Kiwicon 2038AD Day 1 Summary
![]()
Just thought I’d post some quick summary notes regarding Kiwicon 2038AD, which has just finished it’s first day.
Scooters - Disrupting the Electric Scooter Market - Matthew Garrett
- First talk was supposed to be Jessie Frazelle talking about Docker stuff, but she didn’t make it out of the US :(
 - Reverse engineered apps used by electric scooter companies such as Spin and Lime.
 - Not a massive job, as they both offer Android apps which can be decompiled reasonably easily using something like jadx/apktool.
 - Neither of these are in Brisbane yet, but he suspects Lime is coming (because he was able to find active Lime scooters in Brisbane using their API)
 - Lime scooters track the scooter’s location so that their service can tell people where hirable scooters are located.
    
- In use scooters disappear from the map so that you can’t see where people are riding
 - API allows you to query a specific 6 digit scooter ID
 - Scooter IDs are from 000000 to 999999
 - These can be brute forced reasonably quickly
 - When querying a specific scooter ID you get it’s exact location, whether it’s in use or not
 - This means that you can see where scooters ride to and from, potentially learning where somebody works/lives/visits/etc.
 
 - Lime just raised over $400M USD of funding.
 
vmpklon - Creation of a VMProtect Clone - Jon Erickson (@2130706433)
- Jon created a VMProtect clone by reverse engineering pieces of the VMProtect tooling.
 - VMProtect is a tool that obfuscates/protects your application by running it in a VM, like how Java’s JVM works.
 - Key takeaways:
    
- Software (of all kinds) gets more complex over time
 - Almost all software stands on the shoulders of it’s predecessors
 - e.g. If you understand the simpler Windows XP internals, you have a much better chance of getting your head around Windows 10 internals.
 - There’s no better way to learn how something works than trying to write your own version of it.
 
 
Apathy and Arsenic - Attacus (@attacus_au)
- Had a really solid comparison between the historical use of arsenic trioxyde (aka. inheritance powder) and the privacy issues that we’re facing today.
 - Both are convenient, cheap, and produce some nice outcomes
    
- Arsenic was a cheap ingredient in particular colouring pigments, as a pesticide, and in cosmetics.
 - Privacy-hostile tools/services are free*, are widely used, and provide services that people enjoy using.
 
 - Both disproportionately affect[ed] people who are already disadvantaged.
    
- Arsenic was used in cheap wallpaper for colouring
 - The few privacy-conscious-ish devices/tools that don’t require a ponytail to operate are somewhat pricey (iPhone is the only example I can think of…)
 
 - Both seem[ed] difficult to get people to care about
    
- People are indifferent because:
        
- “I’ve got nothing to hide!”
 - “I’m never going to be a target of things like that.”
 
 
 - People are indifferent because:
        
 - How do we fight “peak indifference” (aka. “When the most people give the least fucks”)?
    
- Awareness
        
- Attempt to bring privacy education to the masses
 
 - Resistence
        
- Campaign for better laws
 - Fact-check corporate spin/bullshit
 
 - Accessible alternatives
        
- Even if these start out pricey, they will trickle down.
 
 - Time/patience
        
- Keep informing, even if it seems like things aren’t changing
 - Accept that not everyone will be on-board, but do your best to make things better for them anyway.
 
 
 - Awareness
        
 - Don’t be afraid to care about things that are important, even if it makes you “uncool”.
 
Introducing “moriarty”, a smart contract audit tool - Caleb Anderson
- Created a tool to perform symbolic execution of Ethereum smart contracts in order to find money making vulnerabilities
 - Brute forces all execution paths of smart contracts, for variables that matter
 - Smart contracts can cost lots of money
 - $741M USD of Eth was taken through a smart contract vuln in the DAO, known as a “reenterant attack”.
 - Tool is able to check for money-making vulns, and even create a PoC exploit automatically
 - Not being released to the public, but suggested he is likely to provide it to individuals who ask nicely.
 - This one included a good amount of math-ey stuff that I didn’t understand very well, hence the heavily summarised version.
 
Feeding the Beast: Network Insurgency - Parks (@syngularity0)
- Related red teaming to the .mil F3EAD methodology
 - Reinforced that recon/enumeration is key.
 
Lessons from game consoles and the coming security apocalypse - Boyd Multerer
- Boyd worked on the Xbox team at Microsoft until recently
 - He and his team were faced with the problems of trying to secure a system where the owners of the system were actively working against you in order to try and cheat or get free games.
 - You are unable to trust local storage, buses, drives, registers, memory, caches, as they are all susceptible to eavesdropping/manipulation if you have physical access and enough money/time.
    
- An attack that might cost a lot of money to develop can be funded by selling it as a product once it’s complete.
 - e.g. Xbox 360 Reset Glitch Hack
 
 - You need to assume that memory is compromised, all data traversing buses has been leaked.
 - Every driver is an attack vector
 - Believes we should move from having security done in CPUs into FPGAs, which need to be on the same die as the CPU (because we can’t trust buses)
    
- Make it so that you need to physically destroy the chip to get the info out.
 
 - Should move from macro kernels -> micro kernels
    
- All drivers run in user mode instead of kernel mode.
 - Isolate as much 3rd party code as possible.
 
