Events

ElevenPaths Talks Code for Devs

 

The 'Hidden Networks' Created With USB Devices by Fran Ramírez

April 18, 2018. We have been researching the Hidden Networks for a long time at ElevenPaths. These networks or interconnections between isolated computers, that might be separated by different subnets or in other locations, were created using USB devices plugged into several computers within a corporate network. Join it!


#CodeTalks4Devs: The 'Hidden Networks' Created With USB Devices

Code Talks for Devs webinar cybersecurity Latch Integration in a Cryptocurrency Wallet Using Exfiltration
Latch Integration in a Cryptocurrency Wallet Using Exfiltration Danilo Ninabanda, Ignacio Jiménez... March 21, 2018.
Code Talks for Devs webinar cybersecurity UAC-A-Mola, a Framework for Research, Detect and Mitigate UAC Bypasses
UAC-A-Mola, a Framework for Research, Detect and Mitigate... Pablo González y Santiago Hernández June 20, 2018.
Code Talks for Devs webinar cybersecurity Evil Foca in a nutshell
Evil Foca in a nutshell, get to know it! Álvaro Núñez-Romero July 18, 2018.
Code Talks for Devs webinar cybersecurity LiLaS, a Project to Protect Data Networks
LiLaS, a Project to Protect Data Networks Santiago Hernández August 22, 2018.
Code Talks for Devs webinar cybersecurity WordPress in Paranoid Mode
WordPress in Paranoid Mode Pablo González September 19, 2018.
Code Talks for Devs webinar cybersecurity How to Create a FOCA Plugin
How to Create a FOCA Plugin José Sperk October 17, 2018.
Code Talks for Devs webinar cybersecurity Joomla in Paranoid Mode
Joomla in Paranoid Mode Mateo González November 21, 2018.

Thus, it would be possible to spread a malware between computers totally isolated from the Internet, like the well-known Stuxnet incident.

Seeking how to implement this hidden network analysis, a couple of months ago we published some scripts in PowerShell that analyzed these networks. Now we have created a PoC in Python called “HN” (Hidden Networks) which automate all the processes in order to gather the information, both local or over a network (domain). It then plots the hidden network as a graph. In this talk we are going to describe the internal functionality of the main parts of this HN tool.

Find out more about this subject:
Whitepaper “Hidden Networks: Detecting Hidden Networks created with USB Devices”
PoC Hidden Networks