Warshipping (original) (raw)

About DBpedia

In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPh

Property Value
dbo:abstract In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPhone, in order to explain the shipment. The advancement of low-power electronics, thanks in part to Maker culture, has greatly increased the effectiveness of this methodology as a credible method of attacking networks. In 2019, IBM X-Force Red coined the name “Warshipping” and described an attack platform that included several low-cost components that could be combined, shipped to targets, and controlled remotely for 2–3 weeks. A solar component was also described to allow the devices to run indefinitely. Aspects of a modern warshipping attack include the following: * Devices that are hidden from the recipient, potentially inside objects or inside the packaging material or box structure itself. * Command and Control (C2) capability via a dependable communication medium. Most commonly this is provided via cellular modems. * A power management strategy that allows the device to operate for weeks. Solar panels may be utilized to lengthen the run-time of the device. * One or more devices used for the operational attack. These can include radios that are built for protocols such as Bluetooth, Wireless LAN, Near Field Communication (NFC), and software-defined radio (SDR) devices for capturing multiple types of protocols. Microphones, cameras, and other capture devices could be included as well. * Global Positioning System (GPS) technology for reporting on the location of the device, allowing the activation of certain capabilities upon delivery to its target. * Passive triangulation to get around GPS signal issues The increasing use of large, online retailers contributes to the relevancy of this attack. In 2019, the United States Postal Service reports that they deliver 484.8 million mailpieces per day. The name is by analogy with wardriving and wardialling. (en)
dbo:wikiPageID 61467609 (xsd:integer)
dbo:wikiPageLength 3937 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1115671665 (xsd:integer)
dbo:wikiPageWikiLink dbr:Bluetooth dbr:Global_Positioning_System dbc:Computer_security_exploits dbr:Penetration_testing dbr:DEF_CON dbc:Wireless_networking dbr:Wireless_LAN dbr:Solar_panels dbr:IBM dbr:IPhone dbr:Maker_culture dbr:Software-defined_radio dbr:Social_engineering_(security) dbr:Wardriving dbr:Near_Field_Communication dbr:Package_delivery dbr:Wardialling
dbp:wikiPageUsesTemplate dbt:Reflist dbt:Short_description
dct:subject dbc:Computer_security_exploits dbc:Wireless_networking
rdfs:comment In computer network security, Warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled, “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A Social engineering (security) pretext was described that would trick the recipient into believing they had won an iPh (en)
rdfs:label Warshipping (en)
owl:sameAs wikidata:Warshipping https://global.dbpedia.org/id/Bv5KC
prov:wasDerivedFrom wikipedia-en:Warshipping?oldid=1115671665&ns=0
foaf:isPrimaryTopicOf wikipedia-en:Warshipping
is dbo:wikiPageWikiLink of dbr:Wardriving
is foaf:primaryTopic of wikipedia-en:Warshipping