Troboard
Team M30W
Outline
- Introduction
- Attack Method
- Demo
Attacker model
- Windows OS
- victim will plug our raspberry pi
- non-super privileged
Goal
- remote control
- desktop sharing
- leak keyboard log
Motivation
- hack classmate's computer
- USB is easy to get
- Poisontap is interesting?
- 127's childhood dream
Fake USB
USB classes
Faking classes -> Faking device
Stage - 1
ssh pi -> keyboard signal -> victim
Victim
Attacker
Generate Payload
Relay Payload
Pi
Problems
- Attacker need to be close by
- Attack does not persist after pi is disconnected
- Victim may notice he's hacked!
Remote Desktop!
-> Inject Trojan
Stage - 2
insert pi -> keyboard signal -> wget trojan
Victim
download
Victim
Server
Client
Connect
Control
Then... We can
- Windows + R -> open powershell
- problem: 中文輸入法 (Shift not works)
- Solution: Ctrl+Space
Simulate What?
However
if network is down
:(
USB Hub
Not only a keyboard,
but also a USB storage!
Use cmd to move our file from USB storage to victim
- easy be detected
Hide it ?
But...
Everyone loves it
However...
OS want to protect system file!
Well...
Creating system files is easy : )
attrib +s +h file_name
What if the victim reboot?
Put our program under /user/.../startup
-> execute as routine startup
Stage - 3
insert pi -> & act as USB & Keyboard ->
Move trojan from USB
Victim
copy
Victim
Server
Client
Connect
Control
RCE again
Demo
Problem of
Hidden Remote Desktop
RCE
Victim
Our Server
Connect
Our server's ip will be exposed to victim!
Large Traffic Detection
Victim
?
Screen
Slow Network Detected
RCE ->
Leak Information
Stage - Extra
Leak Infromation?
Eavesdrop your keyboard & window!
IP Exposure?
Upload to trusted server, like youtube stream
tlk.io!
Victim
tlk.io
send key
Meow
peep key
Trusted Chatting Server!
Demo
Conclusion
Don't plug unknown USB :)
Don't plug untrusted IoT :)
Q&A
deck
By Sunny Xiao
deck
- 863