No video

DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK

  Рет қаралды 86,992

DEFCONConference

DEFCONConference

Күн бұрын

Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information for developers, security teams, and other stakeholders to understand what has happened or gone wrong within an application. However, logs can also be used to compromise the security of an application by injecting malicious content.
In this presentation, we will explore how ANSI escape sequences can be used to inject, vandalize, and even weaponize log files of modern applications. We will revisit old terminal injection research and log tampering techniques from the 80-90s. Combine them with new features, to create chaos and mischief in the modern cloud cli’s, mobile, and feature-rich DevOps terminal emulators of today.
We will then provide solutions on how to avoid passing on malicious escape sequences into our log files. By doing so, we can ensure that we can trust the data inside our logs, making it safe for operators to use shells to audit files. Enabling responders to quickly and accurately investigate incidents without wasting time cleaning, or having to gather additional data, while reconstructing events.
Welcome to this "not so black and white," but rather quite colorful ANSI adventure, and learn how to cause, or prevent a forensic nightmare.

Пікірлер: 118
@camelotenglishtuition6394
@camelotenglishtuition6394 11 ай бұрын
He's an amazing presenter .. and a gem for the community.. great job Stök ❤
@STOKfredrik
@STOKfredrik 11 ай бұрын
I can’t even start to express how much this comment means to me, it haven’t been a easy path, that’s a fact, so thank you for noticing all the hard work and the love I have for our community.
@camelotenglishtuition6394
@camelotenglishtuition6394 11 ай бұрын
@STOKfredrik you actually inspired me to move into cyber security ..I always had a love for it but saw it as a hobby .. but your video about hacking a hardened target (I think some sort of http smuggling I can't remember exactly ) really rustled my jimmies and convinced me to push on even though it's difficult. I hope that one day I can buy you a beer 🍺 and say thanks
@Krazy0
@Krazy0 11 ай бұрын
Stönks
@lostinspace4417
@lostinspace4417 9 ай бұрын
​@@STOKfredrik14:50 "so even though I was like Fuk Yeah! ..confirmed!" You're a legend, sir!
@XiSparks
@XiSparks 11 ай бұрын
I've never been so nervous to go look at logs.....
@STOKfredrik
@STOKfredrik 11 ай бұрын
Mission accomplished, see it as security awareness training :)
@Leyart86
@Leyart86 11 ай бұрын
This is probably one of the best presentation, if not the best, I ever saw, for any content, ever
@STOKfredrik
@STOKfredrik 11 ай бұрын
Mind blown, thanks, seriously thanks!
@aliasgarkhimani9204
@aliasgarkhimani9204 11 ай бұрын
This is hands down one of the best talks I've ever heard. Good job Stök!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks, happy you liked it!
@aliasgarkhimani9204
@aliasgarkhimani9204 11 ай бұрын
@@STOKfredrik omg you replied, yay!!
@lansing9r
@lansing9r 11 ай бұрын
This is something I highlighted in a comment thread at ISC some years back, I think Johannes wrote a follow-up post about it. Back in the day, ins MS-DOS, you could print an ANSI sequence that would actually redefine what the keys did. So if you pressed space, you'd get "del c:\dos\*" for example ..
@le_david
@le_david 11 ай бұрын
That is sometimes called "ANSI Bombs", I mentioned it in my talk: kzbin.info/www/bejne/j2WkaH6DhqqgnNE
@FriendlyNeighborhoodNitpicker
@FriendlyNeighborhoodNitpicker 10 ай бұрын
I remembered that. It was one of those “coolest thing ever that nobody around you can understand the coolness of” moments, when I discovered that as a teenager playing with the really obscure parts of DOS.
@runejensen3978
@runejensen3978 5 ай бұрын
nice talk :D Remember that the middle of a dark LAN party with few 100 people playing CS 1.5 or was it CS 1.6 when you sent "net send" you could target all machines locally. Maan those nerds got a suntan when all machines in sync switched focus from their game and was forced into Windows! displaying the net send command :D
@udirt
@udirt 11 ай бұрын
i was in a AIX troubleshooting class in ~2005 and the trainer warned us about ever, every opening log files for network services without cleansing them first (and not as root, duh). i try to still stick by that, and any security issue in strings/file or ox or regex libs triggers horrible paranoia. regex especially with mod_security being a massive regex target.
