stuff to bring - the "shit... wish i'd thought of that!" list

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • stringslayer
    Member
    • Mar 2005
    • 70

    #76
    Good points

    Originally posted by TheCotMan
    * What services are available from your computer when you are on a network?
    I plan on using Fedora Core 4 w/SElinux and all incoming ports shut off. I plan on connecting to work via the Cisco VPN client. It could actually be Fedora Core 7 because DefCon is 2 months away

    Originally posted by TheCotMan
    * How reliable is the network? (it is trivial to DoS any TCP session which can be sniffed passively by others- reguardless of encryption.)
    Forgive me but could you elaborate on this one?

    Originally posted by TheCotMan
    * Any cameras recording your keystrokes?
    * Anyone shoulder surfing?* Can someone steal your laptop and access any cached credentials?
    Not sure, but I will assume yes to all of the above. I will be using RSA keyfob with the 6 digits regenerating every 60 seconds as the 3rd link in the 3 factor authentication. I have however seen programs that can "predict" the key generation, such as "Cain and Abel".

    Originally posted by TheCotMan
    * What actions are performed by your OS when it detects a network? (Connect IM clients? Search for a Master Browser? Look to Authenticate against a Domain or AD?, etc.)
    * (more than these items listed)
    I plan on having a host entry pointing to the Cisco VPN Concentrator endpoint. I will not be authenticating to the Domain Controller, however, I will be authenticating to a Domino mail server that is utilizing LDAP w/AD synch in a Server 03 Active Directory domain environment. I also had planned to direct all of my Internet traffic, including DNS query, back though the tunnel to a proxy server.
    Thank you for taking the time to help
    Stringslayer
    In a world without walls and fences, who needs Windows and Gates?

    Comment

    • TheCotMan
      *****Retired *****
      • May 2004
      • 8857

      #77
      Originally posted by TheCotMan
      * How reliable is the network? (it is trivial to DoS any TCP session which can be sniffed passively by others- reguardless of encryption.)
      Originally posted by stringslayer
      Forgive me but could you elaborate on this one?
      No need to ask for forgiveness. :-) I'm a newbie, not elite.
      Reliability is an issue in security. In addition, what use is a laptop if some dumbass yahoo thinks they are "leet" by applying a DoS attack against people's sessions?
      What I was writing about here was the ancient issue of TCP and DoS with Sequence guessing and use of flags with packet generation to tell one or more hosts in a session to end their sessions. If you can passively sniff sessions, then there is little guessing needed for sequence numbers, and it is possible to kill TCP sessions through crafty packet generation.
      Other DoS can be created on Layer 2 with clever use of MAC address and "by other means" as we have seen in previous DC with the wireless network.
      Why mention these?:
      What use is a laptop, if the network is so unreliable that you must re-establish your VPN/tunnel too often for it to be useful?

      I plan on having a host entry pointing to the Cisco VPN Concentrator endpoint. I will not be authenticating to the Domain Controller, however, I will be authenticating to a Domino mail server that is utilizing LDAP w/AD synch in a Server 03 Active Directory domain environment. I also had planned to direct all of my Internet traffic, including DNS query, back though the tunnel to a proxy server.
      Even though LDAP is not "plain-text" it is equivalent. (LDAPS isn't.) I'm assuming your ldap, mail, and other items you mention above for authentication would only be passing through a pre-established VPN and not be required as part of the VPN build. (I'm not being a smartass here, but I am stating my assumption in case it's not correct.)

      As for directing all your traffic through the VPN, that is a great idea, as is the host entry on your local machine, so as not to rely on the DNS at DC. However, it would be prudent for you to perform some basic tests before you attend DefCon:
      * Go to a "new" network and plug your laptop in
      * Sniff for any traffic from the laptop on the network before the VPN (it is easy to overlook things in windows. :-/ It's also possible that an implementation of some program does not work as documented. Maybe a checkbox is a vaporware option?)
      * port scan it before VPN and then after VPN
      * Sniff after VPN and make sure traffic is only VPN

      Passing won't mean it is secure, but failure will help you identify items which are insecure.

      Then do some research on the version of VPN software you are using and check out any security risks that have been unaddressed (MiM, predictable key exchange, etc) for the client and server.

      Comment

      • stringslayer
        Member
        • Mar 2005
        • 70

        #78
        Heh, hadn't thought of that. All the security in the world will do me no good if the tunnel drops every few seconds.
        I will definitely be testing the items you pointed out.
        I will probably try the DC connection the first day with the security measures you have laid out. If my tunnel drops too often, I will most likely opt for working offline and synch up somewhere far away from the AP :-)
        Who would think you could get a great security lesson 2 months before DefCon?
        Thanks for all your help.
        In a world without walls and fences, who needs Windows and Gates?

