SlideShare a Scribd company logo
1 of 47
Download to read offline
SHATTERING THE DARK
CODE BLUE 2019, BLUEBOX 4
TEXT
WHO WE ARE
▸ Ken-ya YOSHIMURA (@ad3liae)
▸ Takahiro YOSHIMURA (@alterakey)
▸ Security researchers
▸ Monolith Works Inc. CEO/CTO
https://moonlithworks.co.jp/
TEXT
WHAT WE DO
▸ Security research and development
▸ iOS/Android Apps
→Financial, Games, IoT related, etc. (>200)
→trueseeing: Non-decompiling Android Application Vulnerability Scanner
[2017]
▸ Windows/Mac/Web/HTML5 Apps
→POS, RAD tools etc.
▸ Network/Web penetration testing
→PCI-DSS etc.
▸ Search engine reconnaissance
(aka. Google Hacking)
▸ Whitebox testing
▸ Forensic analysis
▸ Research
→Clairvoyance: concurrent lip reader [2019]
TEXT
WHAT WE DO
▸ CTF
▸ Enemy10, Sutegoma2
▸ METI CTFCJ 2012 Qual.: 1st
▸ METI CTFCJ 2012: 3rd
▸ DEF CON 21 CTF: 6th
▸ DEF CON 22 OpenCTF: 4th
▸ Talks:
DEF CON 25 Demo Labs
CODE BLUE 2017
DEF CON 27 AI Village etc.
DEFCON 2016 by Wiyre Media on flickr, CC-BY 2.0
TEXT
RELATED WORKS
▸ Web application vulnerability scanners
▸ Manual: Burp Suite, ZAP etc.
▸ Automatic: WebInspect etc.
TEXT
WHAT IS THE DARK WEB?
▸ Anonymized Web on (mostly) Tor
▸ Pure freedom and anarchism
▸ Hard-ish to identify users
→ CAPTCHAs are often deployed
▸ Traffic routes are randomized
→ Rather high TTLs
Onions by Mike Mozart on flickr, CC-BY 2.0
JOKER’S STASH
CASE STUDY #1
TEXT
JOKER’S STASH
▸ Fake credit card market?
TEXT
PREPARATION - TRADITIONAL
▸ Manual
▸ Crawl and build data flows:
Tedious, error-prone, and not repeatable
▸ Automatic
▸ Spider:
Not so comprehensive — insufficient
coverages
TEXT
SHATTER: THE IN-BETWEEN BEAUTY
▸ Our answer: Shatter
▸ Semi-automatic
▸ Repeatable
▸ Comprehensive
Shattering by chiaralily on flickr, CC-BY-NC 2.0
TEXT
PREPARATION - SHATTER
▸ Manually crawl, mark, and map
→ “Target maps”
▸ Edit target maps and go
▸ Target maps describe scans
▸ Marked requests will be recognized as
“targets”
▸ Data flows are mostly automatically deduced
— thus semi-automatic
▸ Same map gives same scan — repeatable
Planning by Jeremy Keith on flickr, CC-BY 2.0
TEXT
SHATTER TARGET MAP
▸ Are terse and readable YAMLs
▸ Comprised of:
▸ Analysises: What should we do
▸ Sessions: How should we do
▸ Identities: Who should we are
▸ Targets: Whom we approach to
▸ Flows: How we deduce parameters (opt.)
▸ Exploits: What we should do on findings
TEXT
ATTACK PLAN / EXECUTE
▸ Data flow map
▸ Flows are wholly deduced
▸ Massive parallel scan
→combats high TTLs
▸ Scanner is ZAP-compatible
(for now)
DEMO 1
AUTOMATIC
EXPLOITATION ATTEMPTS
TEXT
AFTERMATH
▸ Insanely old middleware
→Automatic exploitation attempt gave 500
▸ Operator identity:
“Evgenij Sokolov”,
“Bertrand Rasse”, possibly etc.
omerta.sup@gmail.com
▸ Operator works:
http://omerta.wf/ etc.
▸ cf. omerta (n)
1: a code of silence practiced by the Mafia; a refusal
to give evidence to the police about criminal activities
THE NIGHTMARE
CASE STUDY #2
TEXT
NIGHTMARE
▸ Black market
▸ Afterwork of Dream Market?
TEXT
PREPARATION - TRADITIONAL
▸ CAPTCHA
▸ Potential showstopper
TEXT
PREPARATION - SHATTER
▸ CAPTCHA
▸ Parameters can be deduced with code-
blocks
→ NN-based solvers can be attached!
CAPTCHA 102
▸ Recognizing glyphs in an image
▸ Hard to solve algorithmically
▸ 3-dimensional distortion
▸ Noise
LEARN TO RECOGNIZE
▸ Image classification problem
▸ CNN
Convolutional Neural Networks
▸ Supervised learning model
▸ Similar to visual cortex
▸ Good at spatial pattern recog.
▸ Robust against distortions and shifts
Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
LEARN TO RECOGNIZE
▸ For 5-chars:
(10+26)5 → 107∼ patterns
▸ Cannot be solved at once
▸ Just classifiers
Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
DIVIDE AND CONQUER
▸ OpenCV2
▸ De-speckling
▸ Extracting glyphs
▸ Errors due to lack of spacing
→ignoring for now
BREACH PLAN
▸ OpenCV2
▸ Glyph extraction
▸ CNN