@alexmags
@alexmags 11 ай бұрын
Super fun talk. Very slick! Back i the day you could encode vbScripts (probably because you had secrets in there). Someone made a vbScript decoder. I used to stuff my vbScritps with commented out ASCII DEL characters. After decryption you get an empty file. jättekul!!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Hilarious! Mischief 101
@DAngotti22
@DAngotti22 7 ай бұрын
what a freakin' incredible presentation ~ the timing so poignant and comedic, while never undermining the seriousness of the situation. i'd work with this guy
@myndzi
@myndzi 10 ай бұрын
Fun and interesting talk. I discovered an angle on this many years ago on IRC. UTF-8 sequences can contain certain valid control codes in the 2nd byte and onwards, allowing you to "smuggle" them past sanitization when configuration of things doesn't line up. For example, some users' IRC clients would receive and interpret the byte sequences as UTF-8 but their terminal would honor the control codes. \x9B from the C1 control codes worked as a CSI when I played with it, and can be the second byte of a valid UTF-8 character.
@0xQuito
@0xQuito 11 ай бұрын
this was truly amazing talk! love stoks work for many years now but he always has a fantastic way of conveying his knowledge so detailed but in a digestible way! thanks you!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Wow that’s amazing to hear, mission accomplished, means a lot 🙏
@Vhill7299
@Vhill7299 11 ай бұрын
Very glad this was put on youtube! I've been telling people about this talk since I walked out of it, and now I can send people the video
@oss-gr
@oss-gr 11 ай бұрын
Thanks for the amazing shout-out for dgl -- we think he's amazing, too :D
@STOKfredrik
@STOKfredrik 11 ай бұрын
He is! If it wasn’t for dgl my research wouldn’t have evolved into what it is today.
@SimonRousseau1
@SimonRousseau1 11 ай бұрын
i teared up laughing at the billion peace signs part. you’re the man! keep pushing, love from Canada
@mario196705
@mario196705 10 ай бұрын
nice talk.. i dont knowe so much about ANSI security but did get a lot wiser. thank you very much 4 all time you put in. so easy when you explain it.
@teletele9320
@teletele9320 10 ай бұрын
25 years ago a friend of mine and me implemented a BBS/Chat-Server in plain Java (Java1.2 on linux it was) to replace an existing old c implementation variant which was not maintainable anymore as uni-project. it never got live as the admins of the existing missed features and we did want to code further (after one and a half year extensive daily coding)without going live. we got our uni credits and we learned so much during that time we played a lot with ESC sequences, cursors tabs backspace/delete full color mode and stuff, all stuff which was not possible or mediocre in the c implementation. we did a serverside ncurses like gui builder and and and. and we made it optional to write colored logs Critical in bold red, Medium in yellow and status messages were green with esc sequences all full bells and whistles... at that time until your talk i saw yesterday, i never thought of abusing them for any evil stuff... man we were so naiv and good meaning :D thx for the great talk and bringing back a lot of great memories
@bitegoatie
@bitegoatie 11 ай бұрын
Well done. This talk could use a followup with more nuts-and-bolts detail. I got heavily into all this over twenty years ago because of the explosion of abuse/attacks taking place back then, with a lot of it including or relying upon ANSI escape codes in multiple formats. It wasn't just terminals getting owned and logs getting edited, overwritten, and otherwise abused - it was full-spectrum abuse in browsers, apps, whatever. The issues with ANSI/Unicode abuse are not at all limited to escape sequences. It gets, of course, much worse. But the escape sequences in terminals (or relying on terminals) can do an enormous amount and there is readily available documentation on the general proper usage of these codes. And there are also documented accounts of past abuses, as this video discusses. So this subject captures a core set of built-in abuse vectors that to back to the dawn of computing. This core gets to the core of a big part of why computer networks remain fundamentally indefensible: American-institution stewardship of of computing standards, where those institutions trace back to secrecy-obsessed, transparency-averse, Cold-War agencies tasked with what we euphemistically call intelligence and defense. That last bit (which I include just to emphasize the importance of the topic, taken in general terms) gets too far ahead, however, of what I have in mind. What people could use now, it seems - smart or otherwise - would be a detail-focused companion presentation to this brilliant, decades-spanning introduction by Stök.
