Alright, so who am I? Mark Figueroa, Marko Trump, Neil Caffrey, Michael Weston. We are an allocated space. There's five of us here in Southern Maryland. So, that's pretty cool. Some of the people that don't know me might think I'm this. The people that do know me might know me as this. But at the end of the day, who doesn't want to be known as this? That dude is the man. Decode, I think you're doing that on purpose in San Diego, bro. Stop. And then there's this guy, Dave Marcus. Oh, you can't even. Perfect, perfect. So, whoever doesn't know about Four Loco, it is insane. It will drive people up the wall, and you do not want to drink that. Dave? I'll testify. Thank you, sir. It's kind of nasty, but it's okay. Yeah, it is nasty. By the way, he's speaking right after me. The best presentation of the year. I see. No bullshit. Alright, my credibility slide, who really cares? But I spoke at Defcon, published at Hack 9, and it was built for a few Fortune 100 companies. So let me paint the picture for you. In 2003, there was the blackout. Everybody thinks that it trickled down from Canada when the power plant blew or something, and it trickled down. People don't understand and don't know that that same week, the slammer came out and it hit that facility. And guess what happened? Allegedly. Right? Oh my God, he's going to keep my – hold on one second. Now he's just making remarks over here. Let me quit this. Yeah. I'll get you, Decode. Oh, Jabra, I got you too. So, moving on. So, cyber insecurity. Obviously, everyone knows we are losing this battle. There are more products that come out by McAfee and Symantec. People try to bypass it. It's just inevitable. If you're a target, you're going to get looked out after. If you want to, go ahead and Google search the NPR cyber insecurity. I shut off my tweet and you still get me. We're on speakerphone. Speakerphone, speakerphone. Decode, shut up. I mean, I'm pulling my battery out, bro. And don't call my brother because he's over there, back there. Stop watching the video. So, yeah, if you want to look this up, NPR cyber security is telling you, Tony Blair over here, that every second, 200 pieces of malware get released. Okay. So, yeah, we're losing the war. It's just a losing battle. It's like, how can you protect your people when they're always getting screwed? So, here's some of my hacker ESPN highlights. April 2007, 20 terabytes were stolen from a government site. Now, how this happened, I don't know because 20 terabytes is a lot. So, the best thing out of this is Virginia. Since we're in Virginia, the Social Security Department got hacked. And basically, they were held from ransom. And they paid the ransom. And somebody told me, that didn't happen. I looked it up. Well, 60 minutes, look up 60 minutes about the hacker that hacked the VA Social Security. And what they did was, they basically stole the information and said, if you don't pay me, we're going to release it on forums. Paid. I think it was – there you go. 10 million. And they were probably happily, you know, they were just like, you want 11 million or you want 12, they probably overpaid them. So, Zeus 2009 Malware Award of the Year for me. This gentleman right here works at McAfee. What is this year's big thing? I don't know. Zeus? Still with Zeus? So, Zeus is still running wild. Last year, it did the most damage. And what's great about this, definitely Google Zeus and Symantec, they'll show you a video of what it does. And if you look at this video, it is professionals. Professionals, I guess because the economy is bad or whatever the case is, it could be other governments, they are doing back end databases. It is insane. You know that you have a team of people. It's like real big cybercrime. It's just really insane. Definitely look that up. So, how can you protect yourself against all of this? What I've seen and what I've used is just my experience and it helped me out. And if you want to go ahead, this is all free. I am? Oh, right here? Sorry about that. Thank you, Kev. That's why you have a big brother. So, it's a versatile tool that collects malware. You just put it on a box, you dump it on the network, and it basically collects binaries. When nepotism does, it emulates vulnerabilities like MS0645 and MS0867. And it just collects binaries and you can push it to a specific server if you want. So, it could be centralized. There we go. So, why is this basically relevant? Because Symantec, I'm not going to say McAfee, Symantec sucks. Anybody have problems where you get some malware and it doesn't detect? Because it's signature based, obviously, you know? So, the better you know the malware that's on your network, the faster you can mitigate all the risks and issues that you have. And if one computer gets, you know, infected and you don't have it mitigated, what's going to happen? It's going to spread like wildfire. Well, this helps you mitigate all of that. So, my prior company about a year ago, I was consulting at a company. The company is not, by