Attack Of The Dreamcasts 451
kevin_conaway writes "A pair of coders are now suggesting that it is possible, with a modified dreamcast system running Linux to sneek into an office building and stick it on a network drop and leave. The dreamcast will then probe for ways to connect to the outside world. They say they have created similar software for iPAQs and a special bootable cdroms for print servers and similar boxes. Just a reminder that are networks need to be as secure on the inside as they should be on the outside. Get the story here."
how is this any different (Score:5, Insightful)
Re:how is this any different (Score:3)
Because it is completely automated and it is small and easy to hide.
IHMO.. Very very cool, nice job guys
Re:how is this any different (Score:3, Informative)
Of course, physically FINDING it once they've learned of its existence might be a bit trickier. But I assume the second step they'd take would be to shut down the port on the nearest switch. (The first step, of course, would be the location of a suitable scapegoat. Nobody does anything around here without some kind of CYA plan.)
Re:how is this any different (Score:3, Insightful)
Any raised floor computer room under the floor tiles, it could be put in most drop down ceilings, there are just a huge number of places you could
place a box to do the job that would not very likely to be noticed for several months or years. Almost all of the places in question would have fairly simple access to network and power.
Re:how is this any different (Score:3, Insightful)
Wouldn't it be easier to just make the same software run in the background under WindowsXX? Then all you would have to do is spend 30 seconds at someone's computer who has gotten up to get some coffee or is out at lunch, to slip the disk in and install and run the software.
I don't know, it seems a lot easier to me.
Because of the footprint and cost... (Score:3, Insightful)
Other way to look at this would be for a handy ligitimate network tool. It would be nice to plug a machine into a network, have it snoop around, and then come back the next day and get a report on bottlenecks, machine usage, etc.
--
"That's Homer Simpson sir. One of your drones from sector 7G"
Re:Because of the footprint and cost... (Score:3, Informative)
Hell, I have such a device sitting behind me. Ethernet (10baseT) and small enough to hide almost anywhere. (About the size of a dimm.)
Re:Because of the footprint and cost... (Score:4, Insightful)
why not just drop in a wireless access point, and sit in the parking lot and hack away? That way you can do all of these things without having to worry about establishing an outbound channel. or put the dreamcast in a discreet location outside the building near an outlet. Just cover with a black tarp and there you go. waterproof wireless backdoor.
Re:how is this any different (Score:5, Informative)
Re:how is this any different (Score:2)
Re:how is this any different (Score:3, Informative)
Re:DC cooling (Score:3, Informative)
On a related note, the Nintendo gamecube is a stock panasonic DVD mechanism. Sega and Nintendo can't afford to mass manufacture custom drives...hey, even Sony and Microsoft don't do that...
no, it wouldn't (Score:4, Insightful)
I laughed out loud when I read this.
Re:no, it wouldn't (Score:3, Insightful)
psxndc
Re:how is this any different (Score:2)
$1000 is really not that much money for someone seeking to gain from cracking into a companys network. You've gotto believe that the data they're trying to steal from you is worth more than the cost of a measly laptop.
What it does do, however, is lower the barrier of entry, if you may, to potential attackers. It might also make sense if you're using a "carpet-bombing" technique where you put several of these on the network hoping that one or two of them may go undetected - although I assume after the first one is detected and security knows what to look for the others won't be so hard to find and in fact having multiple ones of these around might actually increase the chances of someone getting supicious.
Re:how is this any different (Score:3, Interesting)
At a game company?
Actually though, at my company (not a game company) I could probably bring a Dreamcast in and get it on the network without anybody really noticing. If I disable the LED on it, I'm pretty sure most of the people here (even those that have a Dreamcast and play it) wouldn't consider looking to see if it was network connected or not.
There are advantages to keeping your desk cluttered like I do.
Re:Ummm (Score:2)
Which would be stranger:
A seemingly inactive Dreamcast sitting on my desk or a Dreamcast sitting in the server room?
Hmmm?
