72001 Posted March 27, 2012 Share Posted March 27, 2012 I will be the first to admit that security is an illusion. I have taken what I consider to be the first steps to a truly secure solution https://net7ntcip.codeplex.com/discussions/350190 Please review the security discussion and adapt to your free will. Also please provide input to the above discussion or here on this forum so that I may keep the record in tact. Link to comment Share on other sites More sharing options...
72001 Posted April 28, 2012 Author Share Posted April 28, 2012 And the relevance of this being the first step is implied as follows but is not limited therein to: By bridging the gap between hackers and professionals. With the protocols freely available the Network Administrators of the world will indeed have to step up and ensure that VPN's are more secure then they have been previously and that they utilize the utmost care in their routing techniques. With the advent of GPU computing in tandem with the aptly available processor complex algorithms and advanced match is just a few lines of code away from solving in most cases. Only after the routing and communications layers are secure we can then possibly remove or replace lower levels such as Trunks however this will be at a much later point in the future. With software protocols such as this the activists will then focus on actual hardware attacks locally or in addition to local attacks they will focus on gaining entry to the VPN's in which the devices reside. This would be accomplished easily with a local attack and the theft of a modem attached to the device however if the modem is integrated and or additionally a GPS unit is integrated the activist exposes himself to serious risk for acquiring the device in such a manner. A much more reliable approach would be scanning of the radio frequencies and using DSP to decode the wave signals into meaning information which can then be used to gain entry to the network securely and without hassle. I personally would start with analog equipment and then utilize computers with digital equipment as an additional platform for comparing the analog data to. Using this method I would be able to determine what genuine noise looked like in the digital communication which is corrected by hardware whereas on analog signals the wave is perceived as distorted. The activist may need to ensure he has logged certain portions of the communications including the initial connection procedure, graceful and forceful logoff as well as a large amount of normal data transfer depening on cipher depth and hardware specifications utilized by the device and the ISP for encrypting the communication. This can be achieved with the use of EMP's or a feedback created on the frequency the device is using by modulating is various spectrum's on the same frequency to cause the device's watchdog to enter a error state and perform a reset to ensure calibration is correct. It is during this time you will be able to access parts of the memory of the device in which would normally be protected, it is even a good time if you have local access to perform a memory dump and get just about anything you require from the device such as the keys in question inter alia. One several conversations were logged between the device and the central ISP it would be very easy to connect to the same resources assuming the identity of the device in question by copying it's MAC and IP among other parts of the conversation in which makes the device able to negotiate connection with the ISP. I personally would write software which would prepare, route and receive the requests to ensure that there is always several layers multiplied by the number of stacks the packets are traversing to ensure the onion style transportation is serving a purpose of hiding my identity and not keeping my data contained in my packets secure. Once connected I would ensure I would be able to connect by allowing a custom MAC through the VPN with Admin Access on all local and remote resources. This login would be utilized by myself in the future to ensure that I would be able to create new loginz and then if compromised return from the state in which was fixed by the owners. I would then erase just about all activity which has lead to this point. It would take a significant amount of time to ensure this was done properly as you are always leaving new evidence by destroying older evidence. After all had been achieved I would then create a new login from which I would create several others and modify the logs to ensure they pointed to a internal user with a bad disciplinary record. I would again perform the steps of cleansing the logs and wait some time before proceeding with any malicious intent. After the watching phase was complete and I had gained even more self confidence from being a spying little prick I would then proceed to write some virii and spread it among the internal network to ensure that it was unable to be found. Good hiding places consist of ROM, EEPROM, Firmware and other known locations such as but not limited to the MBR. After which point I would rinse, wash and repeat the process of cleansing the logs. In some more time I would then ensure my virii was bug free by utilizing the bot network or slave network which was essentially created to solve problems in physics and math. I would leave genetics and medicine alone because I was not getting paid after all. After playing personal investigator on just about everyone I was able to successfully identify on the network I would then persist the process of destroying the network from the inside out using the identities of the individuals in which I deemed were corrupt. I would provide a sum of money to the person who I originally had utilized as the 'scape-goat' in the entry process and I would then send all logged forms of communication on the corrupt to a form of escrow in which I knew I would be sure if anything ever happened to me I would not be held accountable for the release of. Last but not least I would probably send a note to the various hardware and software manufactures I in which I had to break hardware and software routines to gain access to and I would alert them to the problems contained within their products and force them (nicely) to fix them. If this seems rather scary then I suggest we all utilize our heads to ensure we are providing logic in our software, hardware and personal lives which ensures us and our loved ones are genuinely safe. In my day I have seen recalls on faulty Toyota Accelerator's, just when you thought you had seen everything there seems to always be something else which will just seem to blind you and distort your judgement. Anyway now that I feel I have went off on a tangent I will gracefully bow out and ask for your humble opinions. -v// Link to comment Share on other sites More sharing options...
Recommended Posts