 - Is currently working on IoT device security at kry10, and thinks that the above findings will also apply to IoT devices.
 
Living Without the Land - AD Attacks from Linux - @mubix
- “Living on the land” has been a trend for some time now
    
- Effectively means using offensive powershell tools to get your dirty hacker stuff done in a Windows environment.
 - Is getting more detectable and less attractive because of it’s prevalence, and new (PS5/Win10) protections/logging.
 
 - Created a ruby msf/SEtoolkit-like tool that can query or modify AD from a non-domain joined Linux/Mac/Windows machine
 - LDAP-WAT (to be released shortly…)
    
- LDAP Windows Attack Toolkit
 - Modular
 
 - The coolest thing I saw in this talk was the following:
    
- Any AD user, by default, can join a Windows computer to a domain, using the SeMachineAccountPrivilege
 - Using @mubix’s LDAP-WAT, you, any standard AD user, can join a machine, and tell AD that it should be a domain controller.
 - This means that you get a full copy of the directory, including the ability to pull any credential information using dcsync.
 - You get all of the AD account hashes, including krbtgt, the kerberos ticket granting ticket account.
 - Effectively, from what I can tell, standard AD user -> domain admin privileges.
 - Epic.
 
 
Ghosts in the Browser - Emmanuel Law @libnex and Claudio Contin @claudiocontin
- Service monitors are javascript code run in the background of a browser, registered to a web page, and are used for things like push notifications, and background data retrieval.
 - Can be used to act as a temporary browser implant with access to a page’s cookies and other info, if you are able to run JS in the page (XSS).
 - Can exist even once XSS has been fixed, because the service worker registers, and runs in the browser until the site unregisters it.
 
Mayday, Mayday, Mayday - Safe Harbour No More - Eliza @zemmiph0bia
- Currently in the US, for the most part, a platform is not liable for content which it’s user’s submit
    
- Section 230
 
 - FOSTA-SESTA is an exception to that.
    
- FOSTA-SESTA (Fight Online Sex Trafficking/Stop Enabling Sex Traffickers Act)
 - Became US law in April ‘18
 - Removes a platforms immunity when hosting sex traffickers
 - Sounds good, except that it doesn’t seem to make a big differentiation between (legal, or not) sex workers.
 - Is already having impact on sex workers, meaning that they are being kicked off/shadowbanned from sites where they share their services (Twitter/backpage/etc.).
 
 - Because the US hosts a large proportion of our online services/tech companies, this affects users that don’t live in the US, including places where sex work is accepted/legal.
 - This kind of idea is interesting to think about, that the power/problems of the US extend to other areas of the world due to the fact that lots of tech innovation occurs there.
 
DHCP is Hard - Felix Wilhelm
- Spoke about a number of DHCP -> code execution bugs that he and others have found over the last two years
 - dnsmasq - CVE-2017-14493
 - ISC DHCP - CVE-2018-5733
    
- dhclient - is the default DHCP client on almost all mainstream linux distributions
 - Exploit requires ~200GB of traffic to the DHCP client… not so useful
 
 - ISC DHCP - CVE-2018-1111 - “dynoroot”
    
- Root arbitrary command execution by sending a specially formed DHCP packet to a DHCP client…
 
 - Takeaways:
    
- Backwards compatibility increases attack surface
 - DHCPv6 is enabled everywhere, increases attack surface, but not many people use it…
 - “Don’t write new network daemons in C”
 
 
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale - Moloch @littlejoetables and Mandatory @iammandatory
- Burp intruder is a tool to send a large number of customised HTTP requests quickly, and provide the results in an easy to read manners quickly, and provide the results in an easy to read manner.
    
- Can be used to brute force logins, identifiers, or to fuzz web applications
 - Is limited by your browser/bandwidth/rate limiting
 - lambda-intruder allows you to do the same thing extremely quickly (enough to DoS many servers without realising it…) and cheaply using Amazon services.
 
 - Rainbow tables are pre-computed hashes, used as an alternative to brute forcing/”cracking” password hashes
    
- Rainbow tables are big (TBs and TBs)…
 - Google Big Query and other amazon services can help…
 - big-rainbow
 
 - GPU password cracking is useful and pretty fast, but causes lots of heat, and tends to cost a lot of money in GPUs, especially if you want to do it super fast
    
- AWS comes in handy again…
 - masscat is a tool which can utilise Amazon services to spin up servers/lambdas/spots with big GPU power to perform your password cracking activities for you quickly and cheaply…
 
 
Securing a World of Physically Capable Computers - Bruce Schneier
- Spoke about how the increasing complexity of computer systems increases their vulnerability
 - Computer systems are not just our computers, but our TVs, fridges, phones, DVRs, etc.
 - All of these are getting more and more vulnerable, and we need to make changes to stop this.
 - The free market does not care about security, because consumers do not care
 - I got lost taking notes at this point, thinking about what he was talking about, and instead took a horrible quality audio recording of the remainder, which I’ve linked here.
 
If you’re around, and you recognise me (I’m wearing a black tshirt and sunglasses…), say hi!
XORcat