▸ Glyph classfication
Chess Teacher by JB Kilpatrick on flickr, CC-BY 2.0
BREACH PLAN?
▸ What should we learn?
▸ Synthesized with generators
(tag=parameters)
▸ Gathered truths
(tag=pre-coordinated truths)
Question by Florence Ivy on flickr, CC-BY-ND 2.0
HUMANS TO SAVE US
▸ Anti-Captcha
▸ CAPTCHA recognition service run by
humans
▸ Gathered images and tags
→Now we can learn
▸ Human powered…? but:
▸ Tedious to recon generators
▸ Of course Shatter can use AC directly
GRAB THEM OUT
▸ Let’s gather CAPTCHAs
▸ We need ~2000
▸ High RTT!
(2~sec..)
Grab by Rutger Tuller on flickr, CC-BY 2.0
GRAB THEM OUT!
▸ asyncio super-parallel grabber
→No mercy
▸ 2000 imgs / ~48s
(24ms/img)
▸ Throughputs are not so bad
READ THEM OUT
▸ Read 2000 CAPTCHAs
▸ Out-of-charset reads
▸ Inaccurate glyph extracts
▸ Take only good reads!
DIVIDE AND CONQUER
▸ OpenCV2
▸ Shrink, despeckle, expand
▸ Glyph extraction
DIVIDE AND CONQUER
▸ Samples: 6305
▸ Should be around 10000… but
▸ Dropping glyph mis-extractions
▸ Dropping CAPTCHA mis-reads
RELENTLESS LEARNER
▸ CNN on Keras
▸ N×32x32x1 → 36 ([A-Z0-9])
▸ Preprocessing
▸ resize and thresholding
▸ Normalization: [0.0f .. 1.0f]
RELENTLESS LEARNER
▸ Keeping effective learning
▸ Small input: 32x32×1
▸ amsgrad (i.e. modified Adam)
▸ Test dataset
▸ 10% of original dataset
▸ Store the model in HDF5 format
→to continuous learning
LEARN TO BREAK
▸ 50 epochs → 30min.
Tensorflow 2.0 @ MBP 2017
▸ GPU?
▸ Keras uses automatically
▸ Only CUDA — MBP falls short :(
Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
LEARN TO BREAK!
▸ 99% acc. (even in other datasets)
→Excellent
▸ Recognizes even Anti-Captcha fails
▸ CNN: should need 500..1000/cls
▸ 175.1/cls in reality
▸ Small dataset :(
Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
CAPTCHA COMPROMISED
▸ Rarely misses for another dataset
PREPARATION - SHATTER (2)
▸ Attach to target map as a code block
▸ Feed the solver, return the result into the
parameter
TEXT
ATTACK PLAN / EXECUTE
▸ Data flow map
▸ CAPTCHAs are solved in realtime
DEMO 2
AUTOMATED SCAN,
SOLVING MULTIPLE CAPTCHAS
TEXT
AFTERMATH (2)
▸ We have breached CAPTCHA protection for
Nightmare
(again)
▸ Their CAPTCHAs are rather weak
(again)
No lock 2 by Jens Eilers Bischoff on flickr, CC-BY 2.0
TEXT
FREE AS FREEDOM
▸ http://sha.tter.io/
(GitHub repos will be announced there)
▸ AGPL-3: It remains free for good
▸ Currently under heavy workings on fixes and ..
▸ We are striving to make it not only useful but
also essential
Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ The dark web
▸ Anonymized Web
▸ Hard to name attackers
▸ CAPTCHAs are often deployed but _not_
effective!
▸ Related works are not sufficient
▸ Automatic: non-comprehensive
▸ Manual: non-repeatable
IMG_2988s by 不憂照相館 on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ Our answer: Shatter
▸ Semi-automatic
Crawl, mark, map, edit — you do
Scan — we do
▸ Repeatable
Same map gives the same scan
▸ Comprehensive
Because you crawl
▸ Beauty lies in “semi-autonomy”
Shattering by chiaralily on flickr, CC-BY-NC 2.0
TEXT
CONCLUSION
▸ Shatter can…
▸ Deduce params automatically, or with some
code
(solving CAPTCHAs, 2FAs, …)
▸ Fingerprint and stage attacks
▸ Actively exploit vulnerabilities
▸ Cooperate with other toolchains to deeper
analysis/exploitation
Mise en scène nocturne by Jean-François Renaud on flickr, CC-BY-ND 2.0
TEXT
CONCLUSION
▸ Shatter is
▸ At: http://sha.tter.io/
(GitHub repos will be announced there)
▸ Under AGPL-3: Free as freedom, for good
▸ Stay tuned!
▸ Under heavy workings on fixes and ..
▸ Should be available at 12/24/2019
Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
TEXT
CONCLUSION
▸ For hidden service operators:
▸ CAPTCHAs are not effective
▸ Better update your stack
▸ If you do bad things, you must be prepared
to be exposed
Menace by Kilworth Simmonds on flickr, CC-BY-ND 2.0
FIN.
28.10.2019 MONOLITH WORKS INC.