the way, is a soda company and it's not over there. Where's Marcus at? There? There it goes. Marcus, what's up with Pepsi over there, man? So, I used to consult for Pepsi and it had over 200,000 workstations all over the world. And we would get infected and the business unit will get maybe 200 or 300 overnight infections. And then the following day it will be at 800. So, we were figuring out, well, Symantec's not helping us because it's not detecting any of the viruses. And then when we pushed it to them, we didn't get signatures back for four or five days. So, what happens? It just moves on to another business unit and affects that. And then from Asia, we would get infected in Latin America, Europe, Middle East Africa. So, we decided since it's free, and that business is free, we're going to deploy it in the largest BU in that specific region. In Mexico, it was Monterey. In Latin America, it was Brazil. And then what we did was we deployed it and then we bought CW Sandbox. Now, if you're in a large company, CW Sandbox only costs $12,000. So, that's nothing. So, basically, we put it in the central location. All the malware that was captured was basically funneled in through Nephthys, pushed up to that CW Sandbox, and basically reversed. Now, here's the thing. CW Sandbox is not the end-all of all malware. It only picks up about like 50 or 60%. And some of the new stuff that, you know, is coming out, it's wicked. You have a lot of VM protect, a lot of obfuscated code, the binaries. So, CW Sandbox just doesn't work. Do you have any other recommendation? I like Anubis. Anubis? Okay. So, this is Nephthys modules, like I was just saying. It has MS04. Last night, me and Marcus were speaking, and they answered emails, the people from Nephthys that created it, but it's not supported and updated. So, it's kind of outdated, but it's still useful. And I'm going to tell you the shortcomings with Nephthys and why, at the end of the day, it's not a good product. It does its job, but it needs to be updated. So, this is how you would install Nephthys, or Nephthys, the way you want to call it. The Windows users, I'm sorry, you can't install it. So, this is a sample report. And now, once we install this and viruses were getting hit on these boxes and pushed up to CW Sandbox, we would take these reports and submit them to Symantec. So, instead of four or five days getting back that signature, it would take us four, eight, maybe two days max. So, it cut down the infections by, I would say, two or three hundred off the bat. So, here's the sample report. You can look, it saves the binary as an empty five hash. It shows the PID on it. Once it goes into CW Sandbox, it tries to install a Windows System 32, Armand.exe. You can see lower where it tries to install it at, the start reason, as well as, this click is wiggin' out on me. So, it shows, oh, fail. All right, cool. So, you see it tries to call out to secccc.servftp.com. And then, right below it, it tries to go to the specific IP address. The next slide shows what port it's trying to go out on. And it's definitely trying to connect to a botnet. You see the nick, the nick name, Tibia, and the password is TibiaBloze. So, it also opens up a listening port, 1910. So, this is all useful information that Symantec can have and basically pump it out quick, pump out the signatures quick to you. So, what's your general approach? You know, after being in this industry a lot, a lot of years, you'll know that there aren't that many, well, let me rephrase that. Some of the people you work with, you'll be like, why are you even in IT? Seriously, seriously, and where I work at, man, tools, man, tools. For real. Probably on Monday I probably won't have a job for saying that, but who gives a fuck? What? I forgot to mention New York and the Chinese. Oh, yeah, yeah, yeah. We can mention that later. Anyway, we had when I was living in New York like a year ago, our bots kept on getting hit with like stuff. So, I did the trades and this is why I really started using nepotism and different type and then looking like honeyd and looking for different honeypots because we were getting hit so often by China on our ISP. But, yeah, going back to the slide, thanks for reminding me, Kev. Going back to the slide. Lost my train of thought, thanks, Kev. Tools. There we go. Tools. Yeah, and how your coworkers, some of your coworkers are clueless and they're only picking up checks. I got a name for them, by the way, and I'm coining this phrase since we're on Ustream. They're clickologist. They just like clicking. You ever hear them click, click, click, click, click, click, click, click, click, click? That's them. They got their PhD in clickology. So, yeah, set up your environment in a closed environment. You know, there's some people that would take malware and just run it on their live bots and they'd be like, yeah, don't worry. I'll use antivirus to detect it or something like that. Or they'll use, this is a funny one, they'll use VMware and run