[HN Gopher] The curious case of the Raspberry Pi in the network ...
       ___________________________________________________________________
        
       The curious case of the Raspberry Pi in the network closet (2019)
        
       Author : BayAreaEscapee
       Score  : 677 points
       Date   : 2022-01-17 10:19 UTC (12 hours ago)
        
 (HTM) web link (blog.haschek.at)
 (TXT) w3m dump (blog.haschek.at)
        
       | can16358p wrote:
       | That one really felt like a written-version of a Mr. Robot
       | episode.
       | 
       | Lovely!
        
         | smoldesu wrote:
         | This[0] is probably what you had in mind:
         | 
         | [0] https://youtu.be/XTN_-pRZjoU?t=415
        
       | smm11 wrote:
       | Once found a Linksys Wifi router under a desk, the employee was
       | using it to check their Hotmail. I was pretty impressed they knew
       | to switch their network connection to wireless, but it WAS still
       | on our network.
        
       | [deleted]
        
       | ranma42 wrote:
       | > they identified the dongle as a microprocessor, almost as
       | powerful as the Rasberry Pi itself
       | 
       | Well, its more like an order of magnitude slower than the Pi (and
       | with a lot less RAM as well)
       | 
       | > A very powerful wifi, bluetooth and RFID reader.
       | 
       | It's 2.4GHz, but only BLE and custom protocols (2 Mbit max, GFSK
       | modulation). The SoC can do RFID, but you have to connect a
       | transmitter coil to use it, which doesn't seem to be the case
       | from the photo.
       | 
       | I'd guess this was just used as a remote control backup
       | connection if LAN is not working?
        
         | HeyLaughingBoy wrote:
         | That puzzled me too. I didn't remember the 52832 having WiFi,
         | but I figured it was just faulty memory.
         | 
         | I think the dongle might just be Nordic's cheap evaluation
         | board.
        
         | cf141q5325 wrote:
         | Maybe a 6lowpan interface for maintenance. This way he could
         | interact with it from inside the room without having to access
         | the closet.
        
       | magicalhippo wrote:
       | Reminds me of this[1] good old quote from the IRC days
       | 
       |  _< erno> hm. I've lost a machine.. literally _lost_. it responds
       | to ping, it works completely, I just can't figure out where in my
       | apartment it is._
       | 
       | [1]: http://bash.org/?5273
        
         | heelix wrote:
         | I've had something similar happen to me. I was freaking out
         | that there was something I did not know on my network, as I was
         | going through some router configurations. Searched my office,
         | Bride's office, asked my kid - nothing. Had a pie connected to
         | the back of a TV, drawing power and connected to my network. It
         | bothered me for months that _something_ was there, in my house
         | - that I had completely forgotten was mine. Christmas time
         | rolls around and we try to plug the kid's new console into the
         | wall mounted TV... and there it is taped to the back of the
         | monitor.
        
         | barrkel wrote:
         | This is surely pretty commonplace now, with all the wireless
         | devices we have.
        
         | GravitasFailure wrote:
         | When I first read that back in the day I thought how absurd and
         | improbable it sounded because of how big computers were at the
         | time. Now that raspberry pis and arduinos with wifi are a thing
         | it seems almost inevitable.
        
           | TorKlingberg wrote:
           | It's even worse with virtual machines and containers. Those
           | things can be left over anywhere and still appear as a
           | machine on the network.
        
           | xvector wrote:
           | I was looking at my network today and I realized I didn't
           | know what one of the devices on my network was. I knew its
           | IP, but it had no hostname and a randomized MAC. And for the
           | life of me I couldn't remember what it was, even though I
           | knew which room it was in! (by the AP/signal strength)
           | 
           | I had to use my firewall to monitor the network traffic of
           | the IP to determine what the device was. It turned out to be
           | a long-forgotten smartwatch collecting dust on a charger
           | tucked away somewhere.
        
         | tech-no-logical wrote:
         | related :
         | https://www.theregister.com/2001/04/12/missing_novell_server...
        
         | EvanKnowles wrote:
         | We had a prod case where a server was being flooded with
         | requests, and a downstream server kept falling over. We figured
         | it was an attack of some sort and investigated, eventually
         | traced it back to a computer inside our own network (we're a
         | big computer, five floors of computers).
         | 
         | It had an open file share, containing some Delphi books and
         | from which we got the computer name too. So we walked over to
         | the Delphi team's side, and kept yelling the computer name
         | until some dude said "Hey, that's me!"
         | 
         | Turns out he was running a test-case, in an infinite loop until
         | it worked (because that's how test cases worked), and he
         | thought he was pointed at QA, but he somehow had it set up to
         | target Prod.
         | 
         | Our job was done at that point, we left the rest to management
         | (who made sure he didn't get fired but didn't do it again).
        
           | Seattle3503 wrote:
           | I'm surprised employees have sufficient access to prod to
           | make this mistake.
        
             | more_corn wrote:
             | I've done security reviews for a dozen companies. This sort
             | of thing is startlingly common. Every single company I've
             | reviewed is doing something that in retrospect should have
             | been obvious.
             | 
             | I try to tell people: "You don't need AI security, you need
             | a checklist." Colonial Pipeline reused passwords, shared
             | passwords, used the same password for all VPN users, failed
             | to rotate it when people left. (that's 4 insanely basic
             | violations of password security). ANY human who did a
             | security review would have caught that. Even an intern who
             | knew nothing and furiously googled "information security
             | review" on the bus on the way in to kick off the review.
             | (no disrespect to interns in over their heads, my point is
             | they didn't prioritize security so they didn't get
             | security)
             | 
             | Capital One used an admin privileged instance profile
             | attached to a publicly accessible admin interface for a
             | security tool (which tool, by the way, had no need of admin
             | credentials). They were hit by an SSRF vuln and leaked
             | their admin credentials. They also failed to alert of
             | unexpected use of those credentials (try it, use of admin
             | credentials is rare enough you won't have a lot of noise)
             | failed to alert on large outbound connection (this one is
             | subtle, but worth doing if you can figure it out)
             | 
             | Equifax failed to apply security updates regularly (just
             | turn on automatic security updates. People suck at chores)
             | Failed to deploy a SIEM, failed to conduct periodic
             | security reviews, failed to put capable security people in
             | place.
             | 
             | The above are not my clients, just public reports to
             | illustrate that everyone can benefit from a security review
             | to catch the obvious errors.
        
           | niij wrote:
           | Doesn't sound like a management failure to me. It sounds like
           | there should be separate vlans for QA/test and Production to
           | prevent this very thing (or potentially something more
           | malicious like the spread of ransomware).
        
           | that_guy_iain wrote:
           | One of the issues with Knights Capital was that they forgot
           | about a server running an old bit of code and shut down all
           | the new ones which just sent all the data to the old server
           | which was causing all the problems. Not keeping track of that
           | server was very expensive.
        
         | wink wrote:
         | I've also had this problem once, on a university campus though.
         | 
         | "net send <host> 'If you can read this, please call IT SUPPORT
         | at ... and tell us'".
         | 
         | It worked :)
        
           | antongribok wrote:
           | For a while the easiest and fastest way to identify a 1U
           | server in a rack of 40 was to SSH in and type:
           | eject
        
           | daveidol wrote:
           | Ah "net send" - I remember getting a friend in trouble in
           | high school for telling him how to use it.
           | 
           | He sent one to "*" saying something about the FBI or some
           | such, and evidently it ended up reaching computers across the
           | entire local school system (not just our public school).
           | 
           | He was called out of class days later after they looked up
           | the IP and library computer access logs.
        
           | kotaKat wrote:
           | Did that with a printer that came up on an audit at a
           | hospital once. IT director told me to go to X site to find it
           | based on its IP in the schema and I just cranked out a job to
           | it that said to call my extension. Two minutes later the
           | phone rang...
        
             | justsomehnguy wrote:
             | Sysadm 101: "Don't try to solve administrative tasks with
             | technical means"
        
           | tinus_hn wrote:
           | This should really only ever happen with wireless
           | connections. You should always be able to tell what
           | switchport a computer is connected to and work from there.
        
             | growt wrote:
             | And then? The cable disappears into a wall together with
             | 100s of other cables (which most likely are not labeled or
             | not correctly, otherwise you wouldn't have lost the machine
             | in the first place)
        
               | suifbwish wrote:
               | It is completely irresponsible and without excuse for any
               | main network operator/owner to not be completely aware of
               | what each and every cable does which is connected to a
               | switch/network router. If the owner refuses to determine
               | this, they are responsible if there is a nefarious device
               | on the network until they do. Wireless makes this much
               | more complicated so any responsible admin will ensure the
               | wireless network is completely isolated from the physical
               | network and is privileged to only access the internet or
               | separate devices.
        
