Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Icue QL140 RGB 140Mm PWM Single Fan SKU Sheets 1 CORSAIR Icue QL140 RGB 140Mm PWM Single Fan
CORSAIR iCUE QL140 RGB 140mm PWM Single Fan Embargo Date 14-Nov-19 First Customer Ship Date 8-Nov-19 Product Etail Title CORSAIR QL140 RGB 140mm Fan RGB Product Title CORSAIR iCUE QL140 RGB 140mm PWM Single Fan Product Name CORSAIR QL Series, QL140 RGB, 140mm RGB LED Fan, Single Pack Pre Order Option No Product Imagery Image Asset Overview 25 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Overview 50 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Pair with an existing QL140 RGB Dual Fan Kit or a CORSAIR iCUE RGB lighting controller (sold separately) to control and synchronize your RGB lighting through CORSAIR iCUE software. Keep your system cool with PWM speeds up to 1,250 RPM. OverviewOverview 100 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Pair with an existing QL140 RGB Dual Fan Kit or a CORSAIR iCUE RGB lighting controller (sold separately) to control and synchronize your RGB lighting through CORSAIR iCUE software. Keep your system cool with PWM speeds up to 1,250 RPM with a 140mm fan blade engineered to ensure both low noise operation and outstanding lighting. Complete with front and back-facing metal logos on the hub and anti-vibration rubber dampers to reduce vibration noise, QL140 RGB fans create spectacular lighting that doesn’t choose sides. -
The Air-Gap Jumpers
Ben-Gurion University of the Negev The Air-Gap Jumpers Mordechai Guri, PhD The Head of R&D, Cyber-Security Research Center Ben-Gurion University of the Negev, Israel About Me Computer scientist (PhD) Head of R&D Cyber-Security Research Center, BGU Co-founder of Morphisec Endpoint Security Research focus Advance Persistent Threats (APTs), Rootkits Security of embedded systems Low-level attacks/defense Mobile security Air-gap security A profile on my research at WIRED by Andy Greenberg: https://www.wired.com/story/air-gap-researcher-mordechai-guri/ Ben-Gurion University of the Negev ‹#› Papers and videos of this presentation can be found in my air-gap research page [1] https://cyber.bgu.ac.il/advanced-cyber/airgap Ben-Gurion University of the Negev ‹#› Agenda Background Threats, attack-vectors Air-gap jumping techniques (‘covert channels’) Demo videos Evaluation Countermeasures Ben-Gurion University of the Negev ‹#› Air Gap Definition: A cyber security measure that secures computer network by physically isolating it from unsecured networks, such as the Internet or another unsecured local area networks. Air Gap Examples of the types of networks or systems that may be air gapped: Military defense system Critical infrastructure command and control centers Computerized medical equipment and healthcare Banking and finance sectors Cryptocurrencies air-gapped (‘cold’) wallets, blockchain Ben-Gurion University of the Negev ‹#› Threats – Chain of Attack Phase Research Question • How attackers can place a malware in Infiltration -
Hardware Components and Internal PC Connections
Technological University Dublin ARROW@TU Dublin Instructional Guides School of Multidisciplinary Technologies 2015 Computer Hardware: Hardware Components and Internal PC Connections Jerome Casey Technological University Dublin, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/schmuldissoft Part of the Engineering Education Commons Recommended Citation Casey, J. (2015). Computer Hardware: Hardware Components and Internal PC Connections. Guide for undergraduate students. Technological University Dublin This Other is brought to you for free and open access by the School of Multidisciplinary Technologies at ARROW@TU Dublin. It has been accepted for inclusion in Instructional Guides by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Higher Cert/Bachelor of Technology – DT036A Computer Systems Computer Hardware – Hardware Components & Internal PC Connections: You might see a specification for a PC 1 such as "containing an Intel i7 Hexa core processor - 3.46GHz, 3200MHz Bus, 384 KB L1 cache, 1.5MB L2 cache, 12 MB L3 cache, 32nm process technology; 4 gigabytes of RAM, ATX motherboard, Windows 7 Home Premium 64-bit operating system, an Intel® GMA HD graphics card, a 500 gigabytes SATA hard drive (5400rpm), and WiFi 802.11 bgn". This section aims to discuss a selection of hardware parts, outline common metrics and specifications -
HP 17 Laptop PC Maintenance and Service Guide