        Comment

        • Thorn
          Easy Bake Oven Iron Chef
          • Sep 2002
          • 1819

          #79
          Originally posted by stringslayer
          I am not a WiFi expert so I may need the assistance of THORN.
          "Expert" is a slippery concept. Let's just say I know more than most, but still know less then other (smarter) people.

          The best advice I can give you about WiFi at DC is "Don't do it!" If you must use a public-use network during DC, then my order of preference would be:
          1) A wired network off-site from the AP.*
          2) A wired network at the AP.
          3) A wireless network off-site from the AP.**
          4) A wireless network at the AP.

          * The further removed physically from the AP, the likelyhood decreases that a wired network you are using has been compromised by someone attending DC.

          ** The distance rule applies here also, but remember that several long distance WiFi records (in the area of ~50 miles) have been established at DC. While those are extreme, it is trivial to sniff traffic passively from 5 to 10 miles using COTS equipment and a clear RF line of site.


          All of these assume that you'll use your favorite combinations of encryption and tunnelling, that you'll take reasonable precautions against things like shoulder surfing, and that you're paranoid enough to prevent your laptop from being stolen. If you follow CotMan's above advice on the VPN, you should be OK in that regard. Even then however, I wouldn't rely on a wireless connection anywhere in the Las Vegas for the week of BlackHat/DC for anything buy the most trivial tasks. They are just too easy to DoS or otherwise compromise.

          Let me add one thought here: 99 people out of 100 at DC are seriously interested in security, have very high ethics in this regard, and would be loath to actually do anything bad with your data. The Wall of Shame/Sheep http://www.tomshardware.com/business...021/index.html is a great example: Plaintext usernames and passwords seen on the wireless network are displayed, but only the first four letters of the passwords are shown. It's done to remind people that this stuff isn't secure, not to hand out usernames and passwords for others to use.

          Originally posted by TheCotMan
          He's a good resource to tap, and he has been quite helpful on these forums.
          Thanks, Cotman.
          Thorn
          "If you can't be a good example, then you'll just have to be a horrible warning." - Catherine Aird

          Comment

          • highwizard

            #80
            Originally posted by TheCotMan
            He's a good resource to tap, and he has been quite helpful on these forums.

            We all love to Tap Thorn..

            Comment

            • hackajar
              Contest Goon / Vegas 2.0
              • Jul 2003
              • 1255

              #81
              If your just going to surf the net and read news, weather, etc. Use the WiFi. If you need to access a remote box, check email, pay bills (strange to do at conference, but I wouldn't doubt it) use your cell phone. You don't even need a black berry or sidekick to do this really. I have a phone from '98* that can give me directions, check email, and auto dial resturants from Internet search results. There is no reason to do anything private from the public network at AP/V, being as we are in the year 2005.

              *Phone still works to this day, although I get a lot of flack for carrieing around an old school bulky phone. It cost me $200 in '98 and I want a good return on my investment damnit!
              "Never Underestimate the Power of Stupid People in Large Groups"

              Comment

              • AlxRogan
                THAT guy
                • Jul 2002
                • 783

                #82
                If you are going to the con on your work's dime, and don't want to have to hassle with connecting back up to their environment, simply tell them the risks. In years past when the mothership learned of my plans to travel to Vegas for the con, they were reluctant to allow me to even take my company laptop, due to the fact that it _might_ have remnants of customer data on it.
                Most bosses will understand if you tell them that, "Due to the nature of the people who show up to these cons, I will not be checking email, instant messager, or sending/receving documents while on the road. If it is urgent, please call my cell, and I can connect via alternate methods."
                If I didn't have to carry my laptop to con for competitions, I wouldn't take it out there except for the afore-mentioned picture/movie dumping.
                Aut disce aut discede

                Comment

                • stringslayer
                  Member
                  • Mar 2005
                  • 70

                  #83
                  Thank you

                  You all have made very good points and I appreciate your time.
                  Hackajar brings up an awesome point- the cell phone
                  I do have a phone w/usb cable that can be used as a modem.
                  Perhaps utilizing that connection medium w/VPN for work related items would be the best, most secure, route. It may be a little slow, but probably faster than getting kicked off the VPN via WiFi repeatedly :surprised
                  I plan on taking lots of pictures and maybe a few vids.
                  (provided the individuals are willing to be photographed and recorded)
                  I will share these back to the community when I return from DefCon Xlll.
                  In a world without walls and fences, who needs Windows and Gates?

