 14. Web scraping ● Bad scrapers ○ Downloadable or online tools ○ Homemade scripts ○ HTTP rewriters
  • 15. Web scraping ● Homemade scripts ○ Made for one site/purpose ○ No hacking ○ May be against ToS ○ Probably legal
  • 16. Web scraping ● Sosseblaskan.se ○ Copy of aftonbladet (rewrite) ○ A joke ○ Not ads for aftonbladet ○ Not phishing ○ Illegal
  • 17. SQL ● Structured Query Language ● Used to talk with databases. MySQL, PostgreSQL, etc...
  • 18. How it's used ● Websites use databases to maintain data. ● The SQL queries often contain user-data. ● You search on a website for a few keywords. ● The odds of it being done by some SQL dialect is huge.
  • 19. What could possibly go wrong? ● User supplied data may alter the SQL query. ● Example: SELECT title FROM blog WHERE title = '$search_keywords'; ● If the searched data contain a quote, the SQL query will break. ● Attackers may gain other data than just the "blog title". ● Usernames, passwords, emails, credit-cards...
  • 21. ● Devastating attack. ● Worst part. It's really common. ● Remember Sony last year?
  • 22. ● Victims 2012. ○ eHarmony ○ last.fm ○ Yahoo! ○ Android Forums ○ Billabong ○ Formspring ○ nVidia ○ Gamigo ○ ...List goes on...
  • 23. ● Thousands of sites attacked daily. ● Incredibly easy to get going. ● Loads of guides and tools on the internet. ● Devastating for the vulnerable organizations.
  • 24. LIVE DEMO! (This is the time we'll stand here and struggle with the equipment.)
  • 25. Fun with WLAN ● Create an evil twin ● Jasager
  • 26. Evil twin ● You connect to eg. "espresso house free" ● iPhone will save and remember that network ● When you come back it will automatically connect
  • 27. Evil twin ● Someone creates a network called "espresso house free" ● Your phone will automatically connect
  • 28. What if the attacker don't know which networks you've been connected to?
  • 31. Fun with WLAN ● Works on everything ○ Windows, linux, Mac, Android, iPhone etc ● Can be monitored ○ See which networks you are looking for and in which order
  • 33. IT-Security @ Home ● Devices on local networks. ○ Routers ○ Printers ○ Heat Pumps ○ Laptops ○ PC's ○ Tablets ○ Cellphones ○ XBOX'es ○ ...etc...
  • 34. Telecom operator ComHem provide "Tre-hål-i-väggen"
  • 35. ● Routers may act as switches ● IP Forwarding ● You can see your neighbours devices
  • 37. ● Portscan! ● A port scanner finds open services on IP- addresses. ● nmap
  • 39. ● Find vulnerability or ● Weak (default) password or ● No password! Protip: http://www.routerpasswords.com/
  • 41. Conclusion You can with ease gain access to your neighbours data.
  • 42. Speaking of portscanning... ● Spring 2010, the "spoon" project. ● Got interested in packet crafting. ● 3000 packets/second
  • 43. ● Sweden got 25.000.000 allocated IPv4-addresses. ● ...Results in a timeframe of 2 hours and 20 min to scan. ● Resolve all servers on a given port in a Sweden. ● Could of course be applied to any country.
  • 44. ● Early 2011, "spoon2". ● 30000 packets/second. Ten times as fast! ● From 2½ hour, to approximate 15 minutes. ● Same result.
  • 45. ● Imagine a company. Like ACME Corp. ● 10 servers running "spoon2". ● Get a fresh map of Sweden every 90 second. ● 100 servers, every 9'th second second.
  • 46. ● ACME Corp got potential to become a global "pingdom". ● Results in large scale data mining. ● Would require loads of clever algorithms and infrastructure to maintain it all though.
  • 47. shodanhq.com ● The firm shodanhq already crawls countries for open services. ● Identified ~438.000 web servers in Sweden alone. ● Mostly devices found on local networks. (routers / printers). ● No security. Loads of vulnerable devices.
  • 48. ● Eavesdrop your neighbour? No problem. ● Why bother? ● Can be applied to a whole country.
  • 49. Summary ● Web Scraping ● Quick and Dirty SQL Injections ● iPhones, WiFi and Evil Twins ● Hacking Neighbours ● Port scanning on Steroids
  • 50. Q&A Hack the planet! http://detectify.com/
  • 51. References ● http://www.theta44.org/karma/aawns.pdf ● http://timtux.net/posts/10-Vad-delar-du-ut-IT-skerhet-i-hemmet ● http://krebsonsecurity.com/2010/06/wi-fi-street-smarts-iphone-edition/ ● http://nmap.org/6/ ● http://www.ietf.org/rfc/rfc793.txt ● http://www.ietf.org/rfc/rfc791.txt ● http://www.ietf.org/rfc/rfc1323.txt ● http://www.zdnet.com/sql-injection-attacks-up-69-7000001742/