
The battle with the robot, the dangers of social networks and hacked WiFi: how was NeoQUEST-2015

- report descriptions
- Presentations of reports:
- “Learn in 60 seconds”
- “Detecting malware using ... an oscilloscope?”
- “Evil Maid”
- “Quick search of slow hashes on the GPU”
- “Visual pentesting”
- “TPM.TXT: let's try to hack!”
- “Crazy Car: we control the electronics of the car via the CAN bus” - bright photos of positive guests of NeoQUEST
- 3 lecture videos
About how the guests of NeoQUEST had fun in between reports, and why there were only 3 videos with reports - we read under the cut!
What was it about
For the hackquest participants, the competition began at 10:00, the guests could sleep longer - the main event started at 11. Of course, not all of the guests gathered were ready to have fun from the very early morning ... But our permanent host Dmitry Kuzenyatkin helped them wake up and smile, who on this day, in accordance with the legend of NeoQUEST-2015, he was dressed in a mysterious costume and joked about jokes about Masons (and this was exactly the theme of NeoQUEST!). In addition, he did an amazing beatbox, played a mysterious musical instrument and read poetry of his own composition!

The event opened the report "Android: the game for infection"dedicated to the security of the platform of the same name. The report examined the features of the distribution of malicious software for the Android platform, as well as a brief overview of how to install malware into the system.
"Learn in 60 seconds"
Immediately after it, the report “ Learn in 60 Seconds ” was presented , which caused considerable interest among the audience. What if we want to draw up a car dossier for someone? Naturally, search the Internet. However, you also need to google wisely ... The speaker not only told how to do this, but also showed how the software that collects user data works! In addition, in the video recording of the report there are answers to very important questions: why is mail the basis of the basics, why give money to the Chinese (well, schoolchildren), and how to use social networks and the WiFi list to find out where the girl you like lives and how to make a guaranteed pleasant impression her parents?
"Detecting malware with ... an oscilloscope?"
In the report “ Detecting malware with ... an oscilloscope? "It was told about the well-known attack vectors using software modifications to the firmware of the equipment, the most well-known incidents testifying to the possibility of their application in practice were examined. The speaker proposed a curious approach to detecting bookmarks in the firmware of equipment, based on the analysis of the device’s power consumption. In the demonstration - alas, left behind the scenes - the speaker, using an oscilloscope, analyzed the operations performed by the device and showed how to identify anomalies in power consumption!

"Evil Maid"
The Evil Maid report was dedicated to the security features of full disk encryption systems. Full drive encryption and operating system technologies are rapidly gaining in popularity. However, often the use of BitLocker, LUKS or TrueCrypt can be a mandatory requirement when working with confidential data. How can the security of such systems be compromised and how to protect against this? The speaker talked about why BitLocker should be used, and showed how to collect passwords:
- for a system without TPM
- for system booting from BIOS
- for a system loading from UEFI
"Quick enumeration of slow hashes on the GPU"
The report “ Quick search of slow hashes on the GPU ” posed two tasks: iterate over the password hash from the PDF document and, much more interesting, iterate over the password hash from the Bitcoin wallet. It was told about modern frameworks for heterogeneous computing, described the strengths and weaknesses of the GPU. The speaker demonstrated how and for how long the program developed by him can sort out hashes, and told what optimizations he used when writing the program.
"Visual pentesting"
The report “Clear pentesting” was devoted to the problem of evaluating penetration testing results: what to do if there are a lot of scanners, each of them has its own report format, a large amount of disparate scanning results, and it is completely unclear how to identify the relationships between entities? The speakers talked about the technologies they used to develop the system of ontological analysis and visualization of pentest data (graph databases, SPARQL, SWRL, and much more ...) and demonstrated how to work with such a system.

