Twitter Updates

    follow me on Twitter

    List for 4.5% and get 1% cash back on your purchase

    Wednesday, January 24, 2024

    How To Build A "Burner Device" For DEF CON In One Easy Step

    TL;DR: Don't build a burner device. Probably this is not the risk you are looking for.

    Introduction

    Every year before DEF CON people starts to give advice to attendees to bring "burner devices" to DEF CON. Some people also start to create long lists on how to build burner devices, especially laptops. But the deeper we look into the topic, the more confusing it gets. Why are we doing this? Why are we recommending this? Are we focusing on the right things?

    What is a "burner device" used for?

    For starters, the whole "burner device" concept is totally misunderstood, even within the ITSEC community. A "burner device" is used for non-attribution. You know, for example, you are a spy and you don't want the country where you live to know that you are communicating with someone else. I believe this is not the situation for most attendees at DEF CON. More info about the meaning of "burner" https://twitter.com/Viss/status/877400669669306369

    Burner phone means it has a throwaway SIM card with a throwaway phone, used for one specific operation only. You don't use the "burner device" to log in to your e-mail account or to VPN to your work or home.
    But let's forget this word misuse issue for a moment, and focus on the real problem.

    The bad advice

    The Internet is full of articles focusing on the wrong things, especially when it comes to "burner devices". Like how to build a burner laptop, without explaining why you need it or how to use it.
    The problem with this approach is that people end up "burning" (lame wordplay, sorry) significant resources for building a secure "burner device". But people are not educated about how they should use these devices.

    The threats

    I believe the followings are some real threats which are higher when you travel:
    1. The laptop getting lost or stolen.
    2. The laptop getting inspected/copied at the border.

    These two risks have nothing to do with DEF CON, this is true for every travel.

    Some other risks which are usually mentioned when it comes to "burner devices" and DEF CON:
    3. Device getting owned via physical access while in a hotel room.
    4. Network traffic Man-in-the-middle attacked. Your password displayed on a Wall of Sheep. Or having fun with Shellshock with DHCP. Information leak of NTLM hashes or similar.
    5. Pwning the device via some nasty things like WiFi/TCP/Bluetooth/LTE/3G/GSM stack. These are unicorn attacks.

    6. Pwning your device by pwning a service on your device. Like leaving your upload.php file in the root folder you use at CTFs and Nginx is set to autostart. The author of this article cannot comment on this incident whether it happened in real life or is just an imaginary example. 

    How to mitigate these risks? 

    Laptop getting stolen/lost/inspected at the border?
    1. Bring a cheap, empty device with you. Or set up a fake OS/fake account to log in if you really need your day-to-day laptop. This dummy account should not decrypt the real files in the real account.

    Device getting owned while in a hotel room with physical access

    1. Don't bring any device with you.
    2. If you bring any, make it tamper-resistant. How to do that depends on your enemy, but you can start by using nail glitter and Full Disk Encryption. Tools like Do Not Disturb help. It also helps if your OS supports suspending DMA devices before the user logs in.
    3. If you can't make the device tamper-resistant, use a device that has a good defense against physical attackers, like iOS.
    4. Probably you are not that important anyway that anyone will spend time and resources on you. If they do, probably you will only make your life miserable with all the hardening, but still, get pwned.

    Network traffic Man-in-the-middle attacked

    1. Don't bring any device with you.
    2. Use services that are protected against MiTM. Like TLS.
    3. Update your OS to the latest and greatest versions. Not everyone at DEF CON has a 0dayz worth of 100K USD, and even the ones who have won't waste it on you. 
    4. Use fail-safe VPN. Unfortunately, not many people talk about this or have proper solutions for the most popular operating systems.
    5. For specific attacks like Responder, disable LLMNR, NBT-NS, WPAD, and IPv6 and use a non-work account on the machine. If you don't have the privileges to do so on your machine, you probably should not bring this device with you. Or ask your local IT to disable these services and set up a new account for you.

    Pwning the device via some nasty thing like WiFi/TCP/Bluetooth/LTE/3G/GSM stack

    1. Don't bring any device with you.
    2. If you bring any, do not use this device to log in to work, personal email, social media, etc.
    3. Don't worry, these things don't happen very often. 

    Pwning your device by pwning a service on your device

    Just set up a firewall profile where all services are hidden from the outside. You rarely need any service accessible on your device at a hacker conference.

    Conclusion

    If you are still so afraid to go there, just don't go there. Watch the talks at home. But how is the hotel WiFi at a random place different from a hacker conference? Turns out, it is not much different, so you better spend time and resources on hardening your daily work devices for 365 days, instead of building a "burner device".

    You probably need a "burner device" if you are a spy for a foreign government. Or you are the head of a criminal organization. Otherwise, you don't need a burner device. Maybe you need to bring a cheap replacement device.