More Related Content

Similar to [CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura

[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
CODE BLUE
 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)
packetloop
 
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Maksim Shudrak
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
Dan Kaminsky
 

Similar to [CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura (20)

Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
BSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs BlueBSides Iowa 2018: Windows COM: Red vs Blue
BSides Iowa 2018: Windows COM: Red vs Blue
 
Us 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimesUs 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimes
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Total E(A)gression defcon
Total E(A)gression   defconTotal E(A)gression   defcon
Total E(A)gression defcon
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
 
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosCar Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface Scenarios
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)
 
Columbus WordCamp 2015
Columbus WordCamp 2015Columbus WordCamp 2015
Columbus WordCamp 2015
 
stackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure driftstackconf 2021 | Why you should take care of infrastructure drift
stackconf 2021 | Why you should take care of infrastructure drift
 
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki WattJourneys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
 
Sneaky computation
Sneaky computationSneaky computation
Sneaky computation
 
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
Tricky sample? Hack it easy! Applying dynamic binary inastrumentation to ligh...
 
How We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating SystemHow We Learned To Love The Data Center Operating System
How We Learned To Love The Data Center Operating System
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
 
Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
Aggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with AutomationAggressive Autonomous Actions - Operating with Automation
Aggressive Autonomous Actions - Operating with Automation
 

More from CODE BLUE

[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 

Recently uploaded (17)