               | TabTwo wrote:
               | Customer site, big insurance company. The started
               | documenting cables and labeling them to get rid of old
               | faulty documentation. Half way through their security
               | department forced them to stop. Why? If an attacker gains
               | access to the documentation he would have all the
               | information he needed. So, the had three types of cables:
               | old ones with faulty labels, cables with right labels and
               | unlabeled cables. And then there was me, in the server
               | room at 3 a.m. tracing a cable by pulling up floor tiles
               | because the cable was handmade and the rj45 plug wouldn't
               | fit into the new switch we installed that night.
        
               | michaelt wrote:
               | _> Half way through their security department forced them
               | to stop. Why? If an attacker gains access to the
               | documentation he would have all the information he
               | needed._
               | 
               | Some IT security departments have very confused ideas.
        
               | imwillofficial wrote:
               | This is a silly take. People and orgs have a million
               | reasons why their cables might be unlabeled. Shame on you
               | for binary thinking without considering real world
               | confounding factors.
        
               | hinkley wrote:
               | It's the thinking of someone who has only worked as
               | places that are three years old and the person who built
               | out the network still works there.
               | 
               | If you're hired because the old person didn't follow
               | basic maintenance procedures, you're still ignorant until
               | you rewire or trace the whole company's network.
        
               | suifbwish wrote:
               | What I am hearing is that is that it is not practical to
               | expect network admins to be in control of their networks
               | and sub-sequentially it is not practical to ensure no
               | malicious devices are plugged into enterprise networks.
               | Just because it's difficult to do doesn't mean it
               | shouldn't be done.
        
               | IggleSniggle wrote:
               | What you _should_ be hearing is that it's not necessarily
               | _irresponsible_ for somebody not to know something when
               | they are inheriting a system, and that it's totally
               | reasonable to _expect to encounter_ poorly done systems
               | in the real world that need someone to fix them.
               | 
               | It's often the case that somebody slapped something
               | together in an area that wasn't their expertise, it's
               | been noticed that it's a real problem, and someone has
               | been hired to fix that problem. The "not knowing" is
               | often the reason they've been hired. Trying to sort out a
               | real world scenario (while also handling other needs of
               | the org) is almost definitionally Taking Responsibility.
               | So let's not shit on people trying to cleanup a bad
               | situation by calling them irresponsible for not knowing.
        
               | imwillofficial wrote:
               | Suif, you have a lot to learn my friend. First is
               | speaking in such absolutes.
               | 
               | The more senior I get, the more I realize there are often
               | a multitude of reasons things are the way they are, and
               | many times those are valid reasons, when seeing something
               | that is broken.
               | 
               | Taking a beat before pontificating and making a fool of
               | yourself will save a ton of heartache in your career.
               | 
               | When you see something so broken, ask yourself why? Then
               | ask somebody else. Some highlights from my career:
               | 
               | 1) Last guy got cancer in the middle of a build.
               | 
               | 2) Last guy worked his way up from one man help desk to
               | Linux guru over 15 years all on his own, but was so busy
               | putting out fires, he never had the chance to improve
               | things.
               | 
               | 3) Project started out as a proof of concept and was
               | intended to be torn down.
               | 
               | 4) Due to government contracts, the system has to be
               | maintained exactly as delivered, no labels even allowed,
               | and obviously no IT staff(?!) To make spreadsheets.
               | Everything was paper notes by operators.
               | 
               | 5) Pure laziness and incompetence as you alluded to.
               | 
               | All this to say, more often than not there is a good
               | reason something is fucked up, finding out why may help
               | you fix it (like in the case of politics, budget issues,
               | firefighting, priorities, etc..)
        
               | ldiracdelta wrote:
               | I've seen bundles of cat 5 cabling the girth of a 100
               | year old oak tree. No chance anyone knows every cable in
               | such a data center.
        
               | chiph wrote:
               | We moved into a building where the drop-ceiling had
               | pretty much every generation of cable, going back to
               | Twinax used by IBM 5250 terminals. Previous tenants had
               | cut the connectors off and just shoved them up there when
               | they moved out.
               | 
               | Network documentation in this case? No way. The only
               | option is to pull it all out for recycling, and start
               | over.
        
             | suifbwish wrote:
             | One of the many reasons that I dislike the push towards
             | wifi/wireless for everything. It makes my hair stand on end
             | to see people using wireless keyboards (which people
             | usually have for at least 5 years). People seem so
             | disgusted when you even suggest that these things are
             | inherently bad ideas which will inevitably lead to
             | consequences and immediately push you into a
             | naysayer/antiprogressive category verbally or silently.
        
               | imwillofficial wrote:
               | Explain to me exactly how wireless keyboards are "
               | inherently bad ideas", and not something that can be
               | fixed with a robust technical solution?
        
               | vel0city wrote:
               | Some wireless keyboards don't bother with any kind of
               | protection to the data stream between the keyboard and
               | the wireless receiver. That's the most obvious instance
               | of bad keyboards. However, these days most wireless
               | keyboards do use some kind of encryption on the pairing
               | between the keyboard and the receiver, so that is a bit
               | of a moot point.
               | 
               | Even if the data stream itself is encrypted there's still
               | a little bit of data leakage. Your keyboard isn't
               | constantly sending data, it really only chirps when
               | there's an actual keypress event. So if you look at the
               | actual physical RF, you 'll notice patterns related to
               | the user's typing. There is some research in trying to
               | guess key presses based on typing cadence, although I'm
               | not sure exactly how effective it really is.
               | 
               | I say all of this typing on a Logitech Unifi keyboard amd
               | routinely use bluetooth keyboards. As others have
               | mentioned it really depends on your threat profile, and
               | in the case of wireless keyboards you probably aren't
               | near the level where this paranoia is justified. Are you
               | typing state secrets that a foreign government body
               | really wants in a public place? Probably want to have a
               | wired keyboard...or maybe just not type such things in
               | such places. Are you typing out a comment on Hacker News
               | in a private space? Probably have nothing to worry about
               | with a wireless keyboard.
        
               | imwillofficial wrote:
               | These problems could be fixed with a robust technical
               | solution.
        
               | iakov wrote:
               | Have you considered that using a wireless keyboard and
               | other tech is OK under their threat model? I use one at
               | home and I honestly can not see any downside to it.
        
               | anonymousiam wrote:
               | I have a few commercial-grade WAPs, but they are about
               | four years old and do not do MIMO. I wonder if any of the
               | current hardware records RTT to sufficient accuracy so
               | the distance from the antenna to the client is
               | recorded/available. I also wonder if the phased-array
               | antenna processor records the vector to the client. Such
               | information is available from the hardware, but can
               | anyone tell me if _ANY_ WAP vendors are providing it via
               | their management interface?
               | 
               | Such features could alleviate some of the parent poster's
               | concerns.
        
               | snapcaster wrote:
               | Can you explain in clear ways how the person you're
               | telling this to will directly be harmed?
        
               | sgerenser wrote:
               | I just recently learned that Logitech unifying receivers
               | were susceptible to "mousejacking"[1] for years before a
               | firmware update fixed it in 2016. There's still probably
               | many non-updated receivers out there.
               | 
               | [1] https://www.theverge.com/2019/7/14/20692471/logitech-
               | mouseja...
        
               | philipswood wrote:
               | To a mildly capable and somewhat determined attacker (who
               | can get relatively close to you) this means your keyboard
               | is probably readable from the radio signals.
               | 
               | A Physical keystroke logger if you want to think of it
               | that way.
        
             | mrspuratic wrote:
             | Switch port? Jump back a few decades and try combined
             | kilometers of shared coax runs that effectively become
             | embedded into a building over years of redecoration...
        
             | Jaruzel wrote:
             | Back in the 90s, I recall something similar. Due to cost of
             | hardware, networking wasn't as hi-tech as it is now. So it
             | would be common for medium sized office buildings to have
             | CAT3/5 cables trunked from everywhere in the building down
             | to a central patch room, in which there would be 1000s of
             | patch ports and patch cables stringing everywhere into
             | discrete hubs that had no-onboard management. To trace a
             | connection you'd have to start with the wall or floor port
             | number that the end device was plugged into, and hope it's
             | mapped correctly to a patch panel/port number in the patch
             | room, and then manually trace any patch cable from there
             | onwards to the hub etc.
             | 
             | The whole system falls apart when you have no idea where in
             | the building the end device is, if you are _lucky_ there
             | may be a managed switch on the network route somewhere that
             | may help you narrow down the location somewhat.
             | 
             | So yes, it did happen sometimes that the only way to find a
             | box was to send a desktop alert and hope the admin of that
             | box contacted you.
        
         | cortesoft wrote:
         | I work for a company with around 50k machines globally... one
         | time we discovered a machine that was supposed to have been
         | decommissioned five years prior still sitting on the network,
         | just waiting to do its job. We ended up scanning our entire IP
         | space and finding 10-20 other machines in the same state.
         | 
         | We now have a process that routinely scans our entire IP space
         | for machines that somehow get lost from our inventory system.
        