Re:how is this any different (Score:2, Interesting)
Security is only as good as your vigilance and your Doorman!
Do you _Know_ everyone in your office?
This is where your social skills or lack there of can be either an asset or a detriment.
Introduce yourself around Sysadmins... find out who those mysterious personell are... Heck you might just make some friends!
Re:how is this any different (Score:2)
Re:how is this any different (Score:5, Insightful)
Extra Humiliation Factor (Score:4, Funny)
Well, there's the extra humiliation factor... Imagine a bunch of IT boys from different corps going out for a beer:
BOFH1: Yeah, I got 0wn3d today by a massive distributed DOS attack from thousands of zombie machines across the 'net.
BOFH2: Ha! That's nothing. I got r00t3D when someone compromised the latest openSSH source. That woz pretty elite.
BOFH3: (mumble mumble)
BOFH2: What was that?
BOFH3: [sobbing] An iPAQ! I got H4x0r3D by a fucking iPAQ, okay? Are you happy now?
BOFH1: What a l00zer.
BOFH2: Good grief.
Re:how is this any different (Score:3, Interesting)
Why is this specifically a problem for dreamcasts? (Score:4, Insightful)
Re:Why is this specifically a problem for dreamcas (Score:3, Funny)
Re:Why is this specifically a problem for dreamcas (Score:2)
Even scarier (Score:4, Interesting)
Re:Even scarier (Score:2)
Re:Even scarier (Score:2)
Is there such an animal, or are you just making that up?
How is that going to work? (Score:5, Funny)
More likely that they would say "Cool, lets see what game is in it!"
Re:How is that going to work? (Score:5, Funny)
"Yeah Mike?"
"There's something wrong with your Dreamcast, I can't get it to boot up Soul Calibur."
"My Dreamcast? What Dreamcast?"
"Your Dreamcast...you know, the one you had plugged into the 2nd floor comms closet?"
"That's not my Dreamcast. Did you ask Dave?"
"Yeah, both he and Shirley say they've never seen it before."
"And you say it won't play Soul Calibur? Did you try booting it with no disc?"
"Yeah, it comes up with some weird black screen and says it's beginning port scan, or some such nonsense like that."
"Huh, I wonder what made it do that?"
"Who knows. Oh well, guess I'll go plug it back into the router that it was plugged into."
Any computer (Score:2, Insightful)
Re:Any computer (Score:3, Informative)
Re:Any computer (Score:2)
Why use a laptop? You can run a convincing Linux implementation using much cheaper hardware.
Re:Any computer (Score:2)
The dreamcast comes with a MODEM. The broadband adapter was sold in VERY small quantities, and goes for 100-200$ BY ITSELF on ebay, so bump up that "cheap" price accordingly.
Re:Any computer (Score:3, Insightful)
I have a TINI (from Dallas Semiconductor) sitting behind me. I has an ethernet port, and serial port. Runs on 8 volts and is small enough you could put it anywhere. It was about $100.
On the other hand, a Dreamcast is about $50 (give or take) + 1 rare broadband adapter. Which boosts the price to $150-$250 for the device.
For $299 CANADIAN ($200 US?) I bought an XBox the other day. Gee, it has built in Ethernet, and, at the point when somebody fully cracks the bootflash could theoretically run Linux and do the same thing.
And have an 8gig drive to log data.
But I don't think that is a realistic use for an XBox either.
Umm....duh!!!! (Score:3, Insightful)
Keep it hidden! (Score:3, Funny)
Wyatt
802.11 anyone? (Score:2)
Silly me, I hadn't realized the uber-absurd case -- someone walks into your office with a game console and asks for a network drop.
Enigmatically enough, I first read this tagline as "Attack of the Democrats"
Wondering again (Score:2, Insightful)
- FF
Sure no one will notice... (Score:2)
a reason to use plan 9 (Score:4, Insightful)
so much of today's lax security is due to legacy design, not inherent difficulty. this is worth remembering.
wireless (Score:2)
Isn't it standard practice...? (Score:3, Insightful)
Re:Isn't it standard practice...? (Score:2)
Of course, small companies aren't necessarily better. In any event, anyplace with DHCP is just begging for this sort of intrusion. It's a good reason to always assume that someone is listening.
