Hacking WiFi with a 3$ Jammer

In this video for Cr0w’s Place we examine how we can modify a WiFi IoT device, into a powerful WiFi Jammer. A WiFi Jammer is a portable WIFI signal blocker that can disable the WIFI signal effectively. The module that we can use is the ESP8266, and I choose the NodeMCU v1.0 that you can easily find in ebay, for 3$ or so.

Keep in mind that this is NOT a frequency jammer. It is just a deauthing device.

The process of flashing the device is pretty simple. First of all, you download the current release of the firmware from here and upload using the ESP8266 flash tool of your choice. I recommend using the nodemcu-flasher. If this doesn’t work you can also use the official esptool from espressif. But for more information and problem solving just go to the creators github here, so a big shout out goes to spacehuhn. 🙂

Links to buy NodeMCU:

 

 

This project is a proof of concept for testing and education. Please act responsibly.

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0wTom

My Road to TROOPERS Scholarship! – Part 1

Hello Everyone,

It’s been a while since our last talk. You know, many things happening, a masters degree and a constant dream hunting. I think that the last time we talked, it was about my conclusion in the BlackHat Europe 2016 event, and my first vlog. Now, it is time for a new announcement, and my acquisition of a scholarship for the TROOPERS 17, which happens to be the 10 year anniversary of TROOPERS, which will be awesome, for sure!

For more, go here: https://www.troopers.de/troopers17/

As with BlackHat, TROOPERS gives some scholarships to students around the world, which are interested and involved into the security sector. The competition is big in such events, because you are attending for free, bypassing a big fee that others have to pay, to attend it. For TROOPERS the process is more simple than BlackHat, and you just have to sent a motivation letter. The instructions on the site are as follows:

STUDENTS@TROOPERS – MOTIVATION LETTER

Troopers is all about training, personal progression, and making the world a safer place. The limited budget of many students should not get in the way of this mission. Hence we offer students the opportunity to submit a short abstract to apply for their free Troopers attendance. As the available seats are limited and there are potentially a high number of students, we apologize if we cannot accept all student applications.

If you want to apply, please send us an abstract about why you in particular should be attending Troopers — keep in mind, you have to convince us! Including:

  • A short personal introduction
  • Current fields of work/degree programs
  • Experiences and activities in the area of IT security
  • Published work/research/white papers/write-ups
  • Expectations for the conference and expected personal progression
  • What you will contribute to TROOPERS

Send this letter to student@troopers.de.
The deadline for the submission of Student Motivation Letters is January 31st 2017.

I learned about it, in one of my work trips, that a friend of mine mentioned it, and I searched it immediately. I prepared my letter and sent it to the email stated above. My email was the following:

Dear TROOPERS,

My name is Thomas Sermpinis, and I am a Master’s student from Greece. I am 23 years old, with great passion for Cyber Security, from the age of 12 when I firstly started programming. I am currently studying for my master’s degree in “Informatics and Management” in the Aristotle University of Thessaloniki and I work in the security sector, preparing workshops for Hakin9 media, related to IT security topics. I have started working in this sector by the age of 18, where I worked in the biggest Greek Hacking Magazine, DeltaHacker. I am also, freelance in penetration testing, for an extra income, because of the difficult economic situation of Greece, but of course I really love what I do. Also, I have a personal YouTube channel, that I produce videos related to security, with a big fanbase.

As I wrote, my main field of work these last years, is presenting my knowledge to others, with workshop instructing, and article writing. By this, I have met many people, and acquired many experience in this field. I have also traveled to Germany this last year, for an opportunity in working with a Cyber Security firm, named Auxilium. Continuing, recently I acquired an academic scholarship for BlackHat Europe 2016, which I will attend in November and I hope that I will gain much from it.

Some of the topics that I have researched and presented in various ways are:

  • Penetration Testing with Android Devices (Hakin9, Google Developers Conference)
  • Android Malware Analysis (Hakin9)
  • Web Application Hacking: Data Store Attacks (Hakin9)
  • Penetration Testing with Kali 2.0 (Hakin9, DeltaHacker)

This is only a small part of my work in the security field, in which I want to work and offer my knowledge and experiences. This is also a reason why I want to attend TROOPERS. I want to meet new people, and acquire new knowledge, throughout the exceptional layout of this event. I thing that this is the way to my personal progression, and this is why I am continuously searching for new opportunities that will help me in this matter. Of course, my presence there will not go unnoticed. I want to be active and stand out of the crowd, by participating in competitions and discussions of TROOPERS. Finally, it will be a big and serious opportunity for me, that I will also be able to write about in my blog (cr0wsplace {dot} wordpress {dot} com) and let every reader know about TROOPERS conference and events, which will also be good advertising for you.

I look forward to hearing from you.