HP 17 Laptop PC Maintenance and Service Guide © Copyright 2018 HP Development Company, Product notice Software terms L.P. This user guide describes features that are By installing, copying, downloading, or AMD and AMD Radeon are trademarks of common to most models. Some features may otherwise using any software product Advanced Micro Devices, Inc. Bluetooth is a not be available on your computer. preinstalled on this computer, you agree to be trademark owned by its proprietor and used by bound by the terms of the HP End User License HP Inc. under license. Intel and Core are Not all features are available in all editions of Agreement (EULA). If you do not accept these trademarks of Intel Corporation in the U.S. and Windows. This computer may require upgraded license terms, your sole remedy is to return the other countries. Microsoft and Windows are and/or separately purchased hardware, drivers entire unused product (hardware and software) trademarks of the Microsoft group of and/or software to take full advantage of within 14 days for a full refund subject to the companies. Windows functionality. Go to refund policy of your seller. http://www.microsoft.com for details. The information contained herein is subject to For any further information or to request a full change without notice. The only warranties for refund of the price of the computer, please HP products and services are set forth in the contact your seller. express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. -
Airhopper: Bridging the Air-Gap Between Isolated Networks and Mobile Phones Using Radio Frequencies
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies Mordechai Guri1, Gabi Kedma1, Assaf Kachlon1, Yuval Elovici1,2 1Department of Information Systems Engineering, Ben-Gurion University 2Telekom Innovation Laboratories at Ben-Gurion University {gurim, gabik, assafka}@post.bgu.ac.il, [email protected] Abstract innovative and persistent attacker will eventually find a way to breach the network, to eavesdrop, and to Information is the most critical asset of modern transmit sensitive data outward. organizations, and accordingly coveted by adversaries. Accordingly, when a network is used to deliver When highly sensitive data is involved, an organization highly sensitive data, or to connect computers that may resort to air-gap isolation, in which there is no store or process such data, the so called 'air gap' networking connection between the inner network and approach is often applied. In an air-gapped network, the external world. While infiltrating an air-gapped there is no physical networking connection (wired or network has been proven feasible in recent years (e.g., wireless) with the external world, either directly or Stuxnet), data exfiltration from an air-gapped network indirectly through another, less secure network. is still considered to be one of the most challenging Nevertheless, employees may carry their mobile phases of an advanced cyber-attack. phones around the organization's workplace, possibly In this paper we present "AirHopper", a bifurcated within the vicinity of a classified computer which is malware that bridges the air-gap between an isolated part of an air-gapped network. This may occur despite network and nearby infected mobile phones using FM reasonable security procedures, and does not require signals. -
Dell Precision Workstation 350 User's Guide
Dell Precision™ Workstation 350 User's Guide Information About Your Computer Finding Information for Your Computer Specifications Your Computer Front View Back View Inside Your Computer System Board Components Cleaning Your Computer Before Cleaning Your Computer Computer, Keyboard, and Monitor Mouse Floppy Drive CDs and DVDs Advanced Features LegacySelect Technology Control Manageability Security Password Protection System Setup Jumper Settings Power Button Connecting an IEEE 1394 Device TAPI Hyper-Threading Microsoft® Windows® XP Features Overview New User Interface Files and Settings Transfer Wizard Application and Device Compatibility System Restore User Accounts and Fast User Switching Home and Small Office Networking Internet Connection Firewall Removing and Installing Computer Parts Opening the Computer Cover Drives PCI Cards AGP Card Microprocessor Memory Battery Closing the Computer Cover Solving Problems Battery Problems Card Problems Drive Problems Dropped or Damaged Computer E-Mail, Modem, and Internet Problems Error Messages General Problems IEEE 1394 Device Problems Keyboard Problems Memory Problems Mouse Problems Network Problems Power Problems Printer Problems Serial or Parallel Device Problems Sound and Speaker Problems System Board Problems Video and Monitor Problems Advanced Troubleshooting Diagnostic Lights Beep Codes Dell Diagnostics Drivers Using System Restore Resolving Software and Hardware Incompatibilities Getting Help Technical Assistance Problems With Your Order Product Information Returning Items for Warranty Repair or Credit Before You Call Contacting Dell Warranty and Return Policy Ergonomic Computing Habits Regulatory Notices Glossary NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. -
AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers Mordechai Guri Ben-Gurion University of the Negev, Israel Cyber-Security Research Center [email protected] demo video: https://www.youtube.com/watch?v=vhNnc0ln63c air-gap research page: http://www.covertchannels.com Abstract—In this paper, we show that attackers can exfiltrate deceived insiders [20][5]. These techniques allow the attackers data from air-gapped computers via Wi-Fi signals. Malware in to insert targeted malware into systems within the isolated a compromised air-gapped computer can generate signals in the environment. Wi-Fi frequency bands. The signals are generated through the memory buses - no special hardware is required. Sensitive data One of the most famous incidents in which the air-gap can be modulated and secretly exfiltrated on top of the signals. was breached involved the Stuxnet worm which targeted su- We show that nearby Wi-Fi capable devices (e.g., smartphones, pervisory control and data acquisition (SCADA) systems and laptops, IoT devices) can intercept these signals, decode them, destroyed an estimated 1,000 centrifuges at an Iranian uranium and send them to the attacker over the Internet. To extract enrichment facility [53]. In 2018, the US Department of the signals, we utilize the physical layer information exposed by the Wi-Fi chips. We implement the transmitter and receiver Homeland Security accused Russian hackers of penetrating the and discuss design considerations and implementation details. We internal network of America’s electric utilities [4]. In 2019, the evaluate this covert channel in terms of bandwidth and distance media reported that the Kudankulam Nuclear Power Plant was and present a set of countermeasures. -
Next Generation Aircraft Architecture and Digital Forensic
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Next Generation Aircraft Architecture and Digital Forensic Next Generation Aircraft Architecture and Digital Forensic Dustin Michael Mink Alec Yasinsac University of South Alabama University of South Alabama [email protected] [email protected] Kim-Kwang Raymond Choo William Bradley Glisson University of South Australia University of South Alabama [email protected] [email protected] Abstract The focus of this research is to establish a baseline understanding of the supervisory control and data acquisition (SCADA) systems that enable air travel. This includes the digital forensics needed to identify vulnerabilities, mitigate those vulnerabilities, and develop processes to mitigate the introduction of vulnerabilities into those systems. The pre-NextGen notional aircraft architecture uses air gap interconnection, non-IP-based communications, and non-integrated modular avionics. The degree of digital forensics accessibility is determined by the comparison of pre-NextGen Notional Aircraft Architecture and NextGen Notional Aircraft Architecture. Digital forensics accessibility is defined by addressing Eden's five challenges facing SCADA forensic investigators. The propositional and predicate logic analysis indicates that the NextGen Notional Aircraft Architecture is not digital forensic accessible. Keywords (Required) Digital Forensics, Security Strategies, Next Generation Air Transportations -
Protecting SCADA in the Cyber Battlefield
Protecting SCADA In the Cyber Battlefield MARK WILSON NETWORK ANALYST EASTERN MUNICIPAL WATER DISTRICT February 12, 2013 Executive Order, IMPROVING CRITICAL INFRASTRUCTURE CYBER SECURITY Homeland Security Presidential Directive-7 was revoked and replaced with (Presidential Policy Directive)-21 https://www.dhs.gov /sites/default/files/publications/dhs-eo13636-analytic-report-cybersecurity-incentives-study.pdf What is PPD-21? Homeland Security Presidential Directive 7 (HSPD-7) established the U.S. national policy for identification of and prioritization for protection of critical infrastructure. Signed by George W. Bush on December 17, 2003 it modified previous policy for a post-9/11 country. HSPD-7 was revoked by the Presidential Policy Directive 21 (PPD-21) on Critical Infrastructure Security and Resilience on February 12, 2013. PPD-21 states that "Plans developed pursuant to HSPD-7 shall remain in effect until specifically revoked or superseded."