Mate Statistics 2013

Mate stats 2013

The clubmate stats are announced!

HITR2NDB 2013 Edition

Hitr2ndb logo

In December the groups Hack in The Box, 2600NL and Randomdata organized again a new edition of HITR2NDB (Hack In The Random 2600 NL Data Box).

The agenda was promising again from hardcore tech to inspiring community talks:

  • Opening – by Fish_ and Junk
  • RIPE aTTYlas – by Ardillo
  • Speed and Size-Optimized Implementations of the PRESENT Cipher for
    Tiny AVR Devices – by Kostas Papagiannopoulos and Aram Verstegen
  • ‘What is Deeeezzzzeeee?’ Got root < 5 minutes – by SYNNACK
  • The Noble Art of Wasting Time – by Peter ‘blasty’ Geissler
  • One gadget to rule them all – by Brainsmoke
  • #HOSSEL DIE SMATJE – by Flunk
  • The Dubai Taxi Driver – by Mark Fonseca Rendeiro

You can find the video’s of HITR2NDB at the youtube channel of Randomdata

Where is your data?

Last months there was a lot of news about PRISM where Snowden told the people what the capabilities the secret services in America and the UK possess.
This news had a lot of impact but we didn't see a lot of people moving in the Netherlands. Therefore we spoke with NRC Next to see how we could facilitate in making the PRISM issue more touchable to the public. We decided to create a tool for the NRC Next where they where able to investigate email traffic of large Dutch companies. Companies that are processing sensitive and/or private information, assumable also by email.
The result is quite interesting and therefore we decided to make a part of this toolset also available to the public called: (, see below).
The tool searches for the domain name servers of your email address' its domain, it will do a check on the location of these server by matching it to the GEOIP database.
NRC Next used a more advanced version of the tools where also WHOIS and Traceroutes where combined to the final conclusions.

Note: not only the location of the mailservers is a risk within PRISM, also the location of the entity and its sysadministration of your mailservers is a risk.

So what to do?
First check where your mailservers are located with our prismdigger:

If your mailservers are located in the USA: GET AWAY, move to a new provider etc.
If your mailservers aren't located in the USA, it still could be an American entity, to be sure: ask your provider.

With our "simple tool" we hope to make it more visable to the public on where your email is being processed. If you have any question, just let us know.

Video blog: 3D printing workshop

At the 1st of October we had an awesome 3D printing workshop organized by Harmless:

A short video impression:

The details of the workshop (wiki)

Randomdata meets IVIR

Last month Ardillo and I were invited to present a hacking workshop for non-hackers. The group, called Instituut voor Informatierecht (IViR), is affiliated with the Faculty of Law of the University of Amsterdam and contained a large amount of legal advisors, professors and students. About 30 people attended our workshop which we compiled especially for this group.

Our agenda contained a few main subjects and demos:

Workstation security

How secure is your workstation, what's the value of a password and how can you bypass these mechanisms. We showed the group how easy it is to find passwords, to crack them if they are not strong enough, how you can overwrite the password and also how to disable the password mechanism based on a DMA (Direct Memory Access) Attack.

Wireless security

Everybody is using wireless hotspots nowadays, did you remember the "FREEPUBLICWIFI" id's in the air when you were drinking your cup of coffee at a look-a-like Starbucks?
But what can go wrong, and how can you attack these systems? Well, by our man in the middle (Ardillo), it became quite clear it's easier than you though.

Breaking alarm systems

To bridge the gap between software and hardware, and to make security more "touchable" we decided to explain how wireless alarms can be hacked, bypassed and disarmed.
One of the attendees was even using the same system we used for this demo, he was quite convinced the alarm system wasn't delivering that what (where) he paid for.

DIY Arduino

After all these demos it was time to DIY, the 30 attendees joined our Arduino workshop in pairs of 2. In 1 hour everybody was able to program their own micro-controller and play around with LEDs :-)
Some even had time to build a "Knight Rider"! :-)


This workshop was of course organized for IVIR to make security and hacking more touch-able, on the other side it was great for me and Ardillo to see how a totally new public was responding to technical subjects we presented.
A few of our major conclusions:
* More than average technical skilled people, we even had people working with Ubuntu, "if then else" functions and PGP :-)
* For Arduino: Windows and serial-ports is still crap :p
* We had a lot of questions: and how do you solve this issue, we even started an idea to create easy vpn solutions. We (the techies) are still not able to create a user friendly solution and we should (more to come ;-))
* On the wireless communication part we had somebody asking about security on medical support systems, like pacemakers, insulin pumps, etc. It might be worth to investigate this, although we didn't came to an ethical solution if we find a #zeroday.

