The world has always been fascinated with Hackers. In this video, we’ll learn about how they hide themselves online.
https://www.youtube.com/watch?v=BWVyp0wYpgA&ab_channel=GrantCollins
00:00
four years that is how long a group of
00:02
hackers were able to stay inside the
00:04
starwood marriott network without being
00:06
discovered oof how the heck does an
00:08
unauthorized party stay hidden for this
00:10
long well in today's video topic i will
00:12
address popular methods hackers will use
00:14
to stay anonymous online while hiding
00:17
their online footprint
00:19
so let's go ahead and get started all
00:20
right no the first step is not matrix
00:22
level hacking as much as we love it to
00:24
be it's actually physical security
00:26
physical security is also referred to as
00:29
operational security or opsec so if
00:31
you're one of those you know military
00:33
guys you probably know about this or if
00:35
you're just some random weird it nerd
00:37
well yeah you're probably gonna need to
00:38
know about this too because guess how
00:40
many times it takes to be successfully
00:42
identified
00:43
once one time this guy right here the
00:46
infamous dread pirate roberts or ross
00:48
irvitch or however you pronounce his
00:50
last name who founded the silk road a
00:52
billion dollar underground dark
00:54
marketplace for drugs and other stuff
00:56
how did he get caught well no it wasn't
00:58
through some extreme matrix level glitch
01:01
hacking it was his opsec he got caught
01:03
in san francisco public library his
01:05
go-to place to conduct his fraudulent
01:07
activity and well he did some bad things
01:10
such as often bragging about his work on
01:12
his linkedin page using oblique verbiage
01:15
and he used his real photograph for his
01:17
fake id
01:20
so these are just a few of the critical
01:21
elements which pieced together and led
01:23
to his downfall and these aren't
01:26
technical in nature its habits and the
01:28
public interactions that led to ross's
01:31
downfall it is essential hackers be
01:33
aware of their online and offline habits
01:35
including where they use and connect
01:37
their computers their writing style
01:39
their social media posts and their
01:41
social interactions in general basically
01:43
someone who's the exact opposite of me
01:45
here on youtube okay so an attacker has
01:48
their basic physical security down
01:50
what's next acquiring the hacking
01:52
machine used to conduct your fraudulent
01:55
offensive activities first off buy the
01:57
machine with the most untraceable and
01:59
mobile trail possible ideally this is a
02:02
laptop which is bought in a privacy
02:04
focused cryptocurrency form such as
02:06
monero or zcash once this machine has
02:08
been acquired completely wipe the
02:10
operating system windows no more and
02:13
immediately buy a usb stick to preload a
02:16
live operating system install this usb
02:19
stick right here is a live os meaning
02:22
there is no permanent storage but you
02:24
also want to make sure to enable full
02:26
disk encryption just in case of full
02:28
compromise now when you're installing a
02:30
live os it is important that you keep an
02:33
os distribution such as linux tails and
02:36
mine linux tails is a suite of privacy
02:38
focused features and functionality which
02:41
allow an adversary to stay anonymous
02:43
alright so what's the next step you must
02:45
say that is to go ahead and anonymize
02:47
your identity and network connection
02:49
there are several steps to accomplish
02:51
this now any type of unique or
02:53
pseudo-unique identifier is going to be
02:56
harmful to a hacker like you and i
02:58
because well you can be tracked by that
03:00
now from a hardware perspective one of
03:02
the most well-known identifiers is a mac
03:05
address so a mac address is a serial
03:07
number issued by the device
03:09
manufacturers it is used to identify a
03:11
device on a local network and can be
03:13
used to help identify the geographical
03:15
location of a machine in some cases
03:18
mac address spoofing or mac address
03:21
anonymization uses different mac
03:23
addresses to anonymize your identity
03:25
there are different ways you'd
03:26
accomplish this such as built-in
03:28
programs customized scripts and built-in
03:30
tools in linux tails the mac address is
03:32
temporarily changed to a random value
03:34
for each new session with tails now in
03:37
addition to mac address randomization
03:39
you're also going to want to anonymize