       | soheil wrote:
       | I honestly think instead of the username if an email was found
       | and published the author would be receiving so many offers for
       | work from Silicon Valley companies. There aren't that many
       | talented engineers even in SV who could pull something like this
       | off. Sad to see amoral behavior from otherwise smart creative
       | people who're stuck in shitty jobs with shittier bosses.
        
         | HeyLaughingBoy wrote:
         | Are you serious?
         | 
         | Monitor BLE traffic, filter it to a known device (his boss')
         | and update an IoT server with that information when it changes?
         | 
         | On an RPi, that's not even an afternoon of work. I mean, it's
         | cool and I would definitely want to interview someone who did
         | this, but it's hardly "hire this person now!!!" material.
        
       | boringg wrote:
       | Thanks OP - great read. Seems like a very sloppy network logger -
       | I mean there's a whole raspberry pi for physical evidence! True
       | there are probably a lot of other network hardware so it could
       | hide in plain sight. Either way fascinating that they thought
       | they could get away with it.
        
         | mabbo wrote:
         | While the device itself is sloppy, for many organizations it's
         | probably easier to install and less likely to be detected than
         | a software-based attack.
         | 
         | How frequently does IT run scans of what software is running on
         | the server vs how often does IT physically inspect the server?
         | Remember, one of those things means I have to get up out of
         | this chair and the other does not.
        
         | mrtesthah wrote:
         | You have to wonder why they didn't rather create a transparent
         | bridge on the network whose traffic they were trying to log;
         | such a device could've even been hidden along a network cable.
        
       | marcodiego wrote:
       | > [...] I got a message from my dad [...] I asked him to unplug
       | it, [...] and to make an image from the SD card [...]
       | 
       | What a technical dad you have!
        
         | tlamponi wrote:
         | > What a technical dad you have!
         | 
         | Working for over 35 years for IBM and inspiring BASIC/REXX to
         | ones child may do the trick -> https://blog.haschek.at/about/
        
       | neilv wrote:
       | I was a confused by a screenshot in the article, with the
       | caption:
       | 
       | > _Not the actual site but a similar one_
       | 
       | Looks like the article, when speaking of tracing down a
       | wrongdoing suspect, used a screenshot of a Web page of an
       | uninvolved Web site. The screenshot included photos of actual
       | people presumably uninvolved, and a name, phone number, and email
       | address also presumably uninvolved.
       | 
       | While I'd guess this probably reduces Internet vigilantism and
       | accusations of libel (at least involving the actual suspect), I
       | suspect that a journalism professor, editor, or lawyer would
       | advise not to do it that way.
        
       | jokoon wrote:
       | I'm rather curious, why can't the RPi have soldered flash memory?
       | How much would it cost to add 2, 4, or 8GB of flash memory on it?
       | Because I would gladly pay for a Rpi with such memory if it added
       | 10 dollars.
       | 
       | I'm suspecting it would require for them to make a new SOC,
       | breaking compability?
        
         | TaylorAlexander wrote:
         | You can have this today. Raspberry Pi sells the wonderful
         | Compute Module 4 with the normal Pi CPU on it, and it
         | optionally comes with built in EMMC memory. You can plop it on
         | a carrier that gives it a normal raspberry pi form factor. I
         | use the CM4 in my projects and it's lovely.
         | 
         | Sorry these are two different distributors, but the CM4 is hard
         | to find right now and the PiTray mini is cool, just couldn't
         | find them at the same place. PiTray mini is also at Digi-Key I
         | think.
         | 
         | https://www.seeedstudio.com/Raspberry-Pi-Compute-Module-CM41...
         | 
         | https://www.dfrobot.com/product-2196.html
        
         | michaelt wrote:
         | Using an SD card means you can reset the Pi to factory settings
         | by swapping the card for another; and undo the reset by
         | swapping the cards back.
         | 
         | This is substantially simpler for beginners than using network
         | boot, or messing around with a bootloader via serial console.
        
           | goodpoint wrote:
           | Having an 8GB eMMC does not preclude having an SD slot. Any
           | beginner can plug in an auto-installer on the SD card and use
           | the same SD for different devices. Simpler and cheaper.
           | 
           | If that's not enough, the eMMC could even come preinstalled
           | with an OS.
        
             | kube-system wrote:
             | Having soldered eMMC also means that you have complicated
             | the effort required to securely wipe the device. It doesn't
             | get any easier than ejecting an SD card.
        
           | Sebb767 wrote:
           | Additionally, as split root storage setup because the boot
           | partition is small is a lot more complicated than simply
           | buying a 64GB+ sd card and (usually) have no storage
           | problems.
        
         | numpad0 wrote:
         | Compute module has eMMC, and they haven't been excessively
         | costly because of it or reportedly unreliable in the way SDs
         | are. But either way I suspect that the Foundation design team
         | has some issues in designing power circuits rather than that SD
         | cards being unfit or people are throwing in cheap ones.
        
           | BlueTemplar wrote:
           | Well, that was the issue with older Pis is that they were
           | running powered by (micro) USB 2.0, which officially tops out
           | at 2.5 W. While IIRC the 3rd Pi tended to top out at trying
           | to draw 15 W - SIX TIMES MORE !!! No wonder that SD cards got
           | destroyed in the process !
           | 
           | But AFAIK this shouldn't be an issue any more (assuming a
           | non-counterfeit charger) with USB-C 3.0 (RPi 4+ ?) which
           | _starts_ at 15 W ?
        
         | BlueTemplar wrote:
         | Thus tripling the cost of the cheapest Pi - which costs $5.
        
           | folmar wrote:
           | This is a marketing price, if you buy in bulk it costs $15.
        
         | tlrobinson wrote:
         | I'd rather have onboard USB serial. No more trying to find a
         | USB serial cable laying around, or enabling SSH and hunting
         | down the IP address.
         | 
         | It already has the USB port for power, surely they could have
         | gotten Broadcom to include USB serial in the SoC for negligible
         | cost by now?
        
         | gambiting wrote:
         | >>Because I would gladly pay for a Rpi with such memory if it
         | added 10 dollars.
         | 
         | That's the problem with the entire RPi ecosystem - there's a
         | lot of things people want "even if it only adds another few
         | dollars". Another ethernet, proper m.2 port, better audio, so-
         | dimm slot etc etc etc....
         | 
         | The Rpi is meant to be cheap. Yes it means that it might not
         | include the feature that you want. And no, "just making it a
         | little bit more expensive" is not the solution here. It's
         | already gotten way too expensive for what is was meant to be
         | originally.
         | 
         | And if you _really_ want a Pi with built in flash, then the
         | compute module has that:
         | 
         | https://www.raspberrypi.com/products/compute-module-4/?varia...
        
         | jpindar wrote:
         | If your goal is to avoid using an sd card, have you considered
         | a Beaglebone?
        
       | srram wrote:
       | Reminds me of the time our head of networking came into the lab
       | (early 2000's) asking about why our lab had '70% of the company's
       | total outbound traffic'.
       | 
       | Turns out that one of our sysadmins was running a porn server in
       | the DMZ
        
       | inshadows wrote:
       | This article was shared here before and since then I was failing
       | to find it again. Thanks for reposting!
        
       | andygroundwater wrote:
       | Was working with a NOC technician who was responsible (along with
       | some others) for a pretty large EMEA mobile network, with many
       | millions of subscribers. There was an RFP to update their SMS/MMS
       | system and a certain Israeli company came in to do a site survey,
       | or installation or something in the network data center.
       | 
       | Anyway the long and the short of it was one of their technicians
       | was caught with the previous vendor's SMS-C prized open and some
       | USB device insert into it. Similar response to this, a lot of
       | hollering and hair pulling, but ultimately no contractual or
       | legal implications.
       | 
       | I guess it happens higher up the food chain too.
        
       | teddyh wrote:
       | This sounds like one of the classic stories by SecurityMonkey
       | a.k.a. Chief:
       | https://web.archive.org/web/20191006220253/https://it.toolbo...
       | 
       | The individual stories seem to be still available on the non-
       | archived web here:
       | https://www.toolbox.com/user/about/ChiefMonkey/ but not, from
       | what I can find, the convenient story index, which I linked to
       | above.
       | 
       | He seems to have planned a rewrite of all the stories and put
       | them on... Medium.com: https://medium.com/@chiefsecuritymonkey
       | However, the last update is from May, 2020.
        
       | mypastself wrote:
       | Gripping! Would love to read more articles in this "genre".
       | 
       | I'm wondering if there was an easy way for the attacker to
       | encrypt or obfuscate some of these configuration files, so that
       | defenders can't extract settings even when physically connected
       | to the device.
        
