Hooray for Reading: Hacking the Kindle

As promised here are the slides & the sample code for the kindle ssh thingy.

Update: The magical key required to identify to amazon can be found at:

/var/local/java/prefs/cookies/Cookie__x-fsn_WITH_DOMAIN__amazon.com.cookie

No more browser trickery required :)

slides modified corkscrew.c current jailbreak & usbnet packages windows usb driver

Posted in security, tutorial | 1 Comment

Paper: “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”

Title: Using Traffic Analysis to Identify Tor Usage – A Proposed Study

Authors: John Barker, Peter Hannay, Christopher Bolan

Abstract
Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of attackers is to block or degrade the network itself, discouraging participation and forcing vulnerable users to communicate using less secure means. Since these anonymous networks operate on known protocols and employ strong encryption it is difficult to distinguish them from regular traffic. This paper proposes a method for identifying traffic belonging to anonymous networks by examining their communication patterns. If successful the method would enable the identification of Tor usage and thus allow for more directed attacks and possible user identification.

Files: Full Paper (PDF)

Posted in paper, security | Leave a comment

Paper: “The 2010 IDN Homograph Attack Mitigation Survey”

Title: The 2010 IDN Homograph Attack Mitigation Survey

Authors: Peter Hannay, Christopher Bolan

Abstract
The advent of internationalised domains has introduced a new threat with the non-english character sets allowing visual mimicry of common domain names. Whilst this phenomenon remains well known in the development and internet industry the actual implementations of popular applications have been previously shown to lack successful mitigation strategies and countermeasures. The research found that in the current versions of most internet browsers and email clients, some form of homograph identification or blocking exists. However, some notable and popular applications include either flawed implementations or miss key features and thus allow for IDN based attacks.

Files: Full Paper (PDF)

Posted in paper, security | Leave a comment

Paper: “Geotagging where Cyberspace comes to your Place”

Title: Geotagging where Cyberspace comes to your Place

Authors: Craig Valli, Peter Hannay

Abstract
The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionality for example mobile phones and cameras. The camera in suitably enabled phones takes the picture and embeds GPS co-ordinates of the location into the metadata of the resulting image file. Furthermore there are now online services such as foursquare that are targeted at the geotagging or geocaching community. In addition to this overtly designed service other social online  services such Flickr, Twitter are providing a means of geotagging users. This enablement of technology has significant and profound effects on bpersonal security and also extending into corporate security.

Files: Full Paper (PDF), Slide Show (Powerpoint)

Posted in paper, security | Leave a comment

Paper: “Satellite Navigation Forensics Techniques – Research In Progress”

Title: Satellite Navigation Forensics Techniques – Research In Progress

Authors: Peter Hannay

Abstract
Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation devices have the potential to provide historical location data to investigators. The research in progress investigates the data sources and encoding on a number of common satellite navigation devices. The aim of this research is to develop a framework for the acquisition and analysis of common satellite navigation systems in a way that valid for multiple devices.

Files: Full Paper (PDF)

Posted in forensics, gps, paper | Leave a comment

Paper: “The 2009 Personal Firewall Robustness Evaluation”

Title: The 2009 Personal Firewall Robustness Evaluation

Authors: Ken Pydayya, Peter Hannay, Patryk Szewczyk

Abstract
The evolution of the internet as a platform for commerce, banking, general information and personal communications has resulted in a situation where many individuals who may not have previously required internet access now require this connectivity as part of their everyday lives. In addition to this the widespread adoption of mobile broadband has lead to an increasing number of individuals having public facing IP addresses with no firewall appliances present. This situation has dramatically increased reliance on personal firewalls as the first and often last defence against intruders (human and malware alike). The evaluation performed demonstrates the capabilities of current personal firewall software to mitigate the threat posed by these intruders. The results show that the majority of personal firewall products evaluated are somewhat effective in reducing the risks remote exploitation but leave something to be desired in the area of information disclosure.

Files: Full Paper (PDF)

Posted in paper, security | Leave a comment

Paper: “An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations”

Title: An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations

Authors: Peter Hannay, Christopher Bolan

Abstract
With the advent of internationalised domains the threat posed by non-english character sets has eventuated. Whilst this phenomenon remains well known in the development and internet industry the actual implementations of popular applications have been tested to determine their resilience to homograph based attack. The research found that most provided features that overcome such attacks, but there remain a few notable exceptions. Should an attacker take advantage of such oversights a victim would likely not be able to spot a fraudulent site or email and thus provide a perfect platform for subsequent attack.

Files: Full Paper (PDF)

Posted in paper, security | Leave a comment

Paper: “Freegate: A Defence against the Pending Censorship of Australia?”

Title: Freegate: A Defence against the Pending Censorship of Australia?

Authors: Christopher Bolan, Peter Hannay

Abstract
The commencement of a trial of Internet Service Provider (ISP) level content filtering as a precursor to nation wide mandatory content filters in Australia has generated a large amount of publicity. Despite remaining low on details, figures released show that the laboratory testing of the filtering solutions caused significant slow down in Internet speeds as well as the unintentional censorship of allowable content. This paper investigates the currently available information on the trials and provides evidence that a freely available privacy tool such as Freegate could be used to bypass all of the likely filtering methods.

Files: Full Paper (PDF)

Posted in paper, security | Leave a comment

Paper: “Firewire Forensics in Modern Operating Systems”

Title: Firewire Forensics in Modern Operating Systems

Authors: Peter Hannay, Andrew Woodward

Abstract
This research looked at whether the FireWire direct memory access function tool would work with three modern Windows operating systems. The tool requires local access to the PC and allows the logon to be bypassed, and also allows for memory dumping to be performed on the target computer. It was found that Windows XP allowed for full access and memory dumping, while Windows Vista and Windows 7 allowed for memory dumping only. The inability to unlock the two newer operating systems appears to be a product of a change in memory location of the target data, rather than a fix. This has implications for digital forensics in that keys to some encryption programs can be found in memory.

Files: Full Paper (PDF)

Posted in Uncategorized | Leave a comment

Paper: “Fun & Games: an Introduction to Console Forensics”

Title: Fun & Games: an Introduction to Console Forensics

Authors: Peter Hannay

Abstract
The scope of functionality provided by video game consoles has been consistently expanding to encompass features that were once limited to general purpose personal computers. This expansion poses a unique and interesting problem for those conducting digital forensic investigations as many of these consoles are resistant to traditional forensic acquisition and analysis techniques. In this paper we explore these issues and some possible solutions in an introduction fashion.

Files: Full Paper (PDF)

Posted in forensics, paper | Leave a comment