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 

[CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura

  • 1. SHATTERING THE DARK CODE BLUE 2019, BLUEBOX 4
  • 2. TEXT WHO WE ARE ▸ Ken-ya YOSHIMURA (@ad3liae) ▸ Takahiro YOSHIMURA (@alterakey) ▸ Security researchers ▸ Monolith Works Inc. CEO/CTO https://moonlithworks.co.jp/
  • 3. TEXT WHAT WE DO ▸ Security research and development ▸ iOS/Android Apps →Financial, Games, IoT related, etc. (>200) →trueseeing: Non-decompiling Android Application Vulnerability Scanner [2017] ▸ Windows/Mac/Web/HTML5 Apps →POS, RAD tools etc. ▸ Network/Web penetration testing →PCI-DSS etc. ▸ Search engine reconnaissance (aka. Google Hacking) ▸ Whitebox testing ▸ Forensic analysis ▸ Research →Clairvoyance: concurrent lip reader [2019]
  • 4. TEXT WHAT WE DO ▸ CTF ▸ Enemy10, Sutegoma2 ▸ METI CTFCJ 2012 Qual.: 1st ▸ METI CTFCJ 2012: 3rd ▸ DEF CON 21 CTF: 6th ▸ DEF CON 22 OpenCTF: 4th ▸ Talks: DEF CON 25 Demo Labs CODE BLUE 2017 DEF CON 27 AI Village etc. DEFCON 2016 by Wiyre Media on flickr, CC-BY 2.0
  • 5. TEXT RELATED WORKS ▸ Web application vulnerability scanners ▸ Manual: Burp Suite, ZAP etc. ▸ Automatic: WebInspect etc.
  • 6. TEXT WHAT IS THE DARK WEB? ▸ Anonymized Web on (mostly) Tor ▸ Pure freedom and anarchism ▸ Hard-ish to identify users → CAPTCHAs are often deployed ▸ Traffic routes are randomized → Rather high TTLs Onions by Mike Mozart on flickr, CC-BY 2.0
  • 8. TEXT JOKER’S STASH ▸ Fake credit card market?
  • 9. TEXT PREPARATION - TRADITIONAL ▸ Manual ▸ Crawl and build data flows: Tedious, error-prone, and not repeatable ▸ Automatic ▸ Spider: Not so comprehensive — insufficient coverages
  • 10. TEXT SHATTER: THE IN-BETWEEN BEAUTY ▸ Our answer: Shatter ▸ Semi-automatic ▸ Repeatable ▸ Comprehensive Shattering by chiaralily on flickr, CC-BY-NC 2.0
  • 11. TEXT PREPARATION - SHATTER ▸ Manually crawl, mark, and map → “Target maps” ▸ Edit target maps and go ▸ Target maps describe scans ▸ Marked requests will be recognized as “targets” ▸ Data flows are mostly automatically deduced — thus semi-automatic ▸ Same map gives same scan — repeatable Planning by Jeremy Keith on flickr, CC-BY 2.0
  • 12. TEXT SHATTER TARGET MAP ▸ Are terse and readable YAMLs ▸ Comprised of: ▸ Analysises: What should we do ▸ Sessions: How should we do ▸ Identities: Who should we are ▸ Targets: Whom we approach to ▸ Flows: How we deduce parameters (opt.) ▸ Exploits: What we should do on findings
  • 13. TEXT ATTACK PLAN / EXECUTE ▸ Data flow map ▸ Flows are wholly deduced ▸ Massive parallel scan →combats high TTLs ▸ Scanner is ZAP-compatible (for now)
  • 15. TEXT AFTERMATH ▸ Insanely old middleware →Automatic exploitation attempt gave 500 ▸ Operator identity: “Evgenij Sokolov”, “Bertrand Rasse”, possibly etc. omerta.sup@gmail.com ▸ Operator works: http://omerta.wf/ etc. ▸ cf. omerta (n) 1: a code of silence practiced by the Mafia; a refusal to give evidence to the police about criminal activities
  • 17. TEXT NIGHTMARE ▸ Black market ▸ Afterwork of Dream Market?
  • 18. TEXT PREPARATION - TRADITIONAL ▸ CAPTCHA ▸ Potential showstopper
  • 19. TEXT PREPARATION - SHATTER ▸ CAPTCHA ▸ Parameters can be deduced with code- blocks → NN-based solvers can be attached!
  • 20. CAPTCHA 102 ▸ Recognizing glyphs in an image ▸ Hard to solve algorithmically ▸ 3-dimensional distortion ▸ Noise
  • 21. LEARN TO RECOGNIZE ▸ Image classification problem ▸ CNN Convolutional Neural Networks ▸ Supervised learning model ▸ Similar to visual cortex ▸ Good at spatial pattern recog. ▸ Robust against distortions and shifts Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
  • 22. LEARN TO RECOGNIZE ▸ For 5-chars: (10+26)5 → 107∼ patterns ▸ Cannot be solved at once ▸ Just classifiers Typical CNN architecture by Aphex34 on Wikipedia, CC-BY-SA 4.0
  • 23. DIVIDE AND CONQUER ▸ OpenCV2 ▸ De-speckling ▸ Extracting glyphs ▸ Errors due to lack of spacing →ignoring for now
  • 24. BREACH PLAN ▸ OpenCV2 ▸ Glyph extraction ▸ CNN ▸ Glyph classfication Chess Teacher by JB Kilpatrick on flickr, CC-BY 2.0