Re:Isn't it standard practice...? (Score:2)
Where I work, the DHCP server will only give IPs out to systems that have valid MAC addresses - beyond that, I can't tell you anything. I believe you can't get the routers to route traffic with an invalid MAC address, but I'm not sure about that - haven't had the opertunity or the need to test it. (However, I have had my office machine be "forgotten" about, and it took them a full day to update the DHCP server to allow me back on the network.)
My school is a step more anal - MAC addresses are tied to specific ports - not just drops, individual ports in the dorm rooms. If an invalid MAC address is detected on a port, then the port is deactivated until NetOps is notified and it can take a while to have it reactivated. The ports are also theoretically designed to deactivate if the computer connected to them is operating in promiscous mode, but I'm unsure as to how this is accomplished.
While it is of course possible to - um, "spoof" - a MAC address, tieing the drops by MAC address makes it quite a lot harder for invalid systems to just be dropped onto the network. It means that a tunnel cannot just be established by plugging the box into the network - some actual work would be required. At work, all the drops are always active, and I'd bet you can set a static IP. But at my school, where the drops are tied to MAC address, you'd have to find a port where your box can exist without knocking the original computer offline - a considerably more difficult task than just plugging the box into the network.
I wouldn't complain... (Score:3, Funny)
-Derek
Re:I wouldn't complain... (Score:2)
Still A PS2? (Score:2)
Ok. Reality check folks. (Score:5, Insightful)
With that in mind, when was the last time you walked into your company in non-work clothes, you knew where you were going, and walked confidently there and no one stopped and questioned you? I wear a name tag and go there every day, but in my shorts and tshirt with no name tag, I'm never stopped. I think thats the way it is in many places.
Re:Ok. Reality check folks. (Score:3, Insightful)
This reminds me of my university (Score:2)
Perhaps the only way to overcome this problems is give IP addresses to trusted MAC addresses only. In the context of a university this could mean the student could apply for an IP address, but could you trust the student? That's the real question
Re:This reminds me of my university (Score:2, Funny)
Re:This reminds me of my university (Score:2)
Even if you don't trust the student, you'd have a name and student id number attached to the IP and MAC so it some port scanning or cracking is going on from that IP, you know who to prosecute.
Re:This reminds me of my university (Score:2)
What about WAPs? (Score:2, Interesting)
Yeah, right. (Score:5, Informative)
"availability of an Ethernet adaptor"?
You almost have to kill someone to get a network adaptor for the Dreamcast. I'm not even sure they're being manufactured anymore (I wouldn't think so), but there are a few on eBay; the cheapest one is $60.
Besides, as other posters have mentioned, a Dreamcast doesn't exactly look inconspicuous to me, especially if some person I don't recognise is carrying one around in my building.
Re:Yeah, right. (Score:3, Informative)
http://www.ma.nma.ne.jp/~ikehara/dc/dcne.html
Nothing New (Score:2)
This was back in the days of 1200/2400 baud modems. Plans for the device were in 2600 magazine. It had a range of about 500 meters, and broadcast on about 560 KHz. You needed a companion device on the other end. You could record the audio signals then decode them on your PC later.
On a side note. Even better would be a handheld with TWO expansion ports -- one ethernet to sniff and one 802.11b to sneak it out. Just park across the street with a laptop and another 802.11b card. Instant backdoor to the network.
Wireless (Score:4, Insightful)
Re:Wireless (Score:2)
Re:Wireless (Score:3, Insightful)
Re:Wireless (Score:2, Insightful)
Of course, he'd notice a dreamcast sitting somewhere in the open, but under a desk, plugged into a network mini-hub? Hell, in the unlocked server closet, which also shares room with housekeeping stuff.