         | soldeace wrote:
         | The investigative work in that piece reminds me of this old
         | case: https://www.youtube.com/watch?v=OAI8S2houW4
        
         | fmajid wrote:
         | Read _The Cuckoo 's Egg_ by Cliff Stoll. An oldie but a goldie.
        
           | mypastself wrote:
           | I've owned a copy for a while now. This might just be the
           | push I needed to pick it up.
        
             | whalesalad wrote:
             | The first time I read it I could not put it down.
             | Incredible book.
        
             | BLKNSLVR wrote:
             | I read the whole book over a long weekend, I just couldn't
             | put it down.
             | 
             | Make sure you don't have any work deadlines in the few days
             | after you start it.
        
           | hinkley wrote:
           | There's a PBS made for TV movie about this story too, don't
           | know if it can still be found on streaming:
           | 
           | https://imdb.com/title/tt0308449/
        
         | 8192kjshad09- wrote:
         | Some malware will store the executable and all configuration
         | encrypted on the disk and will only decrypt in memory with a
         | key downloaded from the internet.
         | 
         | Ofcourse you can still defeat this if you dump the memory or
         | reverse engineer the process to get the key yourself. Makes it
         | a bit harder but still not impossible.
        
           | suifbwish wrote:
           | Unless the disk has some way of checking the hash sum of its
           | own file structure before execution, additional debug,
           | logging scripts can be added which load at boot time and
           | record the entire process. It's a cat and mouse game.
        
       | tacticaldev wrote:
       | This story sounds so familiar; did this get posted 3-4 years ago?
       | Good story and good sleuthing tho.
        
       | goodpoint wrote:
       | Reminder (from a security guy): what the author did is risky. If
       | you are really worried about a compromised server or a suspicious
       | device call security consultant / forensic experts.
        
         | aembleton wrote:
         | What are the potential risks around what he did?
        
           | goodpoint wrote:
           | - Being suspected or charged of destruction of evidence. It
           | happened.
           | 
           | - Losing access to forensic data by not capturing the
           | contents of the device RAM. Pretty common.
           | 
           | - Becoming witness of a crime and getting personally targeted
           | by some criminal organization in retaliation. This one should
           | be obvious.
           | 
           | - Wasting the opportunity to keep the device on to monitor
           | the activity of the intruder
        
           | fatbird wrote:
           | Malware triggered by its absence? If the device disappears,
           | it's likely because it was found and removed, so malware that
           | starts erasing data or otherwise causing confusion or
           | covering their tracks is a plausible next step (though not a
           | good one in this case, given that the device itself led
           | straight to the person who planted it).
        
       | kekebo wrote:
       | As for deobfuscating JS, I've often had good experiences using
       | http://jsnice.org/ ("Statistical renaming, Type inference and
       | Deobfuscation")
        
       | mschuster91 wrote:
       | I do wonder when the first "smart SFP" with embedded wi-fi
       | appears - an unlabeled RPi in a junction box raises alarms, but a
       | SFP module that's just a bit longer than the rest? Many would
       | rather assume on first glance that accounting bought some cheaper
       | crap due to delivery chain issues.
       | 
       | (For those OOTL, see https://blog.benjojo.co.uk/post/smart-sfp-
       | linux-inside - it made the rounds on Twitter and HN a couple days
       | ago)
        
         | bopbeepboop wrote:
        
       | JKCalhoun wrote:
       | So, not just a Pi-Hole as I immediately first assumed.
        
         | 2Gkashmiri wrote:
         | now i guess a smaller pi zero can do this with a much smaller
         | footprint
        
           | gambiting wrote:
           | Pi Zero doesn't have an ethernet port, so you have the size
           | of the pi+ethernet adapter then.
        
             | JKCalhoun wrote:
             | Technically, I believe Pi-Hole works over Wi-Fi as well:
             | that is, you can have the Pi Zero running Pi-Hole connect
             | to your router via Wi-Fi. Then all your devices connect to
             | the Pi Zero for their internet access.
             | 
             | I could be mistaken though; only over installed on a Pi 3.
        
             | drewzero1 wrote:
             | I've been playing around with orangepi zero for when I just
             | need ethernet, wifi, and USB. It fits in an Altoids tin
             | with room for some cable management.
        
       | anonymousiam wrote:
       | Something like this is less likely to be noticed:
       | https://arstechnica.com/information-technology/2012/03/the-p...
        
         | amelius wrote:
         | Same category as those keylogger USB plugs.
        
       | azalemeth wrote:
       | That's a very obvious and very obviously bad way of planting a
       | network exploit. Very rookie and rather sad.
       | 
       | In entirely unrelated news, this guide details how to set up an
       | encrypted boot process on a raspberry pi, with it waiting for
       | you(r forked login agent) to ssh in and provide the LUKS
       | password: https://github.com/ViRb3/pi-encrypted-boot-ssh
        
         | egypturnash wrote:
         | The whole part with it being tracked back to a site for G/T
         | kids makes it sound like this was a young person somewhere in
         | the range between "script kiddie" and "beginner hacker", so
         | "rookie" sounds about right. Bored teen or twentysomething with
         | time to kill and an interest in computers.
        
           | kingcharles wrote:
           | It was the parent of the child who planted the bug.
        
         | suifbwish wrote:
         | Without reverse ssh wouldn't you need to be directly on the
         | same network to do so?
        
           | ertian wrote:
           | I was setting up an encrypted-root system with ssh access to
           | pass the passphrase, and got reading. It looks like an initrd
           | image can connect to a VPN or set up a Tor hidden service
           | these days. I didn't try it, though.
        
       | BXWPU wrote:
       | Reminds of this: https://www.youtube.com/watch?v=UeAKTjx_eKA
        
       | geek_at wrote:
       | Author of the article here. Since I first published this blog
       | post I was getting messages from people asking how it ended.
       | 
       | Sadly it's pretty anticlimactic as the owner of the place had a
       | meeting with the guy who put the Pi there (without me as he
       | didn't want the Pi-dropper to feel ambushed) and in the end
       | decided not to escalate it to legal and just basically told him
       | to pack his things and get out.
       | 
       | So no legal after play and just a slap on the wrist
        
         | rheophile wrote:
         | post the nodejs in a git repo so we can see what he was doing.
        
         | perfopt wrote:
         | As I was reading this I was hoping for modern day Cuckoo's Egg.
         | But it was not to be.
         | 
         | Great write up. Thanks for sharing.
        
           | danesparza wrote:
           | For anybody wondering, the Cuckoo's Egg (written in 1989 by
           | Cliff Stoll) is a wonderful read about tracking an early
           | hacker. I highly recommend it.
        
         | gwd wrote:
         | > So no legal after play and just a slap on the wrist
         | 
         | The problem with this is you have no idea what harm the guy
         | actually may have caused; nor what other RPis he may have set
         | up around the company or around town. Next time he may be more
         | careful with his username, set up the disk to be encrypted w/ a
         | network key, &c, making future exploits more difficult to track
         | down.
        
           | fnord123 wrote:
           | There is a case to be made for using the legal system as a
           | deterrent. But there is also the case to made to not do that
           | as in the case of Aaron Swartz.
        
             | eternityforest wrote:
             | Seems like the decision becomes a matter of whether you
             | agree with the motive then.
             | 
             | But in this case.... the motive seems to be unknown.
        
             | bitexploder wrote:
             | This is a lot more localized and malicious. I do think
             | people deserve second chances, but the context of all this
             | rubs me the wrong way. Maybe the building owner was right
             | to not make it a legal matter, but this feels like more
             | than a harmless experiment. The malicious persons
             | operational security is obviously terrible.
             | 
             | As someone who has done security research for over 15
             | years, I take the ethics of this sort of thing seriously. I
             | fully expect repercussions of the legal sort if I did
             | something like this without permission. The key detail
             | being that this was done secretively in a private office.
        
               | e40 wrote:
               | Given the relative sophistication of it, it feels more
               | like practice. In that case, not even a slap on the wrist
               | very well could be seen as encouragement.
        
           | charles_f wrote:
           | He did get fired though, not as if he just got his raspberry
           | back and went about whistling happily
        
           | discardable_dan wrote:
           | This, truly, is the thing to worry about: if it happened
           | here, it likely happened at other companies. Turning a blind
           | eye is a blank check to do it again.
        
             | etothepii wrote:
             | The issue here is that this isn't just "one bad apple" that
             | if we can remove everything will be ok. Which is what
             | motivates the idea that punishing this bad actor will make
             | everything better.
             | 
             | There is a systematic issue at the heart of the way we do
             | network security.
             | 
             | You can by a lighting / usb cable that can do all of these
             | things and more for $120 if he'd used that he'd never have
             | gotten caught.
             | 
             | We treat network security like physical security at our
             | peril.
        
