[Infowarrior] - Network Attack Weapons Emerge
Richard Forno
rforno at infowarrior.org
Fri May 22 19:18:21 UTC 2009
(I recall working on a similar proof of concept 1994-5 timeframe for a
bleeding-edge Beltway company, but the idea was tossed aside for
several reasons...but we sure had some nifty stuff in it! That said,
reading this article I'm reminded of the fictitious 'Janus Box' from
the movie 'Hackers' that would decrypt/hack ANY security protocol and
essentially give its users access to everything, everywhere. In this
case, assuming such a device is even developed (or possible) imagine
the havoc caused if it suddenly shows up on BitTorrent and everyone
can have such point-click-hack capabilities? You think you have cyber
problems now, you ain't seen nothing yet! ---rick)
http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=defense&id=news/CYBER052109.xml
Network Attack Weapons Emerge
David A. Fulghum
Devices to launch and control cyber, electronic and information
attacks are being tested and refined by the U.S. military and industry
in preparation for moving out of the laboratory and into the
warfighter's backback.
It's a part of a technology race that is already well underway. The
Russian attack on Georgia last year showed weaknesses in some combat
areas, but not in cyberwarfare, say U.S. analysts.
"The Russians conducted a cyberattack that was well coordinated with
what Russian troops were doing on the ground," says a longtime
specialist in military information operations. "It was obvious that
someone conducting the cyber[war] was talking to those controlling the
ground forces. They knew where the [cyber]talent was [in Russia], how
to use it, and how to coordinate it.
"That sophisticated planning at different levels of cyberwarfare
surprised a lot of people in the Defense Dept.," he says. "It looked
like a seamless, combined operation that coordinated the use of a
range of cyberweapons from the sophisticated to the high school kids
that thought it was cool to deface official web sites. The techniques
they used everybody knows about. The issue was how effective they were
as part of a combined operation."
The U.S. is looking for a tool to duplicate that kind of attack.
Moreover, the Defense Advanced Research Projects Agency has awarded
several contracts to information technology (IT) companies to design a
cyberattack range. Candidate sites include Naval Air Warfare Center's
China Lake, Calif., radar cross-section facility and the U.S. Air
Force radar cross-section range at Holloman AFB, N.M.
Several future attack devices are being built in a U.S. cyberwarfare
attack laboratory. The one shown to Aviation Week & Space Technology
is a software framework for locating digital weaknesses. It combines
cybersleuthing, technology analysis and tracking of information flow.
It then offers suggestions to the operator on how best to mount an
attack and, finally, reports on success of the effort.
Right now, electronic and cyberattacks are conducted and understood by
a very few. To make the capability part of the warfighter's arsenal it
has to be configured and packaged so that a non-expert could use it on
the battlefield.
The heart of this attack device is its ability to tap into satellite
communications, voice over Internet, proprietary Scada networks--
virtually any wireless network. Scada (supervisory control and data
acquisition) is of particular interest since it is used to
automatically control processes at high-value targets for terrorists
such as nuclear facilities, power grids, waterworks, chemical plants
and pipelines. The cyberattack device would test these supposedly
inviolate networks for vulnerabilities to wireless penetration.
"If you think about the explosion of capability in the commercial
electronics sector, it's obvious that for not too much money, anybody
can set up a fairly robust WiFi capability and just ride the backbone
of the Internet," says a U.S.-based, network attack researcher. "We're
tying together the protection and the reaction side with this device
which will serve for planning, execution and penetration testing."
A by-product of the project is that it offers a start to weaponizing
cyberattack for the non-cyberspecialist, military user.
There are four broad objectives in designing the attack device:
Capture expert knowledge but keep humans in the loop.
*Quantify results so that the operator can put a number against a
choice.
*Enhance execution by creating a tool for the nonexpert that puts
material together and keeps track of it.
*Create great visuals so missions can be executed more intuitively.
This particular network attack prototype has a display at the
operator's position that shows a schematic of the network of interest
and identifies its nodes.
"You could be talking about thousands and thousands of nodes being
involved in a single mission," says a second network attack
researcher. "Being able to visualize that without a tool is
practically impossible."
A touch-screen dashboard beneath the network schematic display looks
like the sound mixing console at a recording studio. The left side
lists cyberattack mission attributes such as speed, covertness,
attribution and collateral damage. Next to each attribute is the image
of a sliding lever on a long scale. These can be moved, for example,
to increase the speed of attack or decrease collateral damage.
Each change to the scales produces a different list of software
algorithm tools that the operator needs. "Right now, all that
information is in the head of a few guys that do computer network
operations and there is no training system," says the first specialist.
Experts are combining digital tools that even an inexperienced
operator can bring into play. In the unclassified arena there are
algorithms dubbed Mad WiFi, Air Crack and Beach. For classified work,
industry developers also have a toolbox of proprietary
cyberexploitation algorithms.
Air Crack, for example, uses open source tools to crack the encryption
key for a wireless network. Some cracks are quick, but require
injecting a lot of data into the network, which makes the attack noisy
and easy to trace. Others are very passive and slow--taking a couple
of days or even months. But no one is aware of the intrusion. A
passive dictionary attack can find passwords such as common English
words, names or birthdays, but it is considered a brute force attack.
Cryptoattacks use more sophisticated techniques to cut through the
password hash. "It runs faster and you usually get a better result,"
says an IT specialist. "But you have to take a more active role,
capture different types of data and send the right information to get
a proper response."
A de-authorization capability can kick all the nodes off a network
temporarily so that the attack system can watch them reconnect. This
provides information needed to quickly penetrate the network.
In one prototype attack device, a colored bar is at the right of each
scale. Green means the effect is better than specified; blue, that it
is equal; and red signifies it does not meet the user's criteria.
The three major elements of a cyberattack system are its toolbox,
planning and execution capabilities. The toolbox is put together by
the hardware and software experts in any organization to address
specific missions. They maintain the database of available capabilities.
The planning capability takes input from other planning systems--for
example, network situational awareness--and incorporates it. The
planner weighs the attack device's capabilities, the target to be
attacked along with the style of execution and then ranks the
solutions. But the final decision is left to the operator.
The output of planning is a course of action--the sequence of steps
that must happen. This blueprint can be reviewed, modified and
approved by a supervisor. It is then taken to the field and executed
or exported to some other cyberattack system.
More information about the Infowarrior
mailing list