It's easy to say "any admin worth their salt" would do such-and-such, but sometimes that just isn't the case, not because they don't want to, but rather because they don't have the time.
When you get in at 6 in the morning and leave at 9 at night every night, are you really in the mood for staying an hour later and looking at the logs? Should he? Probably, but admins are human, and the man I'm thinking of isn't getting paid hourly.
Of course, he is my boss, and I just feel bad because I probably didn't work as hard as I should've. Maybe I should stop putting him down as a reference in my job search. Heh.
Real Risk (Score:5, Informative)
And then think about how many businesses don't even come close to providing physical security to all the ports that connect to their network. Sure the computer room is locked- but how many cleaning people are in the offices at night? Usually if you worry about them at all- it would be that they steal, not leave something behind.
I had to do some work once at a call center for a client of ours. A large credit card company.
I pulled up to their building but it was this big glass box and I wasn't sure where the entrance was. I just walked around until I found a door. It was open and their were people standing around smoking. So I walked in. I was in the back by the break room.
I wandered around in there for 10 minutes or so until I found the front desk. When I walked into the lobby from inside the building and asked for the guy I was supposed to meet she was pretty freaked out. They brought up security people and asked how I got in, etc.
I hope my credit card company isn't that easy to get into. But I'd be surprised if its much more secure. I wouldn't be surprised it it is less secure.
Something to think about.
.
This happened to me... (Score:4, Funny)
So the commercials were right... (Score:5, Funny)
Now I understand the tagline... It's thinking...
More ways - AUI transceivers (Score:3, Informative)
And if you can sneak in once, why not twice? Or better, equip the computer with a cell modem or amateur radio equipment (How many "wartalkers" look for that, eh?) , and dial in. No need for probes which may set off IDS systems, or outgoing packets (like ARP or DNS requests) that alert crackers to a computer's presence.
I think you cut pins 3 and 10 (on the connector to the computer on the transceiver) but that's not certain.
Did it. (Score:5, Interesting)
We used it to run a dump of all the packets on the network and get pretty much all the passwords used by anyone. We printed out a copy and sent it to the bozo they had in charge of IT, and he called in a mess of expensive consultants to reload everything on the network.
Of course, they didn't fix the basic problem or find our little friend. For all I know it's still running up above the 'ol drop ceiling -- we were to chicken to try and retrieve it. Of course, this was a private school, so the real joke was on us (the clue -- consultants were being paid for by our own stupid selves).
Here is a number for you to remember (Score:3, Informative)
For anyone else thinking about doing this, don't be stupid and please use a little common sense. If you do something like this and get caught you will not only pay a huge fine like $10-25k minimum, but could easily end up in jail.
That's nothing compared to... (Score:3, Funny)
Cheap? (Score:3, Informative)
Yeah, the Dreamcast is dirt cheap. The "broadband adapter" needed to hook it up to an ethernet network? Quite pricey [ebay.com].
I'm sure a few people mentioned it, but... (Score:5, Funny)
I would think much in the same way, a Dreamcast running linux can be used to seriously injure a person, but sneaking up on them and hitting them over the head with it, repeatedly. Of course that's not newsworthy, unless it's a Dreamcast running linux.
Permissive dhcp (Score:2)
Re:Permissive dhcp (Score:2, Informative)
You don't need an IP to send ethernet packets (which is where ARP lives).
Re:Permissive dhcp (Score:2)
In fact, the setup we have here gives out "safe" IPs to machines with MAC addresses it doesn't know. The router is configured to not allow traffic from these addresses to access internal resources. In this case, it's actually more difficult to NOT figure out a valid configuration on your own.
Don't fall into a trap by thinking you can improve security through your dhcp configuration.
Uh-oh (Score:3, Funny)
Luckily, we were safe--THIS time. Those security-sapping plastic mosquitos could hide anywhere though, so maintain constant vigilance!