               | eternityforest wrote:
               | Without changing things so radically that we might not
               | even be able to continue having a "Do everything in
               | software with one click" society, social deterrence is
               | going to to be important.
               | 
               | Unless people are manually verifying GPG keys in person
               | all the time, you're gonna need to trust someone. Even
               | with a two man rule you need some degree of trust. Trust
               | is easier when people know they might go to jail if they
               | break it.
        
               | Ensorceled wrote:
               | > The issue here is that this isn't just "one bad apple"
               | that if we can remove everything will be ok. Which is
               | what motivates the idea that punishing this bad actor
               | will make everything better.
               | 
               | I think they are talking about this particular, singular,
               | bad apple and the other companies that bad apple is also
               | attacking right now and stopping that harm as opposed to
               | "sending a message" to other bad apples.
        
               | etothepii wrote:
               | That feels like a choice for the victim.
               | 
               | If after the business owner sat down with the perpetrator
               | they decided it is just some script kiddie playing at
               | being a spy then that's up to them.
               | 
               | The wider issue remains that some script kiddie with $120
               | could have done this and got away with it for ever.
        
               | ianai wrote:
               | Do you have a suggestion for a change to treating network
               | security?
        
               | etothepii wrote:
               | Treat every computer like it's connected to the internet.
               | 
               | Probably by actually connecting it to the internet. Since
               | the idea that you can keep people out of your network is
               | probably more dangerous in the long term.
        
               | more_corn wrote:
               | 1) 802.1x certificate based network security (The MDM
               | configures each approved network device with a
               | certificate so rogue devices can't get on the network) 2)
               | Periodic security review (look at attached network
               | devices and determine an owner and purpose for each one).
               | 3) Configure SIEM to alert on long-lived outbound
               | connections.
        
               | ianai wrote:
               | Can that (1) be done with windows/Mac clients?
        
               | ianai wrote:
               | Answering myself: yes, is industry standard, definitely a
               | little odd to not have it configured on a corporate
               | network past a handful of employees.
        
               | jaywalk wrote:
               | There's a decent amount of infrastructure involved in
               | getting 802.1x authentication up and running in an
               | efficient manner. While it does provide very good
               | security, it's not widely used because of that.
        
               | ianai wrote:
               | Any idea on a good, at-home or small network alternative?
        
               | jaywalk wrote:
               | There really isn't one. 802.1x is _the_ wired security
               | standard, and almost never worth the hassle for home or
               | small business networks unless you are really interested
               | in learning the ins and outs.
        
               | nitrogen wrote:
               | Having a list of allowed MAC addresses, enforced per-port
               | by a managed switch (or at least by the DHCP server and
               | router), is a first step, though naturally it's easy to
               | spoof a MAC address.
        
               | jaywalk wrote:
               | MAC address filtering isn't a first step towards 802.1x,
               | precisely because of the reason you mentioned. It's damn
               | near pointless for all but the most basic security
               | scenarios.
        
               | nitrogen wrote:
               | Obviously it's not a first step toward certificates, but
               | it is a first step _away_ from  "anyone can casually plug
               | in a hidden Pi."
        
               | genera1 wrote:
               | Anyone who knows how to setup that RPi to do anything
               | meaningful knows how to spoof mac
        
             | asteroidp wrote:
             | File that under "not this companies problem"
        
               | TedDoesntTalk wrote:
               | It is possible the perpetrator acquired some embarrassing
               | evidence about the company owner and was blackmailed.
               | We'll never know.
        
               | asteroidp wrote:
               | In the extremely unlikely chance he did, so what? He can
               | face legal issues then
               | 
               | Most private and embarrassing stuff rarely ever matters
               | anyways. This isn't a movie
        
           | fortran77 wrote:
           | Are all parents who run "gifted children" blogs scammers of
           | some sort? It sure seems like it.
        
           | suifbwish wrote:
           | An encrypted disk would be kind of useless in such a device
           | as it would require the user to login every time the device
           | reboots, unless they intend for it to never be rebooted. I'm
           | not sure what you mean by network key in this case.
        
             | sneak wrote:
             | No, you can have the initrd boot to a dropbear sshd that
             | allows the operator to ssh in on reboots and provide the
             | key.
        
               | fho wrote:
               | If you count on the device running "forever", or at least
               | until you pick it up again, you could also just store the
               | key on the device and delete/destroy it (the key) on
               | boot.
        
               | asteroidp wrote:
               | Why in god's name would you pick it up later? Installing
               | it in the first place was a huge risk. Removing it is
               | just doubling down
        
               | suifbwish wrote:
               | Wouldn't that part of the disk then need to be
               | unencrypted?
        
               | sneak wrote:
               | Yes, it does. It's pretty small, though, on the order of
               | 100MB.
        
               | Severian wrote:
               | Something like dnscat2 would ultimately be better in my
               | opinion. Have it connect once to get the disk key,
               | decrypt, and end the process. Then have your device do
               | it's thing, and once a condition is met, spin it back up,
               | transmit the data (using small packet sizes and very
               | large delays to possibly avoid IDS) and exfiltrate what's
               | needed.
        
               | andrewnicolalde wrote:
               | There are also options like the Zymkey[1] which is
               | essentially an add-on TPM which can auto-decrypt the disk
               | if it detects that the Raspberry Pi and SD card it is
               | connected to have not changed. Not sure how difficult
               | that would really be to defeat given enough effort
               | though.
               | 
               | [1] https://www.zymbit.com/zymkey/
        
             | teddyh wrote:
             | > _An encrypted disk would be kind of useless in such a
             | device as it would require the user to login every time the
             | device reboots_
             | 
             | There is actually a solution for that (shameless plug):
             | https://www.recompile.se/mandos
        
               | natpalmer1776 wrote:
               | While I'm sure I could configure this on a system, the
               | level of understanding required to actually create it
               | honestly is fantastic.
               | 
               | Is this something you created yourself, or was it a
               | community project?
        
               | hinkley wrote:
               | Hardware security modules are no cakewalk either. For
               | webservers I think most people consider them overkill.
               | They mostly IME get used to handle code signing.
               | 
               | And at one company they were worried about the devices
               | getting stolen, so they could had HSMs and still couldn't
               | reboot unattended (though most of the signing keys were
               | with humans rather that automated)
        
               | teddyh wrote:
               | Initial idea and C++ implementation (using TLS with X.509
               | certificates and explicit UDP broadcasts) was done in
               | 2007 by another person. Redesign of the protocol (to TLS
               | with OpenPGP keys1 and DNS Service Discovery2), and re-
               | implementation in Python and C, I did in collaboration
               | with that person. In addition to ongoing maintenance, the
               | relatively recent switch from TLS with OpenPGP keys to
               | TLS with Raw Public Keys3 was done by me.
               | 
               | The level of understanding required is something I would
               | think that all system administrators worth their salt had
               | at the time. I would think that the best way to acquire
               | such knowledge is doing the _Linux From Scratch_ 4
               | exercise, even though I have not done it myself.
               | 
               | 1. RFC 6091
               | 
               | 2. http://www.dns-sd.org/, RFC 6763
               | 
               | 3. RFC 7250
               | 
               | 4. https://www.linuxfromscratch.org/lfs/
        
               | hamburglar wrote:
               | Looks like a neat project but the intro/faq should
               | probably be a bit more self-critical to point out
               | weaknesses. The "nope, it's protected by TLS" answers
               | ignore the fact that anyone attacking this could also
               | have attacked the PKI. If someone gets the client cert
               | and key, they can probably fake the request to get the
               | decryption password. I'm assuming that client key isn't
               | protected by a password, since then _that_ would be the
               | thing a user has to provide at boot time. And what about
               | the vector where someone attacks the CA that issued the
               | certs? Where is that stored? Can fake roots be injected
               | by someone in possession of both machines? This may be
               | moot if you are using self-signed certs, but of course
               | those introduce their own management issues.
               | 
               | Also, I don't really see any discussion of availability
               | concerns. This is a system with a pretty gnarly fail-
               | closed kill switch that could happen with a simple
               | network outage. That doesn't really seem to be
               | acknowledged and there's no discussion of the inherent
               | balance between security and availability. You really
               | need to be able to guarantee a certain level of
               | availability or things basically self-destruct.
               | Presumably there's a mechanism that allows a self-
               | destructed pair or cluster of these mandros'd servers to
               | go back to a normal operating mode?
               | 
               | Anyway, I don't mean to be too critical. It's a really
               | cool project. A little Byzantine but with a stated reason
               | for that. Would just like to see more focus on the
               | weaknesses and potential critical operational issues. A
               | section called "reasons you may not want to use this"
               | that is very up front about those seems appropriate.
        