    More articles


    1. Hacking Tools For Windows Free Download
    2. Hacker Tools
    3. Hack App
    4. Hack Tools For Windows
    5. Pentest Tools Website Vulnerability
    6. Hacker Tools List
    7. Tools Used For Hacking
    8. Growth Hacker Tools
    9. Hacking Tools Hardware
    10. New Hack Tools
    11. Hacker Tools Apk Download
    12. Hack Tools Github
    13. Hacker Tools Software
    14. Physical Pentest Tools
    15. Nsa Hacker Tools
    16. Hack Tools For Games
    17. Underground Hacker Sites
    18. Pentest Tools For Mac
    19. Pentest Tools Apk
    20. Hacking Tools For Windows 7
    21. Hack Tools For Mac
    22. Hacking Tools Kit
    23. Hacking Tools 2020
    24. Hack Website Online Tool
    25. Hacking Tools For Pc
    26. Hacking Tools Windows
    27. Hacking Tools For Windows
    28. Hacker
    29. Pentest Tools Open Source
    30. Hacking Tools Hardware
    31. Hacker Search Tools
    32. Pentest Tools Find Subdomains
    33. Hacker Tools Github
    34. How To Make Hacking Tools
    35. Hack Website Online Tool
    36. Pentest Tools Review
    37. Hacking Apps
    38. Tools 4 Hack
    39. Hacker
    40. Hacking Tools 2020
    41. Hacking Tools Name
    42. Hack And Tools
    43. Hacking Tools Windows
    44. Kik Hack Tools
    45. Hack Tools For Games
    46. World No 1 Hacker Software
    47. Hacking Tools Software
    48. Pentest Tools Website
    49. Physical Pentest Tools
    50. Hack Tools For Pc
    51. Hacking Tools Pc
    52. Hacking App
    53. New Hack Tools
    54. How To Hack
    55. Black Hat Hacker Tools
    56. Pentest Tools Port Scanner
    57. Hacker Tools Online
    58. Pentest Tools Linux
    59. Free Pentest Tools For Windows
    60. Hacking Tools Online
    61. Hacker Tools For Pc
    62. Hacking Tools For Mac
    63. Hack And Tools
    64. Black Hat Hacker Tools
    65. Hack Tools 2019
    66. New Hacker Tools
    67. Install Pentest Tools Ubuntu
    68. Hacker Tools Mac
    69. Hack Tools For Pc
    70. Hack Tools For Pc
    71. Hacker Tools
    72. Hack Tools
    73. Hacker Tools Linux
    74. Hacking Tools Windows
    75. Pentest Tools
    76. Physical Pentest Tools
    77. How To Install Pentest Tools In Ubuntu
    78. Pentest Tools Tcp Port Scanner
    79. Pentest Tools Github
    80. Hacking Tools 2020
    81. Pentest Tools For Android
    82. Hacker Tools Free
    83. Hacker Tools Github
    84. Hacking Tools Usb
    85. Hacker Tools Mac
    86. Hacking Tools For Kali Linux
    87. Pentest Recon Tools
    88. Pentest Tools Online
    89. Hacker Tools 2019
    90. Black Hat Hacker Tools
    91. What Is Hacking Tools
    92. Underground Hacker Sites
    93. Pentest Tools Alternative
    94. Hacker Tools For Pc
    95. Hack Website Online Tool

    No comments:

    Post a Comment

    Home for sale- $2,000 rebate!

    Ready Real Estate slide show

    Become a fan of my page

    Sheree Dutton, Reatlor, DFW, Texas on Facebook
    Powered By Blogger

    Pandora Faves

    Back on the market, price reduced, 1% cash back rebate offered

    Sheree Dutton | Ready Real Estate | 817-975-0461
    222 Birchwood, Azle, TX
    Back on the market, price reduced and 15 cash back rebate offered!
    3BR/2BA Single Family House
    offered at $102,500
    Year Built 2006
    Sq Footage 1,142
    Bedrooms 3
    Bathrooms 2 full, 0 partial
    Floors 1
    Parking 3 Covered spaces
    Lot Size .225 acres
    HOA/Maint $0 per month

    DESCRIPTION


    Wow, talk about pride of ownership! This house has too many upgrades to count, and is so well cared for. You must see it to believe it! A lot of value in this perfect starter home.

    OPEN HOUSE SUNDAY MAY 3RD 2+5 pm

    see additional photos below
    PROPERTY FEATURES

    - Central A/C - Central heat - Fireplace
    - High/Vaulted ceiling - Walk-in closet - Tile floor
    - Living room - Breakfast nook - Dishwasher
    - Refrigerator - Stove/Oven - Microwave
    - Laundry area - inside - Balcony, Deck, or Patio - Yard

    OTHER SPECIAL FEATURES

    - 1 car garage, covered carport for 2 cars
    - covered wood deck in backyard
    - gutters
    - storage shed
    - newly stained wood fence
    - electric fireplace added, with tile hearth
    - upgraded ceiling fans and light fixtures
    - island in kitchen

    ADDITIONAL PHOTOS


    Fantastic curb appeal

    covered wood deck in back

    living room

    kitchen with island

    breakfast nook

    master bedroom
    Contact info:
    Sheree Dutton
    Ready Real Estate
    817-975-0461
    For sale by agent/broker

    powered by postlets Equal Opportunity Housing
    Posted: Sep 11, 2009, 7:31am PDT

    Blog Archive