Advice for a Defcon Virgin

9

3

I have never attended a Defcon convention before and I am very excited to be attending this year. I need some help in making sure I am prepared for the event.

- If I bring my laptop and connect it to the internet, will it get hacked?

- If so, is there a way I can secure my connection or computer to prevent hacking or make it hard?

I am hoping to be able to tweet and blog while at the convention but I also don't want my server hacked and all the fun that goes with that. If you also have any other general advice for a defcon virgin please comment over on my blog at http://geek.michaelgrace.org/2009/07/advice-for-a-defcon-virgin/ so this can focus on keeping my computer and internet connection secure during the defcon convention. All your input and advice is much appreciated. ;)

Equipment I plan on bringing

  • MacBook Pro
  • iPhone 3g
  • Digital Camera

Mike Grace

Posted 2009-07-22T00:26:42.373

Reputation: 376

Community wiki. – jtbandes – 2009-07-22T04:57:28.673

Answers

7

Remembering what I know about previous events (I've never attended DefCon either), some general things spring to mind:

  1. Don't use unknown or unencrypted (WEP counts as unencrypted) WiFi APs
  2. Use encryption everywhere (SSH/SSL)
  3. Do not, I repeat DO NOT log into your blog or twitter over an unencrypted connection
  4. Use VPN to connect to a secure server (always check certificate when connecting)
  5. Use secure passwords: 10-16 characters (maybe more?) with both lower and upper case letters and numbers, with a good deal of randomness
  6. Update your software to latest versions before you leave home
  7. Don't scan other machines, the other side will notice and get angry

Check what services your MacBook provides to the network and disable everything you don't need (you don't need SSH in there for sure). Don't know about the iPhone since I don't own one.

Saulius Žemaitaitis

Posted 2009-07-22T00:26:42.373

Reputation: 289

Thanks for the tips! ; ) I will add them to the list I am compiling on my blog. – Mike Grace – 2009-07-22T00:47:49.343

haha. You updated and added a few. I like #7, it made me smile. ; ) – Mike Grace – 2009-07-22T02:49:04.817

6

If possible, don't even connect directly to your own server, even through SSH. Set up a Dreamhost account or something and tunnel the SSH through there. By making a connection of any kind to your own server, you're pointing to it as a potential target!

Greg Hewgill

Posted 2009-07-22T00:26:42.373

Reputation: 5 099

3

  • From a network perspective, assume that you are surrounded by hostiles.
  • These hostiles will be friendly. Assume they will attempt social engineering attacks on you when you talk with them. Be a scrooge when handing out information. It should be easy enough to chit-chat without giving out your full name, etc.
  • Social engineering may include beer. Beer is a wonderful way to get people to do things they wouldn't normally do - including giving out info.
  • This may sound strange, but do not drink any beverage that doesn't come from a well-known brand in a factory-sealed container...unless you like waking up with your underwear as a hat in a strange location.
  • If in doubt about what info to give, don't say it. Remember, people can now guess your social security number from just your birth date and city. A little info goes a long way for an attacker.
  • If you insist on taking a computer, consider the software installation on it to be disposable and/or compromised; just burn whatever contents you get to a CD/DVD when you get back, and nuke it from orbit. No point in bringing home little wormy-worms and bugs on your machine.
  • If you have to leave it in a room behind a locked door, assume you might not find it when you get back. Travel light and think "mobile" or "nomadic". Remember, they do demonstrations of how to pick locks...

Avery Payne

Posted 2009-07-22T00:26:42.373

Reputation: 2 371

1Is the 4th bullet point from personal experience? ;D – KTC – 2009-07-26T00:10:31.877

@Avery Payne, Thanks! Great advice and some good stuff to think about. I'll add it all to my list. :) Thanks again! – Mike Grace – 2009-07-26T00:14:28.060

I haven't had the fortune(?) of attending...but I have read reports from others. And the bullet point was based on someone else's recommendation. – Avery Payne – 2009-07-26T01:19:37.997

2

To be ultra-paranoid, configure your firewall to drop all outgoing traffic and only allow stuff that you explicitly want, and that you're sure is either encrypted or not sensitive. For example, it'd suck if you logged in to your machine and your AIM client decided to connect, promptly sending your password in clear text.

derobert

Posted 2009-07-22T00:26:42.373

Reputation: 3 366

@Jack M, Not sure what you mean but... thank you? – Mike Grace – 2009-07-26T00:13:06.800

@Mike Grace The Wall of Sheep: http://www.wallofsheep.com/ - an interactive demonstration of what can happen when network users let their guard down. We passively observe the traffic on a network, looking for evidence of users logging into email, web sites, or other network services without the protection of encryption. Those we find get put on the Wall of Sheep as a good-natured reminder that a malicious person could do the same thing – Jared Harley – 2009-07-31T06:01:13.803

And welcome to the wall of sheep! – Jack M. – 2009-07-22T14:45:18.460

1

Unless you really know what you are doing do not connect to any networks that could in any way be controlled by anyone else at DefCon. Turn off any onboard wireless, power it off if you can. Playing it safe, putting up firewalls, using SSH\SSL for everything, checking certs, strong passwords is all well and good but there will be people there who craft zero-day exploits against well secured systems for a living and anything that connects to a network there is viewed as fair game. For an example of why this might be a bad idea - especially at this years DefCon - read this VRT blog post about an exploit in dhclient that enables an attacker to leverage a bug in the DHCP client of affected systems to initiate an attack. Your Mac isn't vulnerable to this one but for systems that are no amount of shutting down services\enabling firewalls\using SSH will help, as soon as you try to get a network connection you've been nailed.

A 3G\EVDO card that connects to your cellular provider will be reasonably safe as will your iPhone's Cellular connection but you absolutely should not leave an iPhone's WiFi enabled at something like DefCon.

Your camera should be safe enough provided it doesn't have built in WiFi.

Helvick

Posted 2009-07-22T00:26:42.373

Reputation: 1 103