Laptops at Security Conferences
I’m often curious what other security folks do to keep their machine safe when they go to IT conferences. I often see what looks like standard office machines being used and wonder if any precautions have been taken. So here’s what I do and I’d love to find out what other measure you take.
I’m about to spend a few days a large security conference, so I’m just putting the finishing touches to laptop I’m taking with me. As I don’t have any real needs beyond email, typing notes and web browsing, it’s a simple job of installing a clean OS and a couple of must have applications*. In keeping with Joel’s previous Diary, it took the duration of some reality TV show to install all the various patches for these apps to be up to date.
Now this is where I then go through my normal additional hardening steps. This OS happens to be Windows 7, so I disable a bunch of services, kill IPV6 services, gleefully disable hibernation and add in a gaggle firewall rules (or should that be an annoyance of firewall rules?).
The last thing I do make a record of clean state of the computer. This is the part I’m assuming most companies have if they have managed operating environments (MOE) or standard operating environments (SOE) as this is such an easy thing to do and provides a trusted baseline for the security teams to compare against.
In Windows there’s a bunch of ways to ask the computer what’s running, what services and software is installed, but I like PowerShell so here’s a quick and dirty way to get the info and save it to a file.
From a PowerShell prompt:
#Installed Software
gp HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* |Select DisplayName, DisplayVersion, Publisher, InstallDate, HelpLink, UninstallString | out-file c:build\base.txt
#Running processes
Get-Process | sort company | format-Table ProcessName -groupby company | out-file –append c:build\base.txt
#Services installed
Get-service * | out-file –append c:build\base.txt
This gives me three pieces providing a baseline** of the system.
I’m now ready to skip from vendor booth to vendor booth, keen to look at their product case studies conveniently on handy novelty USB devices, while surfing the web on freely provided Wifi doing on-line banking, checking today’s nuclear launch codes and wondering why I keep seeing "Loading Please Wait" when clicking on links in emails from people I’ve never heard of. - Although this is an attempt at humour (note attempt) having a baseline of the clean machine allows me to identify the more obvious signs of something bad happening to my system.
If I do feel a disturbance in the force or the laptop does something odd, I can re-run my simple PowerShell commands (with a different output name) and look for changes.
#Comparing in PowerShell
Compare-Object -referenceobject $(Get-Content c:build\ base.txt) -differenceobject $(Get-Content c:build\new.txt)
That gives me a quick indication if some has changed on my systems (barring root kits) and if I need to worry about.
Let me know what you do or don't do when taking your system to a conference.
* I can’t say I’m a big fan of live CD/DVD/USB, I see their uses, but they get out of date, especially the browsers, far too quickly.
**If you want to get more fancy with the base snapshot, it’s pretty easy to script that out to include registry keys, firewall rules and even files in directories with cryptographic hash.
Chris Mohan--- Internet Storm Center Handler on Duty
I’m mentoring SANS Hacker Guard 464 class in Sydney on the 7th of August - SysAdmins, this is for you! https://www.sans.org/mentor/class/sec464-sydney-aug-2012-mohan
Comments
You know what'd be funny, if you ran something like DVL or Metasploitable on your laptop at a hacker con. You'd have the most active honeypot in the world for about 30 minutes haha!
pipefish
May 14th 2012
1 decade ago
Between the crappy hotel wireless networks, skiddies packeting everything and everyone on the con wireless networks, and the general lack of anything I really need to check online while I'm at the conference, it's rare that I take my laptop out of my backpack while I'm at a con, let alone boot it up.
If I absolutely need to use a laptop at a security conference, I use a crappy netbook purchased from Craig's List. The on-board flash storage is wrecked so I boot a live distro from a micro-sized USB key. Any files I need are manually copied to a nodev/noexec/nosuid mounted partition on the USB key. When I get home I plug the key into another workstation with the nodev/noexec/nosuid options, copy the files off, and check them out on the machine (if it was a 'legit' conference that $work paid lots of money for) or a disposable virtual machine (if it was a con that actually had useful info). I'm at cons that require such measures once a year, at most.
By the way, pipefish, running DVL on the wireless net at cons is lots of fun. The more experienced folks think its funny to send messages to one another by defacing the distro's website and the skiddies go nuts throwing everything and the kitchen sink at it.
No Love.
May 14th 2012
1 decade ago
Heading to a conference tomorrow. I'll take the standard issue company laptop because I need to do some work in the evening. The only thing I can do for a modicum of protection is to do everything through the company VPN.
Hal
May 14th 2012
1 decade ago
Rick
May 14th 2012
1 decade ago
peter
May 14th 2012
1 decade ago
* Encrypt your laptop hard drive, if you haven't already.
* Use a VPN for all connectivity.
* Configure your host firewall to permit VPN traffic to your VPN endpoint, permit dhcp client, and to permit all traffic on your VPN tunnel interface. Deny all other traffic.
* Keep your laptop with you at all times.
* Disable bluetooth.
* Avoid using any captive portals if possible.
jms703
May 14th 2012
1 decade ago
John
May 14th 2012
1 decade ago
hacks4pancakes
May 14th 2012
1 decade ago
Orv
May 14th 2012
1 decade ago
I absolutely *never* trust the hotel wireless network at any security conference!! I even clean up all SSID's on my phone and set it to require confirmation of any wireless connection, and also disable the wifi radio as well.
BigMista50
May 14th 2012
1 decade ago