03:41
the ip address what is that you must say
03:44
an ip address is a network address
03:46
assigned to all machines when connecting
03:47
to other networks to accomplish ip
03:50
address optimization services such as
03:52
vpns tour for web browsing and proxies
03:55
can be used but this is all with strict
03:58
caution each of these methods introduces
04:00
intermediaries with assumptions of
04:02
complete trust vpns extend a private
04:05
encrypted network over a public network
04:07
connection tor uses a network of
04:09
computer nodes to balance a connection
04:11
between different nodes across the world
04:13
and proxies can alter the location
04:16
appearing as if the originating request
04:18
is coming from the proxy client all
04:20
three methods introduce an intermediary
04:22
or central location which can log your
04:24
traffic and send that to an authority in
04:27
order to ensure 100 anonymity you must
04:30
never
04:31
really trust a central authority but in
04:33
a modern architecture such the as the
04:35
internet that's really not realistic now
04:37
to establish these types of anonymizing
04:39
services you could go ahead and use an
04:41
open source project for instance for vpn
04:44
servers you can use openvpn or tailskill
04:47
and then you can install this on
04:48
attacker owned or controlled device or
04:50
you could just use some sort of third
04:52
party provider for tor you can download
04:54
the to our project or use a distribution
04:56
like tails which already has tour
04:58
routing enabled by default a hacker can
05:01
layer each anonymizing service upon each
05:03
other so a program like proxychains can
05:05
be used to route internet traffic
05:07
through a list of proxies on top of the
05:10
tor network to set up this demo i went
05:12
ahead and edited the proxy chains config
05:14
file and set the chain to dynamic
05:17
setting which excludes all dead proxies
05:20
then i also enabled dns requests to be
05:23
proxied through the proxy chain and i
05:25
wrote down the default proxy server
05:27
which is the sox5 through our loopback
05:30
address let's proceed to go ahead and
05:33
start up proxy chains here first thing
05:35
we need to do is make sure that tor is
05:37
on so we can go ahead and do a service
05:39
tour
05:40
start
05:42
okay once this is on we can go ahead and
05:45
go to our proxy chains
05:48
and we're gonna go ahead and use
05:50
duck
05:53
now this will take a few minutes or it
05:56
won't take anything at all see where we
05:58
are coming from we can use a dns leak
06:00
website and i found this all through an
06:02
article so just go ahead go to dns leak
06:06
and as you can see we are coming from
06:08
romania so this is a basic way to layer
06:12
both the tor network and proxy chains on
06:14
top of each other to become anonymous
06:17
okay so after this step it is finally
06:20
time to ensure that
06:22
you're not really working in the same
06:24
environment and that is separation of
06:26
environments you have to make sure that
06:28
you're separating your hacking
06:29
environment from your you know normal
06:32
everyday use environment a classic
06:34
example of machine separation is virtual
06:36
machines and containerization use
06:38
ephemeral or temporary environments when
06:40
conducting offensive security activity
06:43
it is never a good idea to use one
06:45
single environment for all activities
06:47
computer machine isolation ensures
06:49
evidence can be contained and then
06:50
destroyed and this can be really
06:52
achieved through virtualization also
06:54
hackers can use a bouncing server to
06:56
connect to their valuable infrastructure
06:58
where their offensive tools and data
07:00
lies so some cloud party provider that
07:03
doesn't really care about what happens
07:04
on their machines in this way all the
07:06
hacker has to do is have an ssh
07:08
connection into the server after they've
07:10
anonymized their identity even if the
07:12
bouncing server is destroyed or
07:13
compromised the hacker can curate and
07:15
develop a new one within a matter of
07:17
minutes so like i said before you have
07:19
to separate your offensive security work
07:21
from your everyday work environment and
07:24
in this case it's important that you're
07:26
also randomizing your network connection
07:28
so to do this you can go into public
07:30
wi-fi and you know use wi-fi map dot io
07:34
which is a resource to go look for
07:35
public open wi-fi networks and make sure
07:38
