Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Lessons and Lulz: The 9th Annual Black Hat USA NOC Report

Black Hat1,427 views40:05about 2 years ago

This presentation details the operational security challenges and threat landscape observed within the Black Hat USA network infrastructure. The speakers analyze various malicious activities, including data exfiltration via ICMP, insecure mobile application traffic, and unauthorized device behavior. The talk provides insights into the effectiveness of network monitoring, threat detection, and incident response strategies in a high-traffic, hostile environment.

Lessons from the Trenches: Why Your Mobile Apps Are Leaking Data in the Clear

TLDR: The Black Hat USA Network Operations Center (NOC) consistently observes massive amounts of sensitive data leaking from mobile applications over unencrypted channels. Despite modern security standards, developers frequently fail to implement basic TLS, allowing for trivial data exfiltration and credential harvesting. Pentesters should prioritize traffic analysis of mobile applications during engagements to identify these low-hanging, high-impact vulnerabilities.

Security researchers often obsess over complex exploit chains, zero-day vulnerabilities, and sophisticated bypass techniques. While those are critical, the reality of the field is that the most damaging vulnerabilities are often the simplest ones. The annual Black Hat NOC report is a stark reminder that even in a room full of the world’s most capable security professionals, basic hygiene is frequently ignored. The infrastructure supporting thousands of attendees acts as a massive, real-world honeypot, and the data flowing through it confirms a persistent, industry-wide failure to secure mobile application traffic.

The Reality of Insecure Mobile Traffic

During the conference, the NOC team monitors traffic patterns to maintain network stability, but this visibility inevitably exposes a treasure trove of insecure application behavior. A recurring theme is the sheer volume of sensitive data transmitted in the clear. We are not talking about obscure protocols or legacy systems. We are talking about modern mobile applications—dating apps, social media platforms, and even parental monitoring tools—that transmit user profiles, location data, and authentication tokens without any encryption.

The technical mechanism is straightforward. Many developers rely on the assumption that the underlying operating system or the network will handle security. When they fail to enforce Transport Layer Security (TLS), they leave the application vulnerable to simple interception. Using tools like Wireshark or NetWitness, it takes seconds to identify traffic that should be private but is instead broadcasted for anyone on the local network to see.

Exfiltration via ICMP and Other Protocols

One of the more creative, yet fundamentally broken, techniques observed involves data exfiltration over protocols never intended for payload delivery. The NOC team has documented instances where applications use ICMP to tunnel HTTP traffic. By embedding HTTP requests within ICMP echo requests and responses, these applications bypass basic firewall rules that might be looking for standard TCP/UDP traffic but ignoring "innocuous" ping packets.

This is a classic example of T1048 - Exfiltration Over Alternative Protocol. If a developer is trying to hide traffic or simply lacks the expertise to implement a proper API, they might resort to these methods. For a pentester, this is a signal to look beyond the standard HTTP/HTTPS traffic. If you are testing an application, use CyberChef to decode suspicious payloads found in non-standard fields or protocols. You will often find that what looks like noise is actually a structured, unencrypted data stream.

The Human Cost of Poor Implementation

The most egregious examples involve applications that claim to provide security or monitoring. The NOC team highlighted a parental monitoring application that, while intended to keep children safe, was essentially a beacon for their location and personal data. Because the application transmitted this information in the clear, any attacker on the same network could map the child’s movements in real-time.

This falls squarely under A07:2021 – Identification and Authentication Failures and A02:2021 – Cryptographic Failures. When you are on an engagement, do not just look for SQL injection or XSS. Intercept the traffic. If you see cleartext, you have found a critical vulnerability. The impact is not theoretical; it is a direct violation of user privacy and a massive risk to the organization.

Defensive Strategies for Developers

Defending against these issues requires a shift in how mobile applications are built and tested. Developers must enforce TLS for all network communications. This is not optional. Furthermore, organizations should implement Certificate Pinning to prevent man-in-the-middle attacks, ensuring that the application only communicates with the intended server.

Blue teams should focus on egress filtering and anomaly detection. If your network is seeing ICMP traffic with large payloads or unusual frequency, that is an indicator of compromise. You do not need a million-dollar security stack to catch this; you need visibility into what your applications are actually doing on the wire.

The takeaway for every researcher and pentester is simple: stop assuming that the "standard" way of doing things is secure. The next time you are testing a mobile app, ignore the fancy exploit payloads for an hour and just look at the traffic. You will likely find that the application is doing exactly what the Black Hat NOC sees every year—leaking data in the clear, waiting for someone to pick it up.

Talk Type
talk
Difficulty
intermediate
Has Demo Has Code Tool Released


Black Hat USA 2023

118 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in