Did something similar (Score:4, Interesting)
One day we decided that we wanted to get free video games. After scoping the place out we discovered that all the 10baseT ports that the video games plugged into were in fact patched into a 3com 3300 switch and were active. The network designers I guess figured it would be easier to activate all the ports instead of making some video game tech figure out how to patch stuff in.
We brought in a laptop with a long cat5 cable and looked for a place to plug it in where we wouldn't be noticed. Jurassic Park 3 has this little thing you sit in a close the blinds so the ambient light would stay out. It would do nicely.
We watching what we could with different packet sniffers (we were also very paranoid of getting busted) and were able to bring up the Switches web management system. We discovered that the video games use DHCP to get an address in the 10.10.x.x subnet and the video games also seem to contact a master server for configuration information. ie. How much does this game cost. By this time we had been sitting in Jurassic Park 3 for 2 hours and were getting REALLY paranoid. So we decided to try something malicious. We arp-spoofed/flooded everything we could see. An interesting thing happened. When the game control units can no longer talk to their master server, they go into 'free' mode. I guess this is in case there is a network failure. They'd rather lose a bit of money than piss of 100s of people. While our little program ran, every game in the place became free. So I thought to myself, why not just unplug the Cat5 cable for a game to make it free. That doesn't seem to work. I think this is because it needs to detect a link before it will go to free mode. Anyhoo, I guess the moral of this story is to have some kind of port security on your network ports in your business. or something
As the old Dreamcast commercials said... (Score:2)
Sega Dreamcast..."It's Thinking"
Wouldn't it be cheaper and just as effective (Score:5, Interesting)
Hell, you might be able to modify a tomsrtbt to do this and wipe (or dd if=/dev/zero of=/dev/fd0; dd if=/dev/urandom of=/dev/fd0) the diskette once the ramdisk is loaded.
IOW, this whole thing strikes me as more of a "stunt" than a "hack."
-Peter
Um. Why doesn't MS have a wizard to do this? (Score:2)
Huh? (Score:2)
You're kidding! Wow, how long did it take them to figure this out?
In other news... banks have now been found to be extremely insecure. All you have to do is break in, shoot all the guards, dynamite your way through the vault... and you have unlimited access to all their money!!
Mod the box first (Score:4, Funny)
A dreamcast? (Score:2)
Java-based disposable ethernet board! (Score:4, Interesting)
Anyways, my point is this type of device is probably easier to program than a Linux Dreamcast. It may or may not be cheaper (sub-$100). And it's a lot easier to hide, if that's the goal. I've programmed a handful of hobby projects with this board, and it's really quite amazing for the price. (Compared to trying to implement an TCP/IP stack on a PIC microcontroller, say.)
TINI hardware [ibutton.com]
TINI [ibutton.com]
TINI board resource center [junun.org]
more resources [apms.com.au]
DalSemi discussions [dalsemi.com]
Re:Java-based disposable ethernet board! (Score:3, Informative)
1 problem (Score:2)
The only problem I have is with the part about how if you brought it into a business they would think its just a game system. I would be immediately suspicious of anyone toting around a Dreamcast in this day and age. Maybe if they made this hack for a PS2, or better yet, for the XBox. Or the gamecube, Super Hack Brothers Melee...
Yet another Hacking Hardware Target (Score:2)
It's cheap, departmental grey, looks like a piece of network componentry, uses GPL'd software (easy to change for your evil ways), and boots from a CD.
AC in and ethernet out...
Social Engineering (Score:2, Interesting)
So, I propose that instead of using a relatively conspicuous DC, or even a laptop, you buy a TINI computer:
http://www.ibutton.com/TINI/hardware/i
And then modify it into an old Cisco plastic shell. Write something like, "Cisco Network Load Balancer" or something (in a believable fashion), slap it in as close to the server room as you can.
The issue here is not "can I crack people's networks from the inside?" but, rather, "can I _keep_ cracking the network for more than a couple weeks?" You think to look at a laptop or DC for a network spy, but who bothers to look at some random piece of Cisco hardware in a corner? I'd say the risk of discovery becomes far lower - and with TINI, you could theoretically put together a "button" that would wipe the contents of the device if it was moved.
