Posts

NDSS 2019 camera-ready and PoC attack code

The camera-ready version of Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android is available here

We also released a proof of concept code to perform the Soft AP manipulation attack. The code was previously disclosed to Google. In summary, the attack allows a malicious Nearby Connections server (advertiser) to redirect a client to a malicious Internet connected access point. As a result the attacker can reconfigure the wireless network interface of the victim via DHCP and gets access to all the Wi-Fi traffic (even traffic from non Nearby Connections applications).

Academic day_night and search

Recently gcushen updated Academic (the theme that I’m using to build this website with hugo) with two useful features that I recommend to use: day_night and search.

day_night allows the reader to toggle light and dark color themes for the website. If you look at the top navigation bar on the right you should spot an icon with either a moon (to switch to a dark theme) or a sun (to switch to a light theme).

HowTo: Connect to the SUTD's eduroam using (Arch) Linux

After the post about connecting to SUTD’s VPN is now time to connect eduroam! Again, SUTD’s IT support for (Arch) Linux at the time of writing is none.

SUTD runs a setup with only username-password (no certificates required) and the connection can be established using the GUI of NetworkManager. If your WiFi card is on and eduroam is in your range you should see the eduroam SSID on the list of the available WiFi networks. If you attempt to connect then all you need to do is enter your username and password. As usual, PhD student and staff are separated into different namespaces. Use the username name_surname@sutd.edu.sg if you are a staff member or xxxxxxx@sutd.edu.sg if you are a student (xxxxxxx is your 7-digits student id). The password should be the same as the one you are using to connect to the Internet from SUTD.

S317: MiniCPS Challenges

I recently open-sourced the code that I developed for the MiniCPS challenges for the SWaT Security Showdown (S3) event in 2017.

Here is the code.

The init.sh contains the list of commands that I run on a local testing machine and on the remote AWS instances that we used during the event. The attackers were provided with the VPN credentials to access two different subnetworks in a mixed MiniCPS simulation eg: water treatment (SWaT) and water distribution (WaDI).