[1]Multiple changes came out of PPD-21, including a six actions with specific deadlines. One of those actions was to update the National Infrastructure Protection Plan within 240 days. PPD-21 added agriculture to the list of industries for critical infrastructure protection in December 2003. HSPD-7 replaces the 1998 Presidential Decision Directive 63 (PDD-63) that omitted agriculture and food. These directives designate the physical systems that are vulnerable to terrorist attack and are essential for the minimal operation of the economy and the government. Federal agencies are to develop plans to prepare for and counter the threat. In terms of combating terrorism and weapons of mass destruction (WMD), agriculture was included in the National Security Council’s WMD preparedness group formed by Presidential Decision Directive 62 (PDD-62) in 1998. -
Cyber Warfare: a “Nuclear Option”?
CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam. -
Texas Instrument Essay
Texas Instruments Challenge Essay Written by Riverglades Elementary Robogators Team 2891 We took apart a Dell N5010 and found many pieces inside, including the motherboard, the processor, and the RAM memory unit. We selected this device because it was bigger and had more components than other electronic devices that we had. Here are the components we found. The motherboard is a piece that connects all the components and parts in many devices. It also allows other components to interact with each other. A wireless LAN (Local Area Network) is a piece used to contact and message others. It is used for Gmail, messages, and other ways of calling and contacting. A hard drive is the piece that stores all your documents, pictures, downloads, and more. They can be internal or external. The processor is the central processing unit and is the piece that gives instructions to the rest of the computer. It is the main and most important part of the computer. The Bluetooth chip interprets incoming Bluetooth signals and then sends them out to other devices. The computer fan’s job is to cool the computer by expelling warm air and taking in cool air from the inside. The computer fan helps keep the computer cool. The DC Jack is the part of the computer that allows something to be plugged into the computer including the charging plug, USBs, and more wires. CD player lets you insert a cd, play it, pause, rewind, forward, record, etc. The RAM memory unit keeps all the things you download, save, copy, paste, and more, into one chip. -
Heat Transfer Characteristics of Natural Convection Within an Enclosure Using Liquid Cooling System
Heat Transfer Characteristics of Natural Convection within an Enclosure Using Liquid Cooling System Farouq Ali S. GDHAIDH Submitted for the Degree of Doctor of Philosophy School of Engineering and Informatics University of Bradford 2015 i Abstract Farouq Ali S. Gdhaidh Heat Transfer Characteristics of Natural Convection within an Enclosure Using Liquid Cooling System Keywords: Computer-cooling system, CPU fan, chips limit temperature, electronic chips, experimental study, internal heat sink, natural convection, numerical study, real boundary conditions, rectangular enclosure, single phase liquid. In this investigation, a single phase fluid is used to study the coupling between natural convection heat transfer within an enclosure and forced convection through computer covering case to cool the electronic chip. Two working fluids are used (water and air) within a rectangular enclosure and the air flow through the computer case is created by an exhaust fan installed at the back of the computer case. The optimum enclosure size configuration that keeps a maximum temperature of the heat source at a safe temperature level (85℃) is determined. The cooling system is tested for varying values of applied power in the range of 15 − 40푊. The study is based on both numerical models and experimental observations. The numerical work was developed using the commercial software (ANSYS-Icepak) to simulate the flow and temperature fields for the desktop computer and the cooling system. The numerical simulation has the same physical geometry as those used in the experimental investigations. The experimental work was aimed to gather the details for temperature field and use them in the validation of the numerical prediction.