Open Hackerspace day NL: march 29

poster

On Saturday March 29th, Randomdata participates in the international open Hackerspaces day . Anyone who wants to see what we do and how we work is welcome to visit our hackerspace between 12:00 and 20:00.

Our doors will be open all day for anyone with a general interest in programming, 3D printing, electronics, etc...  During the open day we also have a number of activities in which you can participate:

  • there will be an "arduino 101" which gives you the opportunity to get started with electronics and microcontrollers;
  • there will be a demonstration of how to crack a wireless home-alarm;
  • you can see a 3D printer in action and print your own 3D design;
  • and you can see some of our current projects.

Want to know more? Come and visit us at the Parkstraat in Utrecht! See the contact page for details on how to get in.

Mate Statistics 2013

Mate stats 2013

The clubmate stats are announced!

HITR2NDB 2013 Edition

Hitr2ndb logo




In December the groups Hack in The Box, 2600NL and Randomdata organized again a new edition of HITR2NDB (Hack In The Random 2600 NL Data Box).






The agenda was promising again from hardcore tech to inspiring community talks:

  • Opening – by Fish_ and Junk
  • RIPE aTTYlas – by Ardillo
  • Speed and Size-Optimized Implementations of the PRESENT Cipher for
    Tiny AVR Devices – by Kostas Papagiannopoulos and Aram Verstegen
  • ‘What is Deeeezzzzeeee?’ Got root < 5 minutes – by SYNNACK
  • The Noble Art of Wasting Time – by Peter ‘blasty’ Geissler
  • One gadget to rule them all – by Brainsmoke
  • #HOSSEL DIE SMATJE – by Flunk
  • The Dubai Taxi Driver – by Mark Fonseca Rendeiro

You can find the video’s of HITR2NDB at the youtube channel of Randomdata

Where is your data?

Last months there was a lot of news about PRISM where Snowden told the people what the capabilities the secret services in America and the UK possess.
This news had a lot of impact but we didn't see a lot of people moving in the Netherlands. Therefore we spoke with NRC Next to see how we could facilitate in making the PRISM issue more touchable to the public. We decided to create a tool for the NRC Next where they where able to investigate email traffic of large Dutch companies. Companies that are processing sensitive and/or private information, assumable also by email.
The result is quite interesting and therefore we decided to make a part of this toolset also available to the public called: whereismydata.nl (waarismijndata.nl, see below).
The tool searches for the domain name servers of your email address' its domain, it will do a check on the location of these server by matching it to the GEOIP database.
NRC Next used a more advanced version of the tools where also WHOIS and Traceroutes where combined to the final conclusions.

Note: not only the location of the mailservers is a risk within PRISM, also the location of the entity and its sysadministration of your mailservers is a risk.

So what to do?
First check where your mailservers are located with our prismdigger:

If your mailservers are located in the USA: GET AWAY, move to a new provider etc.
If your mailservers aren't located in the USA, it still could be an American entity, to be sure: ask your provider.

With our "simple tool" we hope to make it more visable to the public on where your email is being processed. If you have any question, just let us know.

Video blog: 3D printing workshop

At the 1st of October we had an awesome 3D printing workshop organized by Harmless:

A short video impression:


The details of the workshop (wiki)

Randomdata meets IVIR

Last month Ardillo and I were invited to present a hacking workshop for non-hackers. The group, called Instituut voor Informatierecht (IViR), is affiliated with the Faculty of Law of the University of Amsterdam and contained a large amount of legal advisors, professors and students. About 30 people attended our workshop which we compiled especially for this group.

Our agenda contained a few main subjects and demos:

Workstation security

How secure is your workstation, what's the value of a password and how can you bypass these mechanisms. We showed the group how easy it is to find passwords, to crack them if they are not strong enough, how you can overwrite the password and also how to disable the password mechanism based on a DMA (Direct Memory Access) Attack.

Wireless security

Everybody is using wireless hotspots nowadays, did you remember the "FREEPUBLICWIFI" id's in the air when you were drinking your cup of coffee at a look-a-like Starbucks?
But what can go wrong, and how can you attack these systems? Well, by our man in the middle (Ardillo), it became quite clear it's easier than you though.

Breaking alarm systems

To bridge the gap between software and hardware, and to make security more "touchable" we decided to explain how wireless alarms can be hacked, bypassed and disarmed.
One of the attendees was even using the same system we used for this demo, he was quite convinced the alarm system wasn't delivering that what (where) he paid for.