Just an idea.
-Erwos
Methods of prevention... (Score:3)
The best way I could think of locating suspicious activity, is to setup a machine in the same range as the important servers... And investigate any connections to it (as no one should be connecting to it). This only stops the more active attacks though.
To sniff data off the wire, you only need to be getting an electrical signal. You don't need a MAC or IP address. To prevent this kind of sniffing, you would really have to go around and verify that the each active port (on the hub/switch) corresponds to a machine that should be up and running.
However, in a microsegmented network, where each network interface coresponds to a port on a switch, listening to the traffic on one port will not yeild much. So the sniffer would have to flood the switch with MAC addresses, or forged ARP replies. That kind of thing could be picked up if you monitor your switches.
So the point? Use switches directly to the computers anywhere remotly important... And protect your uplinks (links from switch to switch, switch to router, router to router) so that no-one can tap into them.
Of course, all this requires an incredibly great deal of manpower, and administrative vigilance. The real solution is to use IPv6 (or IPv4 with IPSec) since it encrypts all traffic.
OUR not ARE (Score:2)
A simpler, cheaper alternative (Score:3, Interesting)
1) port and service scan
2) send out results via http/ftp/ping/email/etc
3) wipe the floppy clean
4) write an innoculous text or word document on the floppy
4) reboot the workstation again
This leaves nearly zero physical evidence that there was an intrusion. Just an abandoned floppy and a rebooted machine.
Sure, you _might_ get past building security with a video game console in your bag. But I guarantee you'll get in with a floppy. And would you rather be caught plugging a floppy into a workstation or a video game console into the network?
And you'll still have your Dreamcast at home, running DCMAME!
Security research project addressing this issue (Score:5, Informative)
It's designed to precisely address this issue by limiting network access from hosts whose Hardware Ethernet addresses are unknown to the local subnet only (not past the router) until it is authenticated (by some password or other scheme). Thus, if you put a Dreamcast on a SPINACH network, it could only reach hosts on the immediate subnet, unless you spoofed the MAC address or something...
Yes, but it doesn't mean what you think it does... (Score:2)
Re:What relevance does the Dreamcast have? (Score:2)
Re:What relevance does the Dreamcast have? (Score:2)
The real significance is the almost universal glee to be had around here when someone manages to hack one kind of computing device into something which it was never originally designed for.
Re:What relevance does the Dreamcast have? (Score:2)
It's not news that an IP-capable machine with connectivity to a network can search for weakness in the network. These guys use a dreamcast so their non-news can get some attention.
That was from Pirate School!!! (Score:4, Funny)
Been to Pirate Training School?
Replacing 'our' with 'are' is a very common pirate thing to do. Of course, even that was slightly misspelled since 'arr' is the most correct usage, matey...
-.-
I imagine that it would be the same thing if.... (Score:2)
With the source code you can a variety of things, like getting the OS to run on platforms not originally intended to run that type of OS. Is it even marginally possible to get Windows to boot on anything other than a x86 or Itanium based system these days? (Note: I am only talking about modern releases of Windows, not NT4.0 and its Alpha support. This is not counting XP Embedded or WinCE/PocketPC releases, which again are limited to one maybe two processor types.)
-.-
Re:Sniffing (Score:2)
With a network of a few hundred machines and random equipment I doubt it would be noticed. Add to the fact that you won't have a mac address for antyhing except what is on your own segment...
You aren't likely to notice it unless you are already checking for non-approved equipment.
Grab the BBA (Score:2, Insightful)
Re:ethernet adaptor for Dreamcast -- where? (Score:2)
Alternatively, you could run a coder's cable (they run about $20 US) from the serial port on the unit to the serial port of a standard PC, but at that point, you might as well just lug in a laptop. A coder's cable is a a good way to network your DC if it runs Linux or BSD, though. You can then mount a different machine as a network drive using NFS.