The overall conclusion:

It was well worth to do these workshops with a variety of groups, we (the techies) can learn a lot from other people and that's why we are going to search for a wider public for this type of presentations/workshops. It will enlarge the awareness, will give people the chance to understand tech and last but not least, it gives us the chance to understand what is important at a wider public.
Our focus for now is on:
- NG (Next Generation) hackers: kids in multiple ages, we should invest more time and energy in our future
- Teachers: see how the NG hackers are getting their current skills, where can we (the techies) help?
- Other acadamic's like Docters, etc. to detect more vulnerability's in our every day life's
- CEO's, to see how people on higher level of company's are aware
- Politicians: if we want to rule the world, we should at least be able to understand politics.

We would like to thank IVIR to work together, it was a pleasure!
kthxbye, Fish_ & Ardillo
- The slides of the day
- Cold boot attack explained
- Man in the Middle

Hack in The Random 2600 NL Data Box @ OHM2013

We're going to the OHM2013 camping event. At this moment we have to make some arrangements on the gear, 0xf00d and other important stuff. The organizing of our village can be followed on our wiki - OHM2013.
The HITR2NDB village is on the OHM Village page as well.

For more information about OHM2013 you van visit the OHM website

You can find our camp during ohm on the S5 spot, yes the crazy ones ;-):

Wallboard display - reverse engineering

So I got a wallboard display, power adapter, a moxa eth-rs232 converter and cable for free :-) No software, driver or whatsoever further included.

What to do with it?

Well mostly for the sake of investigation and making it work together gets me satisfied !

The final result

To not waste your time. The final result is

An online page where you can send text and effect to the wallboard.

Read the rest of the blog

Another year Randomdata at Hack in The Box (#HITB2013AMS)

Randomdata was invited again to join this years Hack in The Box' commsec village.
This years Commsec village consisted out of various hackerspaces but also some other communities like OWASP Netherlands, OHM2013 and Nikhef.
A wide range of hardware was available in the villages including 3D printers, Alarm systems, Old computers, LED's, OWASP rockets (grr!) and much, much more.

On the media side the Commsec village was a popular place to take photos, also the Dutch television was enjoying the hacky environment. HITB came in the news a lot with subjects but of course most media was interested in "old DDOS news", I'm glad we could convince them there where better subjects! You can find items on CNN, RTL Nieuws, Nieuwsuur but also the newspapers/sites had more then average attention for all the hackers.

The CTF was inspired by the game Pole position, the title was PWN position and the scoreboard was a racetrack!

One of the challenges at the CTF was supplied by Randomdata, we used one of the wireless alarms where we added a wireless sniffer and transmitter to. The challenge was to sniff the wireless signal, decode the pulses and find the "code" of the system. The easiest was to check the Randomdata wiki but the alarm was "anonymous" so it wasn't that easy. Second way was to sniff a "on" and "off" code, compare them and BOOM!

There were a lot of great talks this year; talks about aircraft hacking, failing customs, how Canon cameras can be used as spycams, and of course great keynotes!
For The Netherlands there where some hi-impact ones too:
*Wilco Baan Hofman, a friend of Randomdata and Bitlair member, was presenting a talk about alarm protocols (remember HITR2NDB?)
*Blasty presented a leak in KPN routers, I do have to say they fixed it fast and I liked their response :-)

You can find a copy of the slides at the

All in all another great HITB conference, let's hope 2014 will bring one as well!

Open dag Hackerspaces @Randomdata

De open hackerspace dag was voor ons een succes. Gedurende de dag zijn er ongeveer 20 personen langs gekomen om eens te kijken wat een hackerspace is. We hadden een 3D printer werkend die onderdelen aan het printen was voor een andere printer en een aantal bezoekers hebben wat gewerkt op een Raspberry Pi. In de middag heeft nog iemand zijn router voorzien van OpenWRT. Verder is er veel gepraat over een hackerspace en wat mensen ertoe bracht om eens een bezoek te brengen.

Ook is het Utrechts Dagblad nog even langs geweest en heeft een leuk artikel geplaatst:

Open day NL Hackerspaces

Randomdata is also joining the "Open day of the Dutch hackerspaces". Always wanted to know what hackers do and who we are? Well, this is your chance! Check out our wiki page with sample activity's. We will be open from 10:00 till 17:00 but we might stay open until late if enough people come over and would like to hang out at the space.
Message for the press: please contact us in advance.

The press release in Dutch of

Op 30 maart 2013 openen hackerspaces in Nederland haar deuren voor iedereen die wil weten wat echte hackers zijn en wat ze doen. Nederland telt momenteel twaalf hackerspaces.

Van vork naar iPhone-standaard, van pallet naar stoel, van eenvoudig speelgoed ombouwen naar een toonaangevend muziekinstrument, van oud laken naar kledingstuk of beamerscherm, een koffieautomaat aanzetten met je mobiel, van je WiFi-router een radio maken. Klinkt dit bekend? Dan ben je een hacker: hacken is alledaags en met de juiste mindset kan iedereen een hacker zijn. Dat laten de Nederlandse hackerspaces zien tijdens hun open dag. Vorig jaar bezochten ruim 300 mensen de allereerste open dag, wat werd gezien als een succes. Op 30 maart laten de hackerspaces opnieuw zien dat de hackergemeenschap een omvangrijk spectrum aan interesses kent, en ook een rijke historie heeft; zo komt bijvoorbeeld internetprovider XS4ALL voort uit de hackerswereld.
Vandaag de dag zijn er meer dan tien hackerspaces in Nederland: open werkplaatsen waar wordt geprogrammeerd, gesoldeerd, geknutseld en gediscussieerd. Ook worden er vaak lezingen en workshops gehouden.

Termen als ethisch hacken, knuffelhackers en vrije kennis worden graag uitgelegd. Delen van kennis, ook op technisch en ethisch vlak, wordt door veel hackerspaces gezien als een kernwaarde. “Veel projecten die in de space worden gemaakt staan ook gedocumenteerd op internet. Zo kunnen andere geinteresseerden het project hergebruiken of verbeteren”, aldus Dave Borghuis, initiatiefnemer van de open dag en oprichter van Twentse hackerspace TkkrLab. “Een simpele vraag over de werking of het maken van iets leidt snel tot samenwerking en dus kennisdeling. Dat is heel toegankelijk en heeft met meer dan alleen computers te maken.”

Hackers maken graag dingen, zo vinden oude spullen regelmatig een weg naar de hackerspace. Een motor van een oude mixer wordt bijvoorbeeld gebruikt om een autootje aan te drijven. Maar ook nog niet bestaande spullen worden zelf vervaardigd met 3D printers en andere gereedschappen, hackers maken hun eigen nieuwe electronica of schrijven hun eigen software. Allemaal gebaseerd op open en vrij beschikbare kennis die daarna volop en actief wordt gedeeld.

De open dag is een kleurrijk geheel met activiteiten door het hele land. Iedere hackerspace geeft hieraan een eigen invulling. Een willekeurige greep uit de onderwerpen die aan bod komen: producten maken met 3D printers, het gebruik van lasersnijders, workshops solderen en elektronica voor beginners, lockpicking, veilig surfen op internet en nog veel meer. Voor een overzicht van de activiteiten en openingstijden per space kan men terecht op

Iedereen is welkom om een kijkje te nemen. Om 10:00 uur ‘s ochtends openen de deuren, om 17:00 is het dagprogramma afgelopen. Sommige spaces zijn ook ‘s avonds geopend.

Aanmelden is niet nodig, het wordt wel op prijs gesteld dat pers zich vooraf meldt.

Deelnemende hackerspaces:
Amersfoort: Bitlair
Amsterdam: Technologia Incognita
Almere: Sk1llz
Arnhem: Hack42
Den Haag: Revelation Space
Enschede: TkkrLab
Heerlen: ACKspace
Leeuwarden: Frack
Wageningen: NURDspace
Utrecht: RandomData


Subscribe to Randomdata RSS
2013 © All rights pwned by Randomdata ;-)