it on their VMware like, yeah, don't worry about it. I'm good. I'm going to be on VMware and the NICard is bridged. I'm like, dude, seriously? Like, are you stupid or are you just playing? So here are some of the tools. If you don't know how to like reverse engineer stuff, IDA Pro, Windy Bugger, all that cool stuff, if you have any questions, I think we're going to be here all night. So you can come over, give you some tutorials if you don't know any reversing. So here's the limitations with nepotism. You can only download the binary, the poor documentation. They suck. They, it's the worst. Then if you scan and map with like the nepotism box, you'll see a signature for nepotism on there on port 21. It'll just say nepotism box, don't mess with me because it's a honey pot. And malware is getting smarter. Like I said, we were talking yesterday, there's 200 malwares that come out a second. And every year if you look at the trend, do you guys have a website for that trend? So if you look up on Google, you could take a look at that. So that's the first presentation. I got two on here. So any questions on that? If not, I'll swing it down to the other presentation. Go ahead, go ahead. I don't know. I mean, I like the idea that you're capturing them and funneling them down. Yep. But then the basic idea that it takes four days, that it's going to be a while before you get a signature back just seems like the inherent flaw. I mean, if you could turn it around in three hours and you could protect your servers one continent over and you could be good, that seems like the solution. Like it seems like the basic problem is it takes days. Yeah. I think that'll fix. I'm not too sure. Seriously. I'm just giving you my experiences. We went from having signatures for four days to hours because of this. Just setting that environment up. And we went from 1,000, 2,000 infections to only having 500, 300. And is it getting smarter? I mean, people are really getting smarter. People are laid off. They're trying to get money any way they can. And, you know, when it's easy, people are like, shit, I know I'm not going to get caught. I'm going to write some cool shit. And that's what's happening. They're winning. There's no question about it. Any other questions on that? Yeah. Just the Nepenthes site, the other day they were saying they were saying use DNA. What? That the Nepenthes site was suggesting they use DNA. Dianaea. Okay. That's good to know. I didn't hear about it. DNA is D-N-A-A. D-I-N-O-N-D-A-E. Sorry, A-E-A-E-N-O-N-T-A-E. I'm even more lost now. Yeah. I guess it's another honey pot site. It's like Dianaea. So honey pot is up where it's like a windows thing, it emulates windows. I mean, it's a couple of them. I think there's all that stuff that the honey pot does. Honey pot does. There's all kinds of stuff. All right, cool. All right, cool. You good. All right, so this is my baby. Kev, you want to come up because you're doing the second half with me. That was the first part. I should have called that presentation instead of Nepenthes, like protect your shit with Nepenthes. So you want to introduce yourself? Before that, I just want to say one thing about the Nepenthes. I just want to say one thing about the Nepenthes. Marcus brought up a good point. If more like Symantec or McAfee or any of these AV companies would allow people to make their own DAT files, I think that would be an easier way to start protecting your system a lot quicker. Retaining to the gentleman on this side that spoke about that. Now, getting to the Shaolin tools. I'm Kevin, Marcus' brother. If anybody doesn't know by now, every con that we go to, they know us as brothers. They don't know us as individuals. I hate that. Yes, yes. I think we're like the only two Puerto Ricans in the hacker community. I was going to say hacker community, you know? There's a lot of AKAs. You're Puerto Rican? Down there. Down there? I'm sorry about this. This is a Puerto Rican thing right here. Wow. We've got to get up together. I'm very proud of that, man. It's not... You just increased the Puerto Rican security community. Listen. 33%. In any case, me and my brother are coming out with these tools, Shaolin tools, about two years ago. Well, it's been a little bit longer than that, but we've been trying to get into black hat and talk. I don't want to play the racist card, but it always seems like there's not enough of us speaking. Go back one slide. Hold on. I'm not even touching the damn thing. I said you're going into the slides. All right. Hold on. I'll pass this off to my brother. He'll click it. In any case, the reason why was we decided what is going to make and set the tone for us to do this. We saw a martial arts flick and we were like, hey, let's do 36 Chambers. That was the whole idea behind this. I'll pass this off to my brother. Yeah, like he was saying, for the last three years, we submitted to black hat. We got denied whatever. We were frustrated, baffled, what the hell is going on. You start questioning