  • 25. BREACH PLAN? ▸ What should we learn? ▸ Synthesized with generators (tag=parameters) ▸ Gathered truths (tag=pre-coordinated truths) Question by Florence Ivy on flickr, CC-BY-ND 2.0
  • 26. HUMANS TO SAVE US ▸ Anti-Captcha ▸ CAPTCHA recognition service run by humans ▸ Gathered images and tags →Now we can learn ▸ Human powered…? but: ▸ Tedious to recon generators ▸ Of course Shatter can use AC directly
  • 27. GRAB THEM OUT ▸ Let’s gather CAPTCHAs ▸ We need ~2000 ▸ High RTT! (2~sec..) Grab by Rutger Tuller on flickr, CC-BY 2.0
  • 28. GRAB THEM OUT! ▸ asyncio super-parallel grabber →No mercy ▸ 2000 imgs / ~48s (24ms/img) ▸ Throughputs are not so bad
  • 29. READ THEM OUT ▸ Read 2000 CAPTCHAs ▸ Out-of-charset reads ▸ Inaccurate glyph extracts ▸ Take only good reads!
  • 30. DIVIDE AND CONQUER ▸ OpenCV2 ▸ Shrink, despeckle, expand ▸ Glyph extraction
  • 31. DIVIDE AND CONQUER ▸ Samples: 6305 ▸ Should be around 10000… but ▸ Dropping glyph mis-extractions ▸ Dropping CAPTCHA mis-reads
  • 32. RELENTLESS LEARNER ▸ CNN on Keras ▸ N×32x32x1 → 36 ([A-Z0-9]) ▸ Preprocessing ▸ resize and thresholding ▸ Normalization: [0.0f .. 1.0f]
  • 33. RELENTLESS LEARNER ▸ Keeping effective learning ▸ Small input: 32x32×1 ▸ amsgrad (i.e. modified Adam) ▸ Test dataset ▸ 10% of original dataset ▸ Store the model in HDF5 format →to continuous learning
  • 34. LEARN TO BREAK ▸ 50 epochs → 30min. Tensorflow 2.0 @ MBP 2017 ▸ GPU? ▸ Keras uses automatically ▸ Only CUDA — MBP falls short :( Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
  • 35. LEARN TO BREAK! ▸ 99% acc. (even in other datasets) →Excellent ▸ Recognizes even Anti-Captcha fails ▸ CNN: should need 500..1000/cls ▸ 175.1/cls in reality ▸ Small dataset :( Early Learner by Aaron Freimark on flickr, CC-BY-ND 2.0
  • 36. CAPTCHA COMPROMISED ▸ Rarely misses for another dataset
  • 37. PREPARATION - SHATTER (2) ▸ Attach to target map as a code block ▸ Feed the solver, return the result into the parameter
  • 38. TEXT ATTACK PLAN / EXECUTE ▸ Data flow map ▸ CAPTCHAs are solved in realtime
  • 39. DEMO 2 AUTOMATED SCAN, SOLVING MULTIPLE CAPTCHAS
  • 40. TEXT AFTERMATH (2) ▸ We have breached CAPTCHA protection for Nightmare (again) ▸ Their CAPTCHAs are rather weak (again) No lock 2 by Jens Eilers Bischoff on flickr, CC-BY 2.0
  • 41. TEXT FREE AS FREEDOM ▸ http://sha.tter.io/ (GitHub repos will be announced there) ▸ AGPL-3: It remains free for good ▸ Currently under heavy workings on fixes and .. ▸ We are striving to make it not only useful but also essential Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
  • 42. TEXT CONCLUSION ▸ The dark web ▸ Anonymized Web ▸ Hard to name attackers ▸ CAPTCHAs are often deployed but _not_ effective! ▸ Related works are not sufficient ▸ Automatic: non-comprehensive ▸ Manual: non-repeatable IMG_2988s by 不憂照相館 on flickr, CC-BY-NC-ND 2.0
  • 43. TEXT CONCLUSION ▸ Our answer: Shatter ▸ Semi-automatic Crawl, mark, map, edit — you do Scan — we do ▸ Repeatable Same map gives the same scan ▸ Comprehensive Because you crawl ▸ Beauty lies in “semi-autonomy” Shattering by chiaralily on flickr, CC-BY-NC 2.0
  • 44. TEXT CONCLUSION ▸ Shatter can… ▸ Deduce params automatically, or with some code (solving CAPTCHAs, 2FAs, …) ▸ Fingerprint and stage attacks ▸ Actively exploit vulnerabilities ▸ Cooperate with other toolchains to deeper analysis/exploitation Mise en scène nocturne by Jean-François Renaud on flickr, CC-BY-ND 2.0
  • 45. TEXT CONCLUSION ▸ Shatter is ▸ At: http://sha.tter.io/ (GitHub repos will be announced there) ▸ Under AGPL-3: Free as freedom, for good ▸ Stay tuned! ▸ Under heavy workings on fixes and .. ▸ Should be available at 12/24/2019 Freedom by Mochamad Arief on flickr, CC-BY-NC-ND 2.0
  • 46. TEXT CONCLUSION ▸ For hidden service operators: ▸ CAPTCHAs are not effective ▸ Better update your stack ▸ If you do bad things, you must be prepared to be exposed Menace by Kilworth Simmonds on flickr, CC-BY-ND 2.0