@__koaaa_9619
@__koaaa_9619 11 ай бұрын
7:21 fun fact, there is an xterm OSC escape sequence reserved for emacs shell
@itsamemarkus
@itsamemarkus 11 ай бұрын
This was such an entertaining presentation. Had a good time watching it. Very well done.
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks! Happy you liked it!
@hectorvivis3651
@hectorvivis3651 11 ай бұрын
Such an entertaining talk, with great implications. Great job!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks 🙏
@xnl-h4ck3r
@xnl-h4ck3r 11 ай бұрын
Only just got chance to watch this now. Great work Stök , and it was great to hear you talking again. I know it was a 40 minute talk, but I can't imagine the amount of hard work and time that went into that 🤘
@dmacpher
@dmacpher 11 ай бұрын
This guy is super compelling! Really fun presentation
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks, happy you liked it !
@evildojo666
@evildojo666 11 ай бұрын
Jesus Christ Stok you guys have changed the game entirely, way to go!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Good times, but I’m standing on the shoulders of giants, just viewing it in another perspective with a malicious mindset.
@chsovi7164
@chsovi7164 9 ай бұрын
my immediate thought after hearing about changing colours and needing to end the colour change with another escape sequence was that you could make all text the same colour as the terminal background. or maybe just some of the text
@Mercurio-Morat-Goes-Bughunting
@Mercurio-Morat-Goes-Bughunting 10 ай бұрын
11:00 "Is this even a security issue?" This is the long, long shadow of Master Mode and "Old = New(new)" is absolutely spot on, in this case. History repeats not because people don't know history but because they do.
@jfbeam
@jfbeam 9 ай бұрын
Yes and No. This is just another view of failing to follow best practices. Too many things will use user input without validation or sanity. For example, whatever you type in at the login prompt will blindly be logged by "login" -- "Unknown user: [unsanitized user input]" If you ever allow that log message to be sent to any terminal without any filtering, you have a _potential_ problem. It's been the same _potential_ problem since escape sequences were invented. We've only made them *worse* over the years.
@Mercurio-Morat-Goes-Bughunting
@Mercurio-Morat-Goes-Bughunting 9 ай бұрын
@@jfbeam any programmer who fails to filter any data field in their software isn't competent to work in the industry.
@jfbeam
@jfbeam 9 ай бұрын
@@Mercurio-Morat-Goes-Bughunting I can't disagree. Most programmers *shouldn't be.*
@1337bitcoin
@1337bitcoin 11 ай бұрын
Great talk!
@dguglielmo
@dguglielmo 11 ай бұрын
What a legend. Wish I had a brain that worked like this. Also what a killer presentation!
@SERGEX42069
@SERGEX42069 11 ай бұрын
We all need more attitudes like Stök on our teams.
@STOKfredrik
@STOKfredrik 11 ай бұрын
❤✌️
@user-jb8yv
@user-jb8yv 11 ай бұрын
really great stuff man! i love the ideas building on ideas with comedy, awesome!
@STOKfredrik
@STOKfredrik 11 ай бұрын
It’s a fine balance and a graceful dance to mix deep tech with comedy to entertain the neurodiverse mind.
@DJChadHardcastle
@DJChadHardcastle 10 ай бұрын
Loved this! Stök always impresses!
@thewholeworldblurred
@thewholeworldblurred 8 ай бұрын
This guy and his videos got me into infosec. So glad to see my boy at DefCon!
@huangnova
@huangnova 5 ай бұрын
Woohoo!!!! STOK great talk man!
@SK8Jensen
@SK8Jensen 11 ай бұрын
Great talk! Keep up the good work!
@FriendlyNeighborhoodNitpicker
@FriendlyNeighborhoodNitpicker 10 ай бұрын
Never heard of him, but he is quite a fun presenter. And I will never work with log files the same way again. I knew about these back in the day, and also what you could do with them on terminals because I use a lot of ncurses stuff,, but I never really thought of the impact they could have through injection.
@oussamamessabih6258
@oussamamessabih6258 11 ай бұрын
nice to see stok presenting in defcon 🔥
@albaragone2632
@albaragone2632 6 ай бұрын
Great presentation, you are a fun crazy man! Kind regards. Mrs. Ragone
@SleepyMagii
@SleepyMagii Ай бұрын
Yoo Stök!! Youre amazing, one of the best !