your judo skills and your kung fu skills when you get denied that often. I'm like, what the hell? With Einstein concentration and imagination, yeah. You had 36 Chambers of Shaolin tools were born. If you see the pictures fuzzed out there, this was like a month ago? Yes. We were at Oasis of the Seas and we were basically hanging out chilling, coding on Shaolin tools. One of the things that I really liked about it, we went on vacation and we went on this boat cruise. We had no cell phones, no communications to the outside world, so we got some really good work done. Of course, the family was kind of upset because we brought laptops. Another good joke was while going on the boat cruise, you had TSA looking at our bags and they were wondering why are two people bringing seven laptops with them on a damn boat cruise? We were like, hey, we're going on vacation. It was a good way for us to brainstorm and try to pull things out to eat there in order to make these tools better. Another thing that we decided and why we did this was it's unheard of people to come out with 36 tools at one shot. We figured it would keep the community very occupied with these tools. Plus you have a lot of rum and coke on that on Oasis of the Seas. What are Shaolin tools? There's 36 Chambers of unreleased tools and stuff like that. Offensive and defensive security tools. People just when they release stuff, it's just exploiting or I'm just putting out one tool. Imagine that. One con, 36 tools, whole lot. Why is this project going to be epic? I don't suggest you do that again. I really don't have too much to say about the slide except that it is going to be epic. I've never heard of anything, and not that I want to toot my own horn or anything like that, but I've never heard of anybody even putting out three tools in one shot. The only person that comes close is FX and he put two of them in one shot. So it's going to be released at Black Hat Las Vegas 2011. And if you go to the website right now, there's just a countdown. If the Puerto Ricans get accepted to Black Hat. Oh man. That's documented. That's alright. So. Acting Black Hat. Yeah, yeah, yeah. Social engineering Black Hat. I've heard of the Black Hat. Oh, how many times were you denied, Joe? Oh shit, man. I was the first one to keep going to the club. Oh yeah. So we're working on getting multiple tracks. Hopefully we get accepted. Then we're going to work at multiple tracks. I just want to speak it like a... Yeah, we're going to do it. So we have programmers, beta testers, doc writers, some web developers, and the list is growing on and on and on. And I know you want to speak about that. Oh yeah. We're always looking for developers and beta testers. Except we have a little crew over here. We call ourselves MBA. And for the females, excuse me. But this MBA crew is called No Bitches Allowed. Because we have a lot of people. And I'm not saying bitches in the terms of women. I'm just saying bitches in the terms of men. Because a lot of these guys talk all this stuff. And when it's time for them to showboat and really get on a keyboard and do their thing, they run off. So we get all these people wanting to help out and do these 36 chambers. And we're willing to do a lot. We got flip cameras for the people that are involved so they can video themselves and their own ideas and thoughts. But what happens is they come in, they get excited, they do a couple of things, and then they off on the runnings again. And that one little portion really upsets me. And that's why I don't tend to deal with people that want to come on board. I just push them over to my brother. I don't let him deal with them. But for the document writers and beta testers, I'm thinking about July. For all the people that do want to get on board with that, most of the tools will pretty much all be finished. So the more document writers that we have, the better it is. And we can just push them out. But for these beginning stages, it's really, really difficult to find good coders and reliable coders that want to do things. So if anybody in here wants to participate in helping us make this go forward, by all means, we'll be here all night. You can come and speak to us. And we do have one test before you get put on as a developer. If you pass this test, then you get put on the team. If not, oh well. As you can see, and the people that know my brother, he's not kind of politically correct, right? He's just straight up like, I don't give a damn. That's why he pushes it over to me. So the making, what's going to make this even epic is that we're going to be doing a documentary. We're going to be putting up, we already have a website, but we're going to put up another website. And all the programmers, like he said, is going to get a flip camera. And that's just to record from when we started to the release date. And it's probably going to be released like in September after, because we want to catch the footage for Shilin Tools at Black Hat at DEF CON. And this is not