Hijacking The Outdoor Digital Billboard

2y ago
32 Views
2 Downloads
475.16 KB
29 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Brady Himes
Transcription

Hijacking the OutdoorDigital BillboardTottenkoph Rev Philosopher

Who are we?Tottenkophtottenkoph@gmail.comMember; Hackers for CharitiesRevHost; Denver, CO 2600PhilosopherMember; Denver, CO 2600

What do we cover? Tools and Information NeededIn case you wanted to try hacking the billboard, here’ssome information and tools that will come in handy. Obligatory Disclaimer We are not suggesting,teaching, or condoning the hacking of The Company’sOutdoor Digital Billboard Network. /ObligatoryDisclaimer Physical and Network VulnerabilitiesYes, they exist and yes, there are many of them

What do we cover? What *NOT* to DoA few things that you would want to avoid if you weregoing to attempt hacking the billboard. (See previousslide for Obligatory Disclaimer) The Purpose a Hacked Digital BillboardServesWho would want to do this? Why?

Why did we do it? Was told, “I bet you can’t hack that.”No one had done it yetSaw it as a possible target for future lulzWe were drunk and it sounded like agood idea at the time

Who are they? International telecommunicationscompany Boasts that they have the only digitalbillboard network in the countryThis is quickly changing as other companies arerealizing they can save and make money by doing thisas well as get the environmentalists off their back (canclaim they’re being “green” by not building morebillboards). By the time that this presentation is given,they will also have added billboards in various parts ofEurope.

The Company (Cont.) VERY litigation happyThey have a super big team of lawyers (we assume)and we have none. So we’re not going to specifywhich company it is and maintain that this is forinformational purposes only. /ass covering Appears as the blurry thing in all of ourpicturesBlurred out because, again, they’re very litigationhappy. Utilizes different manufacturers for theirboardsThis provides various ways to get into their network.

BillboardTo our knowledge, three primary types of billboards exist: The first type contains a Verizon Telephone NetworkInterface with clearly marked ADSL POTS splitter andhalf-ringer. Instructions as to the testing and wiring of thetelephone line accessible from an exposed phone jacksuggest the performance of a basic GO-NO-GOcontinuity test from the site of said billboard; further useand/or potential vulnerabilities of this line for remoteaccess are unknown. Self-actuated data connections for update purposesare presumed.

Billboard with VerizonTelephone Network Interface

Wireless/Satelite The second type of billboard site notedcontains a nondescript box with a satellite dish. It is known that the only three methods ofbillboard access and maintenance are satellite,POTS and wireless. The existence of POTS in addition topotentially unencrypted wireless traffic at thesites of digital billboards presents a theoreticalsecurity risk in the instance of the presence ofpotential intruders on the intranet.

The billboard (Cont.)

Plug in An unlabeled box similar to the one present atthe second classification also exists at the siteof the third, secured with a standardcommercial Master brand lock. The medium of external communication fromthis billboard is unknown at present, althoughthe presence of POTS is conjectured. An E-Clips surge suppressor is also visible atthe site of the third billboard.

The billboard

Physical Vulnerabilities Social Engineering-- Sales people are really cool people because they’llanswer any question you have if they think they’regoing to get a sale. We were able to find out imagespecs, uploading information, and some securityprocedures.Sooper Seekrit Passphrase: Money is no option.-- “I work for IT” or “I’m a college student majoring inmarketing”. Yeah, they still fall for that.

Physical Vulns (cont.) The Billboard--One security camera, pointing at the images on thebillboard--Nothing surrounding the area around the billboard onthe ground (gate, fence, etc.)--Located off the side of a road, most of which don’texperience heavy traffic between 2:30 and 4:00 in themorning.

Physical Vulnerabilities(cont.) The Billboard (cont.)--Usually within walkingdistance of a parking lotthat’s almost emptyduring the same hours--The only thing betweenyou and the console atthe bottom of a billboardis a:CommercialMasterlock(LOL!)NOTE: Sometimes thereisn’t a lock at all.

Network Vulnerabilities They are vulnerable to:--People connecting wirelessly (that’s right folks, toconnect, you don’t have to worry about passwords orencryption)--Packet sniffing (able to see where they’rebroadcasting to, could spoof the address, and voila)--War dialing (depends on the location, but we weretold by a sales associate that this is one of theirconcerns)

Network Vulns. (cont.) They are guilty of:--Not closing unused ports--Using default usernames/passwords (admin,password, etc.)--Using global usernames/passwords (A newly foundfriend of ours that works for them told us this)

Information Image requirementsFrom The Company’s web site:DIGITAL BULLETINs200 h x 704 w pixel resolution or2.778” h x 9.778” w (No Bleed)RGB / 72 DPI / JPG format Which billboard you’re going to go toIt helps to plan ahead when and where you’re going. Cover storyThis is useful for when you’re questioned by authorityfigures (police, parents, etc).

Tools A laptopDepending on which billboard you approach, you mayneed a laptop with all of the spiffy wireless and packetsniffing tools that are out there nowadays. Lock pick kit 1 “Ninja” point. 1 Style Bolt Cutters (in lieu of lock pick kit)-1 “Ninja” point. 1 “brute forcing” point. Misc. tools dependent upon the type ofbillboard.

What Not to Do Try this during the day or peak hours ofthe eveningAs a rule of thumb, wait about half an hour after lastcall to ensure that the drunks are well on their wayhome and the cops are busy with them, not you. Do it during the holidays and/or weekend Forget to use gloves Mess with the box with the bright orangesticker

What not to do (cont.) Hack a billboard near your