DIY Arduino


After all these demos it was time to DIY, the 30 attendees joined our Arduino workshop in pairs of 2. In 1 hour everybody was able to program their own micro-controller and play around with LEDs :-)
Some even had time to build a "Knight Rider"! :-)

Results

This workshop was of course organized for IVIR to make security and hacking more touch-able, on the other side it was great for me and Ardillo to see how a totally new public was responding to technical subjects we presented.
A few of our major conclusions:
* More than average technical skilled people, we even had people working with Ubuntu, "if then else" functions and PGP :-)
* For Arduino: Windows and serial-ports is still crap :p
* We had a lot of questions: and how do you solve this issue, we even started an idea to create easy vpn solutions. We (the techies) are still not able to create a user friendly solution and we should (more to come ;-))
* On the wireless communication part we had somebody asking about security on medical support systems, like pacemakers, insulin pumps, etc. It might be worth to investigate this, although we didn't came to an ethical solution if we find a #zeroday.

The overall conclusion:

It was well worth to do these workshops with a variety of groups, we (the techies) can learn a lot from other people and that's why we are going to search for a wider public for this type of presentations/workshops. It will enlarge the awareness, will give people the chance to understand tech and last but not least, it gives us the chance to understand what is important at a wider public.
Our focus for now is on:
- NG (Next Generation) hackers: kids in multiple ages, we should invest more time and energy in our future
- Teachers: see how the NG hackers are getting their current skills, where can we (the techies) help?
- Other acadamic's like Docters, etc. to detect more vulnerability's in our every day life's
- CEO's, to see how people on higher level of company's are aware
- Politicians: if we want to rule the world, we should at least be able to understand politics.

We would like to thank IVIR to work together, it was a pleasure!
kthxbye, Fish_ & Ardillo
Refferal:
- The slides of the day
- Cold boot attack explained
- Man in the Middle

Hack in The Random 2600 NL Data Box @ OHM2013

We're going to the OHM2013 camping event. At this moment we have to make some arrangements on the gear, 0xf00d and other important stuff. The organizing of our village can be followed on our wiki - OHM2013.
The HITR2NDB village is on the OHM Village page as well.

For more information about OHM2013 you van visit the OHM website

You can find our camp during ohm on the S5 spot, yes the crazy ones ;-):

Wallboard display - reverse engineering

image
So I got a wallboard display, power adapter, a moxa eth-rs232 converter and cable for free :-) No software, driver or whatsoever further included.

What to do with it?

Well mostly for the sake of investigation and making it work together gets me satisfied !

The final result

To not waste your time. The final result is

An online page where you can send text and effect to the wallboard.

Read the rest of the blog

Another year Randomdata at Hack in The Box (#HITB2013AMS)



Randomdata was invited again to join this years Hack in The Box' commsec village.
This years Commsec village consisted out of various hackerspaces but also some other communities like OWASP Netherlands, OHM2013 and Nikhef.
A wide range of hardware was available in the villages including 3D printers, Alarm systems, Old computers, LED's, OWASP rockets (grr!) and much, much more.

Media
On the media side the Commsec village was a popular place to take photos, also the Dutch television was enjoying the hacky environment. HITB came in the news a lot with subjects but of course most media was interested in "old DDOS news", I'm glad we could convince them there where better subjects! You can find items on CNN, RTL Nieuws, Nieuwsuur but also the newspapers/sites had more then average attention for all the hackers.

CTF
The CTF was inspired by the game Pole position, the title was PWN position and the scoreboard was a racetrack!

One of the challenges at the CTF was supplied by Randomdata, we used one of the wireless alarms where we added a wireless sniffer and transmitter to. The challenge was to sniff the wireless signal, decode the pulses and find the "code" of the system. The easiest was to check the Randomdata wiki but the alarm was "anonymous" so it wasn't that easy. Second way was to sniff a "on" and "off" code, compare them and BOOM!

Presentations
There were a lot of great talks this year; talks about aircraft hacking, failing customs, how Canon cameras can be used as spycams, and of course great keynotes!
For The Netherlands there where some hi-impact ones too:
*Wilco Baan Hofman, a friend of Randomdata and Bitlair member, was presenting a talk about alarm protocols (remember HITR2NDB?)
*Blasty presented a leak in KPN routers, I do have to say they fixed it fast and I liked their response :-)

You can find a copy of the slides at the

All in all another great HITB conference, let's hope 2014 will bring one as well!

Open dag Hackerspaces @Randomdata


De open hackerspace dag was voor ons een succes. Gedurende de dag zijn er ongeveer 20 personen langs gekomen om eens te kijken wat een hackerspace is. We hadden een 3D printer werkend die onderdelen aan het printen was voor een andere printer en een aantal bezoekers hebben wat gewerkt op een Raspberry Pi. In de middag heeft nog iemand zijn router voorzien van OpenWRT. Verder is er veel gepraat over een hackerspace en wat mensen ertoe bracht om eens een bezoek te brengen.


Ook is het Utrechts Dagblad nog even langs geweest en heeft een leuk artikel geplaatst:

Pages

Subscribe to Randomdata RSS
2013 © All rights pwned by Randomdata ;-) randomdata