pushing. There we go. Oh, wait, wait, after the trailer. Oh, sorry about that. You know, when it comes to a project this big, you know, it's really about consistency and how much you're willing to put in. Don't worry, it's showing up on here now. You'll see it. It's for a second tour. See how you're doing. It's going to be ups and downs. I just know I'm focused on it and other people are like, that's a great idea. I understand when it comes down to it. It's called PR to state. The market needed it. I mean, we're actually the hotballs and the bandit that we grasp everything. And the documentary is just going to be alongside of it. It's their gift. But when it comes down to it, you have to look yourself in the mirror at 3, at 4 a.m. when you're coding. Well, this is for the love, man. The more we have, the better it is. Oh, so. Sure, but where does it go? I thought it was in the system. Dude, 507 systems in one day. This is a cool thing. When it's all said and done, it's done. The reason why we wanted to do the documentary is a lot of people don't tend to realize unless you're actually making a program, how difficult the journey is from start to beginning. And we figured if we went and did this start to end, I'm sorry, the lick is already talking. From start to end, people don't realize what it takes to get this going and how motivated that person, that individual has to become. So for people that do develop and put things out, I really, really thank you so much for helping the community. And I think if they went one step further by making documentaries, people could actually visually see what it takes. Yes, Marcus. Decode had a question. Decode said, what kind of system? Decode, you have no questions. Nothing. Stop it. Call me at my cell phone. Stop bothering us. They say, what system requirements do you see for this tool kit? Oh, okay. I'll answer that, Decode. That was a good question. At least on my behalf, I don't deal with Windows. I will never deal with Windows. I'm not doing anything for Windows. It's all going to be based on Mac and Linux. Python. Yeah, it's going to be written in Python. We're going to have some C types in there also. What he's saying is he don't give a shit if it works on Windows or not. Yeah, like for the people that want to make it work on Windows, I'm sorry. I'm not really doing anything with that. I'm just basically doing it for Linux and Macs and Unix boxes. FreeBSD also. What's the smart remark he has? Appreciate it. Kevin is a little bit bad. He said, for Marco, he said, what are the requirements for the tool that you, the Netflix or whatever? What's the requirements? You can have a shitty processor and it will still run. As long as you could put BSD on there or Ubuntu or DBN or what's the shitty Linux system you use? The one true OS. Which one? Gen 2. Gen 2. That's it. Gen 2. Let's go! So that's it. There you go, Decode. Keep on feeding the questions. What else you got? Do you want to talk to the jury? You've got to get the wives to say part of it. The wives? The wives? You mean if you're married, the wives you're talking about? You know how they're pissed off that you're not with them anymore. Well, I'm going to tell you this. I'm married and I worship the ground my wife walks on because she is so supportive of me standing 18 hours inside my dungeon coding. I only come up to breathe air and play with my child and then after that it's back to the drawing board. I don't have no wife. I go to strip clubs. Which is pretty cheaper in the long run, right? So we have five chambers completed. They're underwrapped though. We're not really talking about it except the ones that are obvious for certain reasons. Shaolin Honeypot because I've seen Nepenthes and I know the weakness and what I can do to help better the shit. And Shaolin Enum which is his program which does enumeration. It's pretty cool. It's very fast. I don't know anything that's faster from my perspective. Do you have anything else? The enum program that I wrote just to speak real briefly about it. I got tired of remembering like five, six, seven different switches for like five, six different programs. So instead of using like four or five different programs I just made one program that does all type of enumeration. It was a quicker way to get the job done faster at our beginning stage of pen testing. And for the honeypot I really think it was very important for us to make a honeypot. And one of the main reasons was back in New York where we live at in our house I was sick and tired of China hitting our box. So I swear to God that I think that China owns cable vision in some way or the other. Because the amount of times they were slamming our pipelines were ridiculous. So we had two different type of pipelines. We had a regular three megabit pipeline for the family and then we had a 50 meg pipeline. And no matter which way we go it was just always getting slammed. We'd ask you all slammer parties, people trying to throw everything at us and it was just