               | teddyh wrote:
               | > _If someone gets the client cert and key, they can
               | probably fake the request to get the decryption
               | password._
               | 
               | Yes, that is a weakness, which is openly addressed in the
               | FAQ:
               | https://www.recompile.se/mandos/man/intro.8mandos#quick
               | TLDR: It only works if an attacker is pretty quick about
               | it. See also here: https://www.recompile.se/mandos/man/in
               | tro.8mandos#security
               | 
               | > _And what about the vector where someone attacks the CA
               | that issued the certs?_
               | 
               | There is no CA involved, nor any X.509 keys. The keys
               | used in TLS are ed25519 raw keys, and the server has a
               | list of, and checks, individual key fingerprints.
               | 
               | > _This may be moot if you are using self-signed certs,
               | but of course those introduce their own management
               | issues._
               | 
               | Yes, you have to generate and transport keys out-of-band
               | (i.e. by hand) as part of the initial setup. The
               | instructions on exactly how to do this are shown as part
               | of installation and configuration.
               | 
               | > _a pretty gnarly fail-closed kill switch_
               | 
               | That's a _feature_. A security system should fail closed.
               | 
               | > _Presumably there's a mechanism that allows a self-
               | destructed pair or cluster of these [mandos]'d servers to
               | go back to a normal operating mode?_
               | 
               | Yes. You either type in a password on the console on one
               | of the servers, or use a dropbear to ssh in remotely to
               | do it.
               | 
               | > _A section called "reasons you may not want to use
               | this" that is very up front about those seems
               | appropriate._
               | 
               | The project is mostly intended for those people who have
               | _already_ decided that full-disk encryption is a
               | requirement, and Mandos is meant to alleviate some of the
               | pain which they have already accepted. But sure, I see
               | your point.
        
               | Inhibit wrote:
               | That looks like an awesome project but I'm not sure
               | building an LFS system would help developing a system
               | like that. Possibly in understanding and configuring it.
               | 
               | I still recall how to build a Linux system from go.
               | Coding what you're working on up in Python/C would take a
               | large unrelated amount of knowledge.
        
               | teddyh wrote:
               | The knowledge about how to write a program comes
               | naturally when you know, in fine enough detail, both the
               | problem which the program should solve, how to solve it,
               | and the environment in which the program should run. In
               | this case, writing a Python server program to respond to
               | requests was relatively simple; Python provides built-in
               | modules which makes writing servers easy. And when you
               | know what the client program (i.e. the program running on
               | the currently locked host) should do, and you know what
               | environment the program has to operate in, the program
               | more or less writes itself.
               | 
               | The first version of the program used a simple UDP
               | broadcasting method to a hard-coded port to find servers,
               | which required some rudimentary networking knowledge, but
               | only basic TCP/IP stuff.
               | 
               | Later, both the server and client parts have gone through
               | numerous refactorings which brought in many features
               | (like a plugin system on the client side, and a D-Bus
               | interface on the server side), but those were manageable
               | chunks to add to an already mature and working system.
               | 
               | But sure, in addition to the knowledge one could acquire
               | from LFS, I also had some high-level knowledge of how TLS
               | and its handshake worked, I knew that there was some way
               | to use OpenPGP keys instead of X.509 certificates in TLS,
               | and I knew a little about how DNS-SD worked. The rest I
               | needed I read up on as I wrote the code.
        
         | [deleted]
        
         | makach wrote:
         | omg, that guy got of the hook easy. he should play the lottery
         | considering how lucky this was.
        
         | [deleted]
        
         | causality0 wrote:
         | Shoot, with the info you got I'd have least called his parents
         | and tattled on him. If you can't put him in jail at least
         | embarrass the shit out of him.
        
         | Chris2048 wrote:
         | > told him to pack his things and get out
         | 
         | I though the suspects were an ex-employee, and some guy that
         | didn't work there (the part-owner), so was an actual current
         | employee implicated in the end?
        
           | smcl wrote:
           | An ex-employee who still had a key to the office so they
           | could move some stuff they had there. Presumably that
           | courtesy was immediately terminated and the key was returned.
        
             | anonymousiam wrote:
             | Having a key to the office and having a key to the network
             | closet are not the same thing. The article said only four
             | people had access to the network closet. So did this guy
             | break into the closet to plant the pi?
             | 
             | I think he got off way to easy.
        
             | Chris2048 wrote:
             | oooh, I didn't realise they still had the key at that
             | point. OK, I wouldn't have even said that - I'd have asked
             | for the key back and boxed the remaining stuff myself. TBH,
             | I'm surprised to what extend the employee would of had a
             | bunch of stuff there - did they have furniture there or
             | something?!
        
               | smcl wrote:
               | Yeah it sounds like the person was on good terms with the
               | company and was trusted enough, must have stung for
               | whoever made the decision to trust the ex-employee to be
               | sorta betrayed like that. The blog author is somewhere in
               | the comments here, I don't know if they're willing to
               | share much more info but let's see what they say.
        
               | Chris2048 wrote:
               | So the article mentions:
               | 
               | > It was registered (or first deployed or set up?) on May
               | 13th 2018
               | 
               | and the post itself is dated 2019-01-16
               | 
               | Since it says:
               | 
               | > he could still have a key for a few months
               | 
               | I assumed that by then the employee had given back the
               | key, but I guess I was making a few assumptions about
               | when this happened, and when the device had been
               | installed - they don't actually say what date the RADIUS
               | logs revealed they had accessed the network.
        
           | pdpi wrote:
           | My understanding is: ex-employee bought/acquired the device
           | from the "gifted guy"/part-owner, and deployed it in the
           | network cabinet by using the key he still had.
        
         | kumarvvr wrote:
         | Seem pertinent to atleast get an affidavit from the ex-employee
         | detailing what he as done, agree to hold on to the hardware as
         | evidence, put liability on the employee for any time-bombs that
         | might have been stored, ask him explicitly to give in writing
         | all the activities he performed, etc.
         | 
         | Just to have a thread to pull on, in the future, when something
         | might go wrong.
        
           | geek_at wrote:
           | We did get a hand written statement from him and the original
           | evidence (hardware) is still untouched and locked away.
           | 
           | In his statement he wrote that the pi logged to the SD card
           | but there was no data on the SD card (well not on the data
           | partition) and I'm pretty sure that was a lie and it just
           | logged to Balena.
           | 
           | But even though we could never decipher what the nodejs
           | program actually did (because it was so heavily obfuscated)
           | our internal working theory is that he was tracking the
           | movement data of the boss to avoid him whenever possible.
        
             | ChuckNorris89 wrote:
             | _> he was tracking the movement data of the boss to avoid
             | him whenever possible._
             | 
             | Wow, imagine hating your boss so much you go to so much
             | creative and illegal lengths (that can backfire against
             | you) to track him, instead of using same skills legally to
             | finding a better job.
             | 
             | I just don't get, something doesn't feel right about this
             | being the _true_ reason. To me it looks more like he wanted
             | a covert backdoor in the company network for IP-theft,
             | black-mail or other such data exfiltration purposes.
             | 
             | If only he knew that in a year he could avoid his boss all
             | the time thanks to covid-WFH.
        
               | rheophile wrote:
               | what if this guy is just a hell of an introvert who is
               | more comfortable rigging something like this up than with
               | interacting with this boss. If this kid was in his early
               | 20s I'd probably slap his wrist and impress on him the
               | dangers of screwing with the company network closet. If
               | he is an adult he really ought to know better
        
               | spac wrote:
               | just came here to say that while I understand the
               | sentiment, people in their 20s can vote, and should be
               | considered adults, not kids.
        
               | deltaonefour wrote:
               | What an intelligent way to look at the world. If the law
               | says something that is the exact truth. No room for any
               | nuance.
               | 
               | The day before your 18th birthday, you're a kid, the day
               | after you're an adult. Makes perfect sense.
               | 
               | Clearly someone who looks at the world this way must be
               | under 18.
        
               | AlecSchueler wrote:
               | Legally that's true but I think you know as well as
               | anyone that people don't just suddenly mature on the day
               | of their 18th birthday.
        
               | cgriswald wrote:
               | I wonder what effect treating legal adults as children
               | has on their maturity trajectory.
        
               | exhilaration wrote:
               | There's a book about this: https://www.amazon.com/Case-
               | Against-Adolescence-Rediscoverin...
        
               | travisjungroth wrote:
               | It's super complex. There are cases where the person
               | "gets it" and just getting caught is enough to cause
               | growth. Accountability in the form of punishment may be a
               | waste of time or even harmful to growth because the
               | experience is too painful to integrate. On the other
               | hand, someone who is always let off the hook may never
               | develop a true sense of responsibility and things only
               | get worse. There's no single factor to tell what's the
               | right thing to do all the time.
               | 
               | But within the theme of this thread, I strongly doubt the
               | optimum solution is "full punishment in every case for
               | everyone the moment they cross the age of majority."
        
               | mindslight wrote:
               | Well the effect of applying draconian computer intrusion
               | laws is extremely damaging to anybody's trajectory, so
               | it's understandable to want to find some empathizeable
               | reason to soften the blow. "Kids" get punished by paying
               | damages and a stern "don't do that again", whereas for
               | adults it's like here's your ten year federal prison
               | sentence for being a witch.
        