that you're randomizing exactly when
07:40
you're you know connecting to that wi-fi
07:42
remember our good boy ross you know he
07:44
uh well you know what happened to him
07:46
okay so up into this point i've talked
07:48
about anonymizing one ownes identity but
07:51
i haven't talked about actual attack so
07:54
let's say in a hacker has compromised a
07:57
network similar to the starwood myriad
08:00
case
08:00
how can they go about you know covering
08:03
up their online tracks within the
08:06
network so they're not being detected by
08:09
any security professionals like you and
08:11
i once initial access has been
08:13
established it is imperative that
08:15
attackers limit their offensive activity
08:18
so it's not a good idea to generate a
08:20
whole bunch of logs and activity once
08:23
you're entered into network it's about
08:26
stealthynessness
08:28
take a look at the solarwinds attack of
08:30
2021 the alleged adversaries kept the
08:32
tracks hidden for months by slowly
08:34
testing their capabilities through the
08:36
course of those months initial access
08:38
started september 4th of 2019 and then
08:40
by march of 2020 is when the
08:42
distribution of sunburst was deployed
08:44
and that took six months now in addition
08:47
a skilled adversary will analyze network
08:49
and user behavior and mimic this
08:51
offensive activity as closely as
08:53
possible such as conducting their
08:55
actions during the proper business hours
08:57
next hackers will blend their fraudulent
09:00
activity with common network connections
09:02
and protocols such as dns tunneling dns
09:06
or the domain name system is an
09:08
essential component to a network
09:09
translating ip addresses into those web
09:11
domains
09:12
well because dns is essential it's
09:14
usually opened so in dns tunneling it
09:17
uses seemingly harmless dns queries to
09:19
traverse between a private and public
09:21
network
09:22
a hacker could use an encrypted
09:24
connection and route their fraudulent
09:25
activity through dns take dns cat 2 an
09:29
open source command and control
09:30
framework that lives out on github which
09:32
is used to route traffic through dns in
09:34
this demo i used the windows machine to
09:36
simulate a victim and a cali machine to
09:39
simulate an attacker i downloaded dns
09:41
cat to utility on github on my kelly
09:44
machine and then the victim payload on
09:45
the windows machine which is an
09:47
executable in this case so if we go
09:49
ahead and start the dns cat to server
09:52
we need to set the security policy to
09:54
unencrypted in a real world scenario of
09:56
course you wouldn't want to do this but
09:58
i'm a script kitty so
10:00
well i'm just using this for testing
10:01
purposes and also it worked i'm a script
10:04
kitty anyway let's go ahead and get
10:06
moving forward so if we do set
10:09
that will make sure that our security
10:10
policy is
10:12
to unencrypted
10:14
now if we go into our windows machine i
10:17
already downloaded the windows 32 here i
10:20
have added the host which is this
10:22
machine's
10:24
let's go ahead and execute it
10:28
and boom as you can see we now have a
10:30
session and it's an unencrypted session
10:33
now let's go ahead and see if i can get
10:36
well i don't know notepad plus plus or
10:38
notepad open
10:40
so we what we do here is we go into
10:43
session
10:44
i
10:46
one
10:48
and then we can see our list of commands
10:50
here that we can do so for instance we
10:52
can ping or we can get a shell
10:54
but um well let's go ahead and do exec
10:57
notepad
11:01
and as you can see we now have a notepad
11:05
opened and this is all tunneled through
11:07
dns so in a real world scenario if this
11:10
was encrypted
11:11
you really wouldn't be able to notice
11:13
that this
11:14
fraudulent traffic was going through
11:16
your network unless
11:17
you had some advanced defenses in place
11:20
all right so hopefully in today's video
11:21
you've learned something new about how
11:23
hackers can hide their tracks although
11:26
this video was very let's just say
11:28
script kitty high level overview
11:30
uh you can see how even people such as
11:33
the silk road founder can be absolutely
11:36
taken down with
11:38
one poor doing but this is how hackers
11:41
do it anyway if you guys want me to do a
11:43
video on getting more technical let me
11:45
know in the comments down below yes and
11:48
until the next video
11:50
well don't be a script giddy and
11:52
that that's me have a good day guys