Best Regards,
Thomas Sermpinis

I am now selected as one of the scholarship holders, and I will attend the conference and the NGI event on March 20-24th of 2017. I will make a part 2 for the letter of acceptance and the registration process, so stay tuned. 😉

Cr0wTom

Web Application Hacking Course by Cr0wTom

Hello Everyone,

As you already know, because of my early work on Cr0w’s Place, and your support of course, I have the opportunity to work in some of the biggest education providers in the security sector. One of them is Hakin9 Media SP. with whom I am starting a new four week course tomorrow, in the subject of Web Application Hacking, and specifically in DataStore attacks and Advanced SQL Injection. You can find my course here.

My intentions are not to phish for clients. It is a really advanced topic, that not anyone can attend. But if you are up to Security and Hacking and you have some knowledge in SQL Injection, you can find this really helpful.

To continue, I want to tell you that I am preparing a vlog for the upcoming BlackHat event, that I will attend in November. I want to call anyone that will attend too, to communicate me, and scheduled a meeting in the event. I will happy to meet all of you, and present you in my BlackHat videos.

Feel free to contact me with any contact way available. 🙂

Cr0wTom

My road to BlackHat Europe so far – Part 2 (Acceptance email)

Previously, we talked about the process I followed to get awarded with a student scholarship on BlackHat Europe 2016. As I told you, I followed the application process and I answered the required questions, as I showed you in part 1.

In this post, I will show you the acceptance email that I received in my inbox, ~40 days after my application.

Congratulations, you have been awarded a complimentary Student Scholarship to attend Black Hat Europe 2016 in London.  Black Hat Europe is the most technical and relevant global information security event in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment.  This is an outstanding opportunity for students to learn from and network with some of the most talented researchers and practitioners working in InfoSec today.

 

Event:                   Black Hat Europe Briefings

Date:                     November 3 and November 4, 2016

Location:              Business Design Centre, London

 

Requirements:  In order to register for your complimentary Student Pass, you must meet the following requirements:

  • Must be at least 18 years old at the time of the event
  • Must provide copy of verifiable proof of full-time academic status at an accredited college or university (copy of class schedule or syllabus)
  • Must provide copy of valid and current college/university ID card
  • You must be able to provide your own travel to and accommodations in London —these are not included
  • Submit your materials on or before September 30, 2016.

 

Please reply to this email with the required information and we will set up your registration.  If you have any questions or need any more information, please contact us at blackhateuroperegistration@ubm.com

 

Congratulations on your nomination, and we hope you will be able to join us at Black Hat Europe this year.

 

The Black Hat Team

The email came from the address registration@ubm.com.

Cr0wTom

My road to BlackHat Europe so far (or how to get your scholarship)!

As I mentioned in my previous post, I recently got awarded with a complimentary Student Scholarship to attend Black Hat Europe 2016 in London. Of course they do not search for all the qualified students in the world, but you as a student have to apply for the scholarship and after a review from their side, be accepted or rejected.

The application form is hosted here and consists of several questions. I will now provide you the answers I gave to the application form, but of course if you decide to apply, give your own answers, as my answers have been recorded and you will immediately disqualified.