unbelievable. So that's one of the ideas on why we wanted to start our own honeypot. And pertaining to number this I think it's a great product for beginners to start off but they do have some flaws. And that's why we decided to go ahead and do these two programs. There's more that already been developed but we don't want to speak out. You're having your own conversation. Is that like a half reunion meeting over there? He just threw a monkey wrench. Yeah. Why didn't you tell me that before man? That was red. Exactly. That's what you get, the entertainment. I'm a hacker. No, no, no, no. Respect that. Respect that. I know you're going to...that's his thing. Oh my God. So it was going to be a little party. It was going to be a shot glass. That's what we always do. We always have the shot glass because we have the music on. I didn't get a line from my speaker Marcus for this side. One of the things that we always do is like you said entertainment. This last portion that I wanted to do I guess I can't do. I was going to give out questions and for the people that got their answers right you come up and take a shot. But I guess there's no drinking until 9 o'clock. And just to go against the grain just because I love to do that and I'm not politically correct. That's why I have to take that shot. One thing you guys hit us up on Twitter or any websites. I'm honored to speak at the first DojoCon brother. Is the second DojoCon? I guess it shows how much. My rebuttal on that is we just met Marcus last year at SmoothCon so we didn't know about the first one. So to us this is the first DojoCon. Damn I feel like a...all right so thanks. Yeah 9 o'clock. Or we could go out in the parking lot inside the car and just drive out. I really encourage if you live in Maryland. If you live off of Maryland you should really come by the unallocated space. I really I hang out with these guys all the time there. I mean there's a lot of smart people in there and we just all day we're talking about stuff like this. And talking about life. The reason why I like these guys is like yeah they're geeks. They're definitely geeks but man we really had a really good discussion. And it's more about it's more than just about tech at the space. I mean we talked about life in general. And it's a really good way to network with people. So if you're in Maryland you got to stop through. You got to come down to the unallocated space and chop it off these guys. I do all the time. Halftime is not about tech. So seriously you got to come down. Thanks for representing Bronx Brothers. Sorry for spoiling the shots. No no that's all right. Thank you. You're not going to get. First time I met these guys cool as anything. Joe I mean Dave up here everybody you got to just come through unallocated. It's like real cool people that's real smart there. So. In Southern Maryland. The hackers has been open since October 1st. It's really really cool. I like that we have so many different type of things. And not to downplay reverse space. I'm not saying this to downplay reverse space. I'm just saying this is where we hang out at. And where we do our hacking and building stuff. We have robotic building. We're trying to do miniature CTF. We're trying to teach classes like MedExploit Mondays and everything. And I'm just going to bring Joe up real quick because he was there last night. So he can give you his experience of his first time coming over here. Yeah. Hey guys. I actually want to give a shout out to the hackerspace too. Really. Most of you guys know me. You know I started No Bitches Allowed a couple of years ago. Generally because I really hated all the hacker groupies. I couldn't stand all of them. I would go to the con and I was like no bitches, bitches, bitches, bitches. I'm not following all these people around. Fuck that. I came to Google and I learned to hack my damn self. And I wasn't all about following a bunch of people. And that's really kind of how NBA started. But the one part that I really should have been saying was what got me into hacking. And that was my first DefCon experience. So I was at DefCon and I was just walking around and the cool thing that I loved about DefCon is everybody I met, frickin' purple hair and piercings and you know dudes was gay and people was hitting the blunt and nobody gave a shit that I was black. Nobody cared about where I worked. All that mattered was you're into this hacking thing. And what I wanted to say about the hackerspace was that's what it was like for me there last night. We were laughing, we were drinking, we were hacking. Guys were teaching me lockpicking. We were hanging out, fucking just talking shit. It was the coolest time I've had in years just to just hang out and it didn't matter. There was all kinds of racist jokes up in there. It was funny as hell. I had the time of my life. It was so much fun to just hang out and drink and talk shit. Guys I just want to say that hackerspace and what's going on with Unallocated, mad love. Love it. I'm serious.