               | PragmaticPulp wrote:
               | > Wow, imagine hating your boss so much you go to so much
               | creative and illegal lengths (that can backfire against
               | you) to track him, instead of using same skills legally
               | to finding a better job.
               | 
               | I've mentored a lot of juniors. It's not uncommon for
               | young people, especially those with less developed social
               | skills, to have an undeserved fear of their boss or
               | anyone else with authority. It's common with young people
               | who have debilitating anxiety and a tendency toward
               | rumination. They think that as long as they avoid the
               | authority figure, they can avoid any negative social
               | interactions (which are largely imagined).
               | 
               | It's possible that the boss was bad, of course, but I
               | kind of doubt it given that his response to this
               | situation was to let the person off easy.
        
               | ChuckNorris89 wrote:
               | _> I've mentored a lot of juniors. It's not uncommon for
               | young people, especially those with less developed social
               | skills._
               | 
               | Sure, but even as a junior employee, we're still talking
               | about mature adults here, not kindergarten kiddies, who
               | can vote, pay taxes and are held accountable for their
               | actions in front of the law, so they should be aware that
               | deliberately backdooring their employer so that they can
               | surveillance their boss, not only most likely violates
               | their employment contract they signed and can have
               | serious legal backlash against then both from the company
               | and from the person who's privacy they were trying to
               | break.
               | 
               |  _> It's common with young people who have debilitating
               | anxiety and a tendency toward rumination._
               | 
               | Yeah, I get that, but how is this in excuse for hacking
               | your employer/boss? Why not seek therapy from
               | professionals for that and try to either quit toxic
               | workplaces or report abusive bosses and find a workplace
               | that accommodates your personality and emotional type,
               | not try to hack and backdoor your employer's network to
               | keep tabs on your boss.
               | 
               | There is no workplace in the world and no work colleagues
               | that will tolerate you hacking their network and invading
               | their privacy because you have anxiety and a tendency
               | toward rumination.
        
               | nickelcitymario wrote:
               | > Why not seek therapy from professionals
               | 
               | No disagreement here, but to answer your question: If
               | someone is struggling with social anxiety, they actually
               | have to somehow overcome their anxiety enough to seek
               | that help. It can be a real catch-22. (Not a
               | justification for this person's actions by any means.
               | Just explaining motivation.)
        
               | PragmaticPulp wrote:
               | > Sure, but even as a junior employee, we're still
               | talking about mature adults here
               | 
               | It's a wider range than you'd think. Juniors range from
               | seasoned employees who have had various jobs over the
               | years to completely green employees who have never had to
               | work a day in their lives. The latter group can allow a
               | lot of people to avoid dealing with their problems and
               | maturing for a long time.
               | 
               | > Yeah, I get that, but how is this in excuse for hacking
               | your employer/boss?
               | 
               | It's not, and I never said it was. I was only replying to
               | the insistence that the boss must be a terrible person.
               | 
               | This behavior is never acceptable.
        
               | eternityforest wrote:
               | Doesn't anxiety tend to not make you want to sprinkle
               | boxes of malware in network closets?
               | 
               | Like, I would be absolutely terrified to even
               | accidentally overhear someone talking about this and
               | possibly be dragged into it that way.
        
               | PragmaticPulp wrote:
               | The author of this piece didn't work at the company. It
               | sounds like the company wasn't really full of technical
               | people. The perpetrator probably thought they were so
               | much smarter than everyone else that they'd never be
               | caught.
        
               | ortusdux wrote:
               | They sell laser trip-wires that act as usb keyboards and
               | can hide windows, lock your computer, or run scripts.
               | 
               | https://www.tindie.com/products/dekuNukem/daytripper-
               | hide-my...
        
             | vorticalbox wrote:
             | Any plans to release to code? I would love to take a look.
        
               | TedDoesntTalk wrote:
               | The license.md does not say it is open source :)
        
               | mbreese wrote:
               | The person who has the device never agreed to that
               | license...
        
               | brazzy wrote:
               | ...which means that by default they're basically not
               | allowed to do _anything_ with it.
        
               | dehrmann wrote:
               | Finding a book on a sidewalk doesn't mean you can scan it
               | and legally distribute it.
        
               | SolarNet wrote:
               | Yes but if said book was used in the commission of a
               | crime there is a certain level where it doesn't matter.
               | 
               | Don't plug shit into private networks unless you want it
               | reverse engineered. This falls under the fair use
               | exceptions (learning what software is doing / was doing
               | to your network).
               | 
               | The copyright holder can take it up with whoever they
               | licensed it to, there is a reason a lot of them read "not
               | to be used in the commission of a crime".
        
             | mannykannot wrote:
             | At one point you wrote "It is beyond me why a co-founder of
             | a company would distribute these devices around town but
             | well.." I take it, however, that the installer turned out
             | to be someone else. Now I am curious as to whether this
             | company advertises itself as a supplier of such things, and
             | if so, what it claims about their capabilities. Given that
             | the code has not been reverse engineered, can you be sure
             | its capabilities are limited to data exfiltration? I'm also
             | wondering what the perpetrator was up to, if the device's
             | purpose was indeed to help him avoid the boss.
        
               | BadGhost wrote:
               | This is what I was thinking, except that I started
               | wondering what weird shit this company or its owner are
               | up to.. Maybe a slap on the wrist is just a solution to a
               | mutually assured destruction situation. We all love
               | conspiracy theories so if i were the author of this
               | article id quickly quash this one and provide some more
               | deets.
        
             | Abimelex wrote:
             | how hard can you obfuscate nodejs? I'm pretty sure if you
             | drop the code in some infosec channels they will happily
             | take the challenge and tell you what it does ;)
        
               | TedDoesntTalk wrote:
               | An easier solution might be to look at the packets the
               | nodejs program is sending over the network (if you can
               | configure a MITM)
        
               | vorticalbox wrote:
               | Its package.json and / or node_modules might also give
               | some clues
        
         | cerved wrote:
         | > cat config.json | jq
         | 
         |  _cries in UUoC_
        
         | helsinkiandrew wrote:
         | Would have been interesting to see what they were doing -
         | nRF52832-MDK doesn't have wifi - perhaps the person was
         | scanning/logging bluetooth devices.
        
         | qngcdvy wrote:
         | Did you ever find out what it did there exactly? Like, what it
         | collected and what the "gifted person" wanted to do with that
         | data?
         | 
         | edit: Thanks for the write-up btw. Was a nice read, although a
         | bit short (which is the story's fault I guess)
        
           | xattt wrote:
           | Is "gifted person" code for something? Are they from some
           | sort of enrichment program?
        
             | xwdv wrote:
             | "Gifted" individuals are selected at early ages to run
             | through rigorous education programs that greatly push them
             | ahead of their peers. It is a pipeline to create
             | intellectual elites and captains of industry. Gifted kids
             | are widely accepted as the most intelligent kids of a
             | school and held up as the finest examples of the school's
             | educational abilities.
        
               | more_corn wrote:
               | However, there doesn't seem to be a correlation between
               | membership in gifted programs and success later in life.
        
               | myself248 wrote:
               | Wow, that's a warped description if I ever heard one. I
               | always felt like "gifted" was a label given to kids who
               | were out-of-place in a normal classroom, to justify
               | having special education so they were less likely to
               | disrupt class or kill themselves out of boredom.
        
               | ukyrgf wrote:
               | Hm, for me it meant I mostly stuck with the same student
               | peer group throughout grade school, I think we got to
               | skip some standardizes tests, and I was able to get a
               | school bus to the bigger schools even though I was way
               | out in the sticks. I had to go through an aptitude test
               | and even though I was only like 7 I still remember
               | sitting in the car after and being mad at myself for
               | missing a question about "another word for water" being
               | H20.
        
               | emteycz wrote:
               | Yours is the warped one. Gifted student programs are very
               | common, and while they are sometimes used for what you
               | say, it's not the designated purpose.
        
               | bitexploder wrote:
               | Do kids in gifted programs go on to become intellectual
               | elites and "captains of industry" at higher rates than
               | their peers?
        
               | egypturnash wrote:
               | Anecdotes are not data, but I was in the Gifted And
               | Talented program in high school and I sure did not become
               | either of those. I'm eking out a living as an obscure
               | freelance artist. A lot of my friends are former G/T kids
               | who did not live up to their supposed promise, too.
               | 
               | It got me some interesting opportunities here and there
               | but I am fundamentally kind of a slacker :)
        
               | Cthulhu_ wrote:
               | Nope, it's a dick shaking title that can give kids issues
               | in life.
               | 
               | Someone I know was called gifted at some point, he didn't
               | end up in any accelerated programs but he did end up in
               | higher education... which he only finished after many
               | years, meanwhile he was eating, drinking and smoking his
               | student loans + job income away, he ended up broke and in
               | debt, and to date - 10, 15 years later - is still
               | unemployed.
        