                  Comment

                  • astcell
                    Human Rights Issuer
                    • Oct 2001
                    • 7512

                    #84
                    If an individual does not want to be photographed, then they will politely say no thank you after you ask them for permission. If you do not ask permission, you will wonder how some bodily orifices can hold a camera. Sideways.

                    Comment

                    • TheCotMan
                      *****Retired *****
                      • May 2004
                      • 8857

                      #85
                      Originally posted by astcell
                      If an individual does not want to be photographed, then they will politely say no thank you after you ask them for permission. If you do not ask permission, you will wonder how some bodily orifices can hold a camera. Sideways.
                      Something like this happened in the vendor room last year. Respect and being polite goes a long way at DefCon. Ego, and disrespect can lead to bad events, and shallow graves.

                      [Ask permission-- even if the person is a vendor.]

                      Comment

                      • stringslayer
                        Member
                        • Mar 2005
                        • 70

                        #86
                        Considering the venue..

                        Permission would definitely be in order.

                        I had read about this earlier from a post including a DefCon Survival Guide
                        I think it will probably help to make my first DefCon more enjoyable and hopefully keep me out of the pool and keep me from being some Goon's bitch
                        In a world without walls and fences, who needs Windows and Gates?

                        Comment

                        • erehwon
                          nowhere
                          • Dec 2001
                          • 425

                          #87
                          Originally posted by noid
                          No one has mentioned bringing a good hat. You're outside a bunch, wear a hat. That and some sunscreen and your post-defcon recovery will be much more pleasant. Also, sunglasses.
                          I stepped out of the forum for awhile, so I will second alot of what Noid is recommending, I am willing to bet that more than 90% of the attendees at Defcon haven't spent any reasonable amount of time in the desert. I really dig the desert, and sitting on my greying head is a Tilley Hat.

                          Originally posted by noid
                          I'd also recommend bringing a water bottle or Camelback. Staying hydrated in that kind of heat is very important, especially if you are planning on consuming large ammounts of dehydrating alcohol. You'll find that you'll get a more pleasant buzz, you can drink longer, and have a far less likely chance of having us (goons) help you into an ambulance if you stay hydrated.
                          Again, you are in the desert, in the middle of summer, the average temperature in July is around 106!!! My best non-tech purchase at Defcon 9 was buying a hydration backpack, from a vendor like Hydrastorm.

                          Trust me when I tell you that packing 100oz of water, or Gatorade will make humping to the Alexis Park from Terribles that much more easier!

                          Originally posted by noid
                          I also found having a tube of chapstik was a godsend last year.

                          Ditch the vinyl pants, leather trenchcoat, and giant leather boots in favor of shorts and tshirts. You'll be a lot more comfortable and you wont be refered to by the goons as 'the idiot wearing the leather trenchcoat in 115 degree heat'.
                          Sure wearing black shirts adds to that air of mystery, but if you must wear them in the desert sun and you forgo the hydration backpack, you will be begging for heat stroke. Wear the black shirts after the sun has gone down. Wear light coloured shirts and shorts, for the ultimate in desert comfort, come dressed as a Bedouin and hide your hydration backpack under your robes!

                          Originally posted by noid
                          As ASTCell pointed out, make up business cards with your contact info (as much as you want to give). Carry a pen with you as well.
                          Don't forget to add your PGP fingerprint on these cards!

                          Originally posted by noid
                          Bring a good attitude with you. People who bring bad attitudes (other than the goons) tend to have a less than fun weekend. They either end up sitting alone or making enemies. You're going to a convention. This is a social event. Come prepared to be social. Meet new people, interact with them, get email addresses and screennames, stay in contact with them. Some of my closest friends I met at Defcon and have been friends with for years (12 or 13 years in some cases).
                          I HIGHLY recommend reading How to Enjoy a Convention every time you are attend one!

                          Lastly, Please bring & use soap, daily! Nothing worse than 5000+ people wearing black shirts in the sun, sweating buckets and not bathing for the weekend.
                          Nonnumquam cupido magnas partes Interretis vincendi me corripit

                          Comment

                          • Siviak
                            Cerebral Terrorist
                            • Feb 2002
                            • 1013

                            #88
                            Originally posted by erehwon
                            I HIGHLY recommend reading How to Enjoy a Convention...
                            that is a great article.. lots of good pointers that work on all sorts of levels, and I hereby reserve the right to plagerize it as I see fit, wth due credit and beers as payment ofcourse


                            Originally posted by erehwon
                            every time you are attend one!

                            hehehe... All your attendings are belong to us... sorry, I think it was the Desert Dog get up that threw me off
                            If I had a nickle for every time someone offered me ten cents to keep my two cents to myself... I would be a rich man.

                            Comment

                            Working...