“TPM.TXT: try to hack!”
The longest report “ TPM.TXT: try to hack! "Is an immersion in the world of hardware virtualization and Intel TXT and TPM technologies. We remind you that in the framework of NeoQUEST-2014 there was a report on TPM technology, and this year the speaker paid much attention to TXT technology, non-trivial tboot configuration, attacks on Intel TXT and TPM. There was time for practical experiments on modifying the Linux kernel!
“Crazy Car: we control the electronics of the car via the CAN bus”
Final report “ Crazy Car: we control the electronics of the car via the CAN bus". At NeoQUEST-2014, this report, then even more theoretical, made a rather strong impression on the audience, which is why at NeoQUEST-2015 the speaker paid more attention to the hardware and software part. Namely: the main characteristics of the CAN protocol, the message structure and the levels of protocol abstraction were considered. It is worth noting that in various versions of the protocol there is no support for protection functions, which is a tidbit for an attacker ... Using the Volkswagen Passat B6 as an example, the speaker showed how, with the help of Arduino, he managed to influence the car, which “electronic parts” of the car were under his control and what are the possible scenarios of attacks on a man who has got into a "crazy car". By the way, the “experimental” stood all day in the parking lot near the venue NeoQUEST, and anyone could experience for themselves,
Contests. What is wrong with WiFi?
Throughout the day, the JetBusinessStream team provided high-quality online broadcasting and recording of reports. However ... What is a cyber security event without hacking? There was no competition for hacking WiFi, but enterprising guys are able to organize a competition for themselves! The crazy hands of one of our guests reached all three WiFi networks of the Club House CDC (where NeoQUEST-2015 was held) and ... hacked them! Of course, then the sudden hacker corrected everything, but alas, the broadcast could not be saved, and most of the video sank into oblivion ...

By the way, in addition to hacking WiFi, the participants had something to do: someone fought with a virtual robot, someone sunbathed on an open roof terrace, and someone stoically passed the "Unified State Examination", otherwise called Twitter ConQuiz - a quiz contest, where the player who has completed the most tasks receives a prize! Every hour, tasks were published on Twitter NeoQUEST, this year they were devoted to non-trivial methods of communication, namely, prison and semaphore alphabet, brute force, encryption and an alternative keyboard layout. However, for the first time in 3 years there was no clear winner! I had to decide the question of who will get the main prize in the old fashioned way:

In addition, guests of NeoQUEST 2015 willingly participated in various competitions. For example, after the Evil Maid report, those who wanted to stretch their legs were offered to get the password with their hands, namely, piloting a helicopter! It turns out that landing a helicopter with a strip of double-sided tape glued to it on a piece of paper with a password is not a trivial task at all! Especially if you have an opponent who is eager to get ahead of you.

In addition to these contests, there were many others, among which it was necessary to guess the opposite tune, go through the maze using flash drives that are defined by the computer as a keyboard, and much more! Excellent prizes were received not only by the winners of the contests, but also by the participants, and you look only at these happy faces:

What about hackers?
While everyone was actively having fun, learning new things and winning prizes, the hackquest participants worked hard on their face ...

7 tasks were waiting for them: on the security of mobile OS (traditionally Android), reverse engineering, virtualization, Web security, and even there was a task related to car safety inspired by a report on similar topics! Traditionally, all the tasks were united by a legend, in this case, a Masonic one.
The winner of NeoQUEST-2015, n0n3m4, immediately rushed forward, passing one task, then the second ... However, towards the middle of the day other participants began to catch up with him. Despite this, n0n3m4 calmly maintained its leadership and won the main prize: a trip to one of the international conferences on cybersecurity (of your choice)! Abr1k0s took the second place, Ziv00s3 took the third! Abr1k0s received a virtual reality helmet as a gift, and Ziv00s3 received an original cherokat (scooter suitcase)!

The further - the more interesting!
NeoQUEST-2015 is over, and now it's time to prepare for the online-stage NeoQUEST-2016, which will traditionally be held at the end of winter. And after it - again a “confrontation”, where we will be glad to give all guests interesting presentations, wonderful gifts and a great mood! We remind you that for all questions you can contact us on Twitter or mail (info@neoquest.ru or support@neoquest.ru)! You can view other photos from the event on our website .
Ahead - the analysis of the tasks of "confrontation"!