  • Why do you want attend Black Hat?
    Black Hat is one of the biggest events in the security industry, with many breakthrough topics every year. Because of this, and because I want to work in the Cyber Security sector in the future, I think that Black Hat can give me a head start, with the knowledge and the acquaintances that I may acquire with my attendance in the event. Also, I am really passionate in the research of this field, and finally, I think that I will be able to stand out of the crowd on the friendly competitions of the event. 
  • What course work, training, and/or experiences have you had that you feel qualify you for a complimentary pass? Be as specific as possible.
    First of all, I have completed successfully the Computer Science (CS50) course of Harvard University, through the edx platform, with a week focused on security. I am a Bachelor’s degree holder in the field of “Supply Chain Management” and I have been selected to start a Master’s Degree in the field of “Informatics and Management” in October 2016. These are for my accademics.Continuing, I was trained from the age of 12, by my uncle, in the field of computer science and especially programming. By the age of 18, I have started working in the biggest Greek penetration testing magazine, DeltaHacker, as a content creator, covering advanced penetration testing topics. Now, I am a workshop instructor in PenTest Mag and Hakin9, two of the biggest penetration testing related magazines in the world. I also own a big Youtube channel and a blog, related to penetration testing and information security, named Cr0w’s Place.In addition, I have presented the topic “Penetration Testing with Android Devices” in the Google Developers conference of Thessaloniki 2014, and the topics “Integration of Augmented Reality technology into Warehouse Management Systems” and “Integration of Near Field Communication technology into Warehouse Management Systems” in the 12th Student Conference on Management Science and Technology.Finally, I have worked many times as a freelance penetration tester, and I have visited Germany after an invitation for cooperation from Auxilium Cyber Sec, with whom I may cooperate in the future, after my Master’s Degree. 
  • What specific research (Briefings, Arsenal tools, Keynotes, etc.) from past Black Hat events do you find especially interesting and WHY? Relating specific Black Hat content back to your course work and/or area of study will increase your chances of being awarded a scholarship. Please site at least 3 examples. Archives can be found here for reference: https://www.blackhat.com/html/archives.html
    1. Don’t Stand So Close To Me: An Analysis of the NFC Attack Surface (July 25, 2012) – As I stated in the previous question, I have presented the topic “Integration of Near Field Communication technology into Warehouse Management Systems” which happens to also be my thesis topic for my bachelors. A big part of this topic was the security of NFC in which this Black Hat presentation helped me a lot, and I find it really interesting.
    2. Fingerprints on Mobile Devices: Abusing and Leaking (2015) – One of my main fields of interest in the security sector is mobile devices. I have presented a topic in the GDG, wrote many things on my blog and on the magazines I work. For this matter I am interested in many Android and iOS related presentations of BlackHat, and one of my favourites was this. I have many times referenced to the paper of this presentation.
    3. Hacking the Corporate Mind: Using Social Engineering Tactics to Improve Organizational Security Acceptance (July 26, 2012) – Because most of my work is based on the corporate world, as I studied in the Supply Chain Management field, I have used the knowledge acquired by this presentation, and other sources, to fix some aspects of security in the company I was helding an internship program, Kleemann S.a.
    4. Attacking Mobile Broadband Modems Like a Criminal Would (2014) – One of my biggest and most successful topic in the DeltaHacker Magazine, was based in this exact blackhat presentation. When I saw it, I was so excited that I wanted to present it to the Greek public, and I did it with great success.

    I have also, liked many other presentations but I think that these four was the most important now that I have to choose.

I have to thank many people for this opportunity, and for the state that I’ve reached until now, but I will not do it publicly. Keep in mind that all the above are property of the Cr0w’s Place and Thomas Sermpinis, and their use is prohibited. They have been uploaded for educational purposes only. Thank you and I wish good luck to every contestant.

BlackHat Europe 2016 is taking place in London, 1-4 November 2016. I will be happy to meet you there.

Cr0wTom

Hacking with Android Part 2: Network Spoofer

In Part 2 of Hacking with Android series for Cr0w’s Place we are working with Network Spoofer.

Network Spoofer lets you redirect your victims to other websites or change the credentials of a website and many more from an Android phone with a series or ARP poisoning and MITM Attacks. After downloading simply log onto a Wifi network, choose a spoof to use and press start.

This application is a fun demonstration of how vulnerable home networks are to simple attacks, with permission of the network owner

Requirements:
-Root (superuser)
-Wifi Network
-500MB SD card space

To install it, download the .apk from the download link and install it as unknown source app from a file manager.

Download Link

Everything you are going to see is for educational purposes only, so operate carefully and in your own property. I bring no responsibility in what happens to you if you act irresponsibly.

Devices used:
-Attacker: Xiaomi Mi2S(Android 4.1.1)
-Victim: Samsung Galaxy S3 Mini(Android 4.1)

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

 Cr0w Tom

Hacking with Android Part 1: Intercepter-NG

In this tutorial for Cr0w’s Place we are starting a new series of videos called Hacking with Android and as the title says we are going to see applications that helps us to perform Penetration Testing Attacks.

In part 1 of this series we are working with Intercepter-NG.

Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:

  •  SSL Stripping
  •  ARP Poisoning
  •  Session Hijager
  •  Network Discovery with OS Detection
  •  Network Traffic Analysis
  •  Passwords Recovery
  •  Files Recovery

Runs on Android 2.3.3+ with root+busybox

Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim’s computer.

SSL stripping is a man-in-the-middle attack in which a network attacker could prevent a web browser from upgrading to an SSL connection in a subtle way that would likely go unnoticed by a user.

ARP Spoofing attack is the egression of unsolicited ARP messages. These ARP messages contain the IP address of a network resource, such as the default gateway, or a DNS server, and replaces the MAC address for the corresponding network resource with its own MAC address. Network devices, by design, overwrite any existing ARP information in conjunction with the IP address, with the new, counterfeit ARP information. The attacker then takes the role of man in the middle; any traffic destined for the legitimate resource is sent through the attacking system. As this attack occurs on the lower levels of the OSI model, the end-user is oblivious to the attack occurrence.

PlayStore Download Link

Everything you are going to see is for educational purposes only, so operate carefully and in your own property. I bring no responsibility in what happens to you if you act irresponsibly.

If you like my videos please Subscribe to my channel.

Thank You For Watching.:)

Cr0w Tom