Securing Hardware with Joe Fitz

This entry is part [part not set] of 24 in the series Hack the Planet

In this episode of the Hack the Planet Podcast:

Joe Fitzpatrick of SecuringHardware.com is the best known hardware security trainer on the planet.  We talk to him about how he retargeted his hardware security training program to a remote audience and what he’s learned about designing hacker trainings over the years. We also discuss a new hardware hacking tool that Joe built for both training and real world use: the Tigard, available on Crowd Supply. Joe has also been prototyping a PCI Express multi-tool, the Epic Erebus, and we brainstormed some ways to get into trouble with one. As usual, we discuss his backstory and some additional projects including a drone-based taco delivery service.

Be a guest on the show! We want your hacker rants! Give us a call on the Hacker Helpline: PSTN 206-486-NARC (6272) and leave a message, or send an audio email to podcast@symbolcrash.com.

Original music produced by Symbol Crash. Warning: Some explicit language and adult themes.

SecuringHardware: https://securinghardware.com/

Tigard: https://www.crowdsupply.com/securinghw/tigard 

B-Sides PDX: https://bsidespdx.org/

SymbolCrash Presents: Building the Andromeda Strain: Post-exploitation & Golang Tradecraft

This class will provide students with detailed guidance and workshop based instruction on how to design and deploy custom implants that monitor target hosts for adjacent targets, subsequently replicating onto them autonomously. Students will gain knowledge around a variety of methods of proliferation based persistence on multiple platforms; As well as, binary autonomous transformation techniques designed to allow offensive practitioners the freedom of writing conventional binaries, yet maintaining the mobility of shellcode like operating conditions.

This class builds upon the elements covered in “Scalable Post-Compromise Utility Development Tradecraft”. Similar libraries and code samples will be used, but new material will be distributed to facilitate the additional subject matter. Participants will utilize a complement of open source libraries and utilities centered around the Go programming language to design and construct:

a) A multi-platform, multi architecture implant capable of performing remote command execution

b) An inject capable of deploying the implant in a variety of environments

c) A command and control system specifically designed to utilize the full functionality of the aforementioned implant.

As well as:

d) An implant capable of detecting adjacent attack vectors and utilizing them to self replicate

e) A command and control system capable of mapping the dynamically created network of compromised assets

f) Technology that allows the student to organically locate persistence opportunities within compromised assets at the point of infection.

Students should have a working knowledge of basic programming concepts, as well as basic operating system and tcp/ip networking fundamentals. Students will also preferably be somewhat versed in executable binary file structure on multiple operating systems and have some basic knowledge of x86 and or X86_64 assembly language.