               | pnutjam wrote:
               | haha... no, but their parents feel special. NY public
               | schools used their gifted program as a way to keep white
               | kids in majority non-white schools.
        
               | officeplant wrote:
               | I was put through through multiple gifted programs in
               | both middle school and high school (Southern US). I loved
               | the challenging course work from dealing with college
               | level science classes as early as the 7th grade. The main
               | problem with gifted programs is it really makes normal
               | public schooling extra miserable once you are back with
               | the general population. Uncaring teachers, scantron
               | tests, and large classes sizes left me depressed with
               | schooling quality.
               | 
               | Once I got to college after graduating from a boarding
               | school for gifted teens it was like a culture shock back
               | to the world of horrible professors. I nearly failed out
               | of college due to being completely uninterested with the
               | lack of engaging materials in first semester classes.
               | 
               | Ended up with a degree in broadcast journalism because it
               | was an easy path to graduating in less than 3 years.
               | Especially because I was graduating during the 2008
               | financial crisis and just wanted to be done with school
               | and find whatever job I could to get a start in the real
               | world.
               | 
               | It's a nice piece of paper for HR to nod at and let me
               | pass the degree hurdle.
               | 
               | My favorite moment was working a shit retail job in 2010
               | and running into another graduate of the same gifted high
               | school working a fast food job just to survive.
               | 
               | EDIT// I did have some classmates go to found companies,
               | work for NASA, etc. They were driven people who could
               | have prospered in any scenario honestly.
        
               | brimble wrote:
               | Not by much, I'd bet. If at all.
               | 
               | The poster seems to have confused top-tier private
               | schools and gifted programs. Read enough politician and
               | C-suite and such bios and it's very clear what's going
               | on. You practically never see "attended a pretty decent
               | public high school--but was in the gifted program!"
               | Private college prep secondary schools (at the very least
               | --often it's private schools all the way) on the other
               | hand are overwhelmingly the norm in that set.
               | 
               | It's kinda depressing as a parent. If you haven't scraped
               | together 25+k/yr for elite prep school tuition (and,
               | probably, boarding) all your "you can be anything you
               | want if you try really hard!" is _kinda_ a lie. Like,
               | that 's still much better than not trying hard and will
               | likely improve your life outcomes, but, looking at the
               | actual world, realistically... nah, sorry, you're
               | _probably_ locked out of a lot of options. There are _de
               | facto_ requirements, and we couldn 't afford them. Sorry
               | kid.
               | 
               | Similar story with The Arts. You start looking at the
               | backgrounds of very high-paid artists of all kinds
               | (actors, musicians, even authors a lot of the time if
               | they're considered good and not "merely" popular) and
               | you're likely screwed if you weren't at least one of: 1)
               | born to a family that's already successful at that, or 2)
               | had an expensive and very focused education starting
               | before college. Lots of the successful folks had _both_
               | of those things. Again: there are counter examples, and
               | it 's _technically_ possible to get in if your parents
               | weren 't in the arts and you didn't start
               | gigging/acting/attending-an-artsy-private-school by the
               | time you were 12, but realistically you're looking at a
               | serious uphill battle.
        
               | lemarchr wrote:
               | > _Private college prep secondary schools (at the very
               | least--often it 's private schools all the way) on the
               | other hand are overwhelmingly the norm in that set._
               | 
               | To which data set are you referring? Data from 2019 found
               | that 80% of Fortune 100 CEOs hold undergraduate degrees
               | from public institutions[0].
               | 
               | [0]: https://www.forbes.com/sites/kimberlywhitler/2019/09
               | /07/a-ne...
        
               | visarga wrote:
               | I think in most cases supporting kids with money and
               | professional experience is family merit. The family spent
               | money and effort to help its next generation. Maybe they
               | are not rich, just education focused and ready to
               | sacrifice a lot to achieve it. On the other hand having
               | too much family wealth correlates negatively with
               | academic accomplishments.
               | 
               | The complexity of art and math doesn't change depending
               | on how you learn or how rich is your father. Even with
               | support a kid has to gain the same useful skills. What
               | matters is ability, not how the kid got there. They are
               | just kids, everything that shaped society into what it is
               | happened before they were grown enough to have any say in
               | it.
        
               | itbeho wrote:
               | This one didn't:)
        
               | didericis wrote:
               | Good question. The programs themselves are generally
               | good, as far as I've experienced, but the culture around
               | them is often quite toxic. Many kids are treated like
               | race horses. I'm not sure how effective they are on net.
               | Most highly successful people seem like autodidacts that
               | end up finding the resources they need one way or
               | another. Would guess the best way to create more of those
               | people is just to keep a lot of doors open and hope
               | someone like that walks through.
        
               | DarylZero wrote:
               | Culture overrun by rich overachievers gaming the
               | selection system?
        
             | quassy wrote:
             | It's in the article: The author found information about the
             | presumed attacker on a site where parents write about their
             | gifted (= highly talented) children.
        
               | xattt wrote:
               | Thanks! I couldn't handle the tension and jumped to the
               | end of the article to see how it unfolded.
        
           | [deleted]
        
       | [deleted]
        
       | amelius wrote:
       | Heard a story about some ethernet device cemented into the wall,
       | perhaps on HN. Good luck finding that ...
        
         | Jolter wrote:
         | Once upon a time when Zigbee was the latest hype, a friend
         | worked on a project to cast cheap hygrometer sensors into
         | concrete and have them report via a mesh network. Apparently
         | sensors were predicted to be cheaper than to have an engineer
         | walk the site taking readings to ensure it's ok to start
         | covering it up.
        
       | poopsmithe wrote:
       | Ah damn, I didn't want the story to be over. That was a good
       | read!
        
       | eertami wrote:
       | >And what do we do, when we want to find out a location
       | associated with a wifi name? We go to wigle.net, enter the SSID
       | (=wifi name) and it tells us where on the world it is found.
       | 
       | I've always enjoyed having unique/personal SSIDs, but had never
       | seriously considered this consequence. I wonder what the worlds
       | generic SSIDs are.
        
         | fnord77 wrote:
         | https://wigle.net/stats#ssidstats
        
         | jon-wood wrote:
         | If you're ok with people's devices making attempts at
         | connecting, eduroam, or some variant of Starbuck's Wifi might
         | be good options. There'll be APs broadcasting those SSIDs all
         | over the world.
        
         | Hamuko wrote:
         | "Home" returns quite a lot of results in my area on Wigle.net
         | despite the fact that English isn't an official language here.
         | You can probably pick and choose any generic Wi-Fi router
         | manufacturer name. "Linksys" paints the map pretty well.
        
         | tgsovlerkhgsel wrote:
         | There's a good chance he could have also recovered a MAC from
         | logs etc.
         | 
         | What's more important is that you _don 't_ set your SSID to
         | hidden: Someone needs to broadcast the SSID for the connection
         | to work, and if it isn't the AP, it will be your mobile device
         | broadcasting it _everywhere you go_!
        
         | egypturnash wrote:
         | A little browsing around wigle.net brings me to a page listing
         | SSIDs and manufacturers: https://wigle.net/stats#ssidstats
         | 
         | xfinitywifi is the top, with 2% of the routers seen having that
         | name; it's followed by XFINITY (.73%), BTWiFi-with-FON (.38%),
         | linksys (.37%), BTWifi-X (.35%), <no ssid> (.31%). The next one
         | is AndroidAP at .28% and that feels like a good place to stop
         | copying data, go look at the page if you wanna see more of the
         | world's generic SSIDs. Basically "manufacturer name" and
         | "internet provider name" dominate.
        
         | CGamesPlay wrote:
         | Consequence of the generic SSID is that your device will try to
         | connect to any instance of this SSID and re-prompt for a
         | password when it fails to do so.
        
       | juanse wrote:
       | I would literally read one of these story every day before going
       | to sleep.
       | 
       | I will never have enough. Amazing read!
        
       | pantalaimon wrote:
       | The nRF52832-MDK has neither WiFi nor RFID capabilities
        
         | barbegal wrote:
         | The chip has 13.56MHz RFID capabilities but obviously needs to
         | be attached to an appropriate antenna which this dongle does
         | not have.
        
         | JoeAltmaier wrote:
         | Sure it does! https://wiki.makerdiary.com/nrf52832-mdk/
        
           | BlueTemplar wrote:
           | Because you can use the 2.4 Ghz chip antenna for anything you
           | want to, including WiFi ?
        
       | phnofive wrote:
       | original discussion, 154 comments:
       | https://news.ycombinator.com/item?id=18919129
        
       ___________________________________________________________________
       (page generated 2022-01-17 23:00 UTC)