kinectasploitv2
kinectasploitv2 copied to clipboard
kinectasploitv2
kinectasploit v2 Jeff Bryner 7/2012 as released at DEFCON20
Kinectasploit is a blender 3d game environment using the microsoft kinect and a bunch of security tools to hack into computers using gestures.
Videos of the environment are avaialble at http://p0wnlabs.com/defcon20
The scenario requires a fairly specific setup including VMs with specific vulnerabilities, loads of tools, etc. Here's an attempt to outline what you need to play it:
- blender (blender.org)
- microsoft kinect
- osceleton (github; connects to the kinect and sends OSC joint data to blender)
- iwlist (discovers access points)
- airomon (creates an AP monitor port)
- airdump (dumps AP packets to a pcap file)
- aircrack-ng (cracks wep keys from the pcap file)
- pytwitter (used to get timeline data from twitter while waiting for jobs to finish)
- snort (used to alert you when you are noisyly hacking a network)
- ip route (used to show what networks you are attached to and can scan)
- nmap (used to scan networks for victims)
- graphviz (graphs nmaps traceroute output)
- nessus (scans victims for vulns; should find an open share on the windows vm below)
- smbclient (used by ettercap to retrieve a pcap file from the windows open share)
- ettercap (rifles through the pcap file to retrieve creds)
- wget (scans a server for acessible urls)
- sqlmap (breaks into web systems to retrieve passwords)
- john the ripper (cracks database hashes for creds that can be used in metasploit)
- metasploit (uses psexec and nbd_server.rb to get a forensic block device on the windows vm)
- nbd-client (connects your attacking linux machine to the victim windows vm)
- fls (searches the nbd device for RECYCLER files)
- icat (retrieves files from the nbd device)
- rifiuti (searches the INFO2 file in RECYCLER for file information)
- a windows vm with an open smb share containing a pcap file with creds to:
- a linux vm running sqlol (or any vulnerable sqlinjectable web app) with creds to the above windows box
- a hypervisor capable of running the above vms (kvm works well)
Complex, I know but that was the point ;-] to include many, many tools in a graphical, gesture-driven environment and have them useful enough to hack into a system and retrieve a file from the windows VM's RECYCLE bin folders.