@user-nt5ib6me6f
@user-nt5ib6me6f 9 ай бұрын
That's pure gold Hay stock I know u are going through a lot mantlly I really hope u ll get well soon And u come back soon May the karma be with u
@redonkk
@redonkk 11 ай бұрын
This guy had me in the first 60 seconds
@Drew-my5sd
@Drew-my5sd Ай бұрын
The best professor
@IIIIIIIIIIIllllllIIIIIIIIIII
@IIIIIIIIIIIllllllIIIIIIIIIII 11 ай бұрын
Thanks for the talk, very passionate :)
@STOKfredrik
@STOKfredrik 11 ай бұрын
You are welcome!
@robertbruce7686
@robertbruce7686 9 ай бұрын
Woke me up... 😂. Excellent presentation and wired dude. 👍👍
@tiagotiagot
@tiagotiagot 10 ай бұрын
Wow, he got video and audio to work live first try!
@freem4nn129
@freem4nn129 5 ай бұрын
nice ! best energy ever
@squid13579
@squid13579 11 ай бұрын
Thor After Love and Thunder. 🔥
@SolidIncMedia
@SolidIncMedia 11 ай бұрын
Wow, I didn't know Macaulay Culkin was big into ANSI escape sequences!
@nonickch
@nonickch 10 ай бұрын
Hey, it's 98 again. I remember my takeaway from back then was to use less instead of more
@kuliserper
@kuliserper 11 ай бұрын
Thats cooooolll!!!!
@jekyllpark5570
@jekyllpark5570 10 ай бұрын
8:00 Since editors nowadays (and their syntax highlighting) don't really like brackets that aren't closed, I tend to use "\033\133" instead of "\e[".
@gcl2783
@gcl2783 11 ай бұрын
Balls. I even use this in my bashrc # Function to set the title of the window function retitle(){ echo -ne "\033]2;$1\007" } # Export to allow scripts to retitle the window they're run in. export -f retitle
@STOKfredrik
@STOKfredrik 11 ай бұрын
Haha rip ❤️🪦
@0x0d4y
@0x0d4y 11 ай бұрын
Amazing talk!!
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks, happy you liked it
@lancemarchetti8673
@lancemarchetti8673 11 ай бұрын
I majorly use ANSI mode when editing images in Notepad++ it just makes it more visually enjoyable to work with. Opening up jpg, png or avif code can look pretty crazy in utf-8 xthis xthat...lol😂
@ColtonBrummell
@ColtonBrummell 11 ай бұрын
This dude is awesome.
@STOKfredrik
@STOKfredrik 11 ай бұрын
Thanks
@cybrshdw5465
@cybrshdw5465 10 ай бұрын
I had a friend back in the early to mid 1990's tell another friend of mine he put an ansi bomb into a video memory of a BBS me and him had a good laugh but my other friend ended up called the bbs provider and tell them that he had done this and they ended up shutting down the POP dial IN number for a week
@ThePredator315000
@ThePredator315000 9 ай бұрын
the G.O.A.T
@prescientdove
@prescientdove 11 ай бұрын
ansi escape codes turing complete? :)
@STOKfredrik
@STOKfredrik 11 ай бұрын
Don’t fully understand, but it’s a very interesting area and things definitely are happing in this space,
@ConanDuke
@ConanDuke 4 ай бұрын
His accent makes it impossible. I'll read the transcript, Thor.
@MrRoboticBrain
@MrRoboticBrain 8 ай бұрын
This talk makes me scared of using cat! Every once in a while i open a binary log/file with cat accidentally and the terminal rightfully barfs at me for doing it. But i never imagined rouge escape sequences could actually cause that much damage when abused by an attacker! yikes!
@Luftbubblan
@Luftbubblan 9 ай бұрын
Snyggt jobbat
@mateo__2023
@mateo__2023 11 ай бұрын
amazing wow 👏👏👏👏
@STOKfredrik
@STOKfredrik 11 ай бұрын
❤🙏✌️
@sjoervanderploeg4340
@sjoervanderploeg4340 11 ай бұрын
You know what I hate? When I ask for logs and get EDITED logs, because people think they can read logs themselves... they can not.
@sjoervanderploeg4340
@sjoervanderploeg4340 11 ай бұрын
strings badlog.txt [31mESC-INJECTION: [32mSUCCESSFUL
@sjoervanderploeg4340
@sjoervanderploeg4340 11 ай бұрын
How dare you mock us MUD players!
@FinanceLogic
@FinanceLogic 10 ай бұрын
4:45 this is gonna be good. what about all that alexa stuff with this. sounds dangerous edit:sp
@kuraz
@kuraz 11 ай бұрын
6:52 did that apostrophe get injected there via a rogue ANSI escape sequence?
@filamentofbulb
@filamentofbulb 11 ай бұрын
Soo cool
@moneyluser5711
@moneyluser5711 11 ай бұрын
All your log are belong to us
@STOKfredrik
@STOKfredrik 11 ай бұрын
Indeed
@nayuku4147
@nayuku4147 7 ай бұрын
is polyglot from 25:22 public somewhere to download?
@ShahabSheikhzadeh
@ShahabSheikhzadeh 11 ай бұрын
Talk doesn't start till ~6:45. Be warned, obscene amount of memes, GIFs, and such. Also, what's old is new again. I guess showiness, having a brand and tons of followers is what gets you the ability to present talks.
@STOKfredrik
@STOKfredrik 11 ай бұрын
Well yes and no, you still have to pass a peer review and provide either new research or as in this case, a fresh look at something old. having a personal brand and showmanship definitely helps, adding comedy and a fast paced visual flow keeps the audience attention. And yes you are right, my presentation style isn’t for everyone, and that’s ok, But thanks for taking your time to comment and leave feedback, appreciate it.
@ShahabSheikhzadeh
@ShahabSheikhzadeh 11 ай бұрын
@@STOKfredrik I think the only thing I'd add in the future would be a bit more history on the on the ANSI escape sequences. I think that would be helpful for newer generations to understand some of that. The context you added about what each terminal prefers is fantastic, I feel like in general that's glossed over/obscure. Also, your timing is fantastic considering the quantity of slides you presented. :)
@Btc_bott
@Btc_bott 9 ай бұрын
If you put it at .75 playback speed its a lot better
@mariarahelvarnhagen2729
@mariarahelvarnhagen2729 11 ай бұрын
Playing Discworld
@Tonu
@Tonu 11 ай бұрын
Too much bells and whistles
@STOKfredrik
@STOKfredrik 11 ай бұрын
Ding!
@blazedank100
@blazedank100 11 ай бұрын
Couple years back I tried to reach out to bro to collab on some bounties and he jus ignored me lol
@mirozbiro
@mirozbiro 3 ай бұрын
what is a real content?
@kahunablinginz6838
@kahunablinginz6838 10 ай бұрын
I'm disappointed how the audience was silent when he said you could print stuff .. hahaha the audience must not be programmers 🤣🤣🤣
@urban5950
@urban5950 11 ай бұрын
STÖK i decrypt your msg at 2:20 on that alaram clock
@STOKfredrik
@STOKfredrik 11 ай бұрын
😂💪
@Tuckerslam
@Tuckerslam 11 ай бұрын
This pseudohuman thing is a great demonstration of why drugs are bad for you.
@STOKfredrik
@STOKfredrik 11 ай бұрын
If in doubt, add moar..
@LumocolorARTnr1319
@LumocolorARTnr1319 11 ай бұрын
Great talk!
DEF CON 31 - Private Keys in Public Places - Tom Pohl
40:06
DEFCONConference
Рет қаралды 51 М.
Incredible Dog Rescues Kittens from Bus - Inspiring Story #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 33 МЛН
This Dumbbell Is Impossible To Lift!
01:00
Stokes Twins
Рет қаралды 42 МЛН
Фейковый воришка 😂
00:51
КАРЕНА МАКАРЕНА
Рет қаралды 4,9 МЛН
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
34:39
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
47:34
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 593 М.
How I cracked an impossible DEF CON challenge
22:16
Theo - t3․gg
Рет қаралды 47 М.
My Trip to DEF CON & Black Hat
26:35
LiveOverflow
Рет қаралды 48 М.
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference
41:18
DEFCONConference
Рет қаралды 613 М.
Incredible Dog Rescues Kittens from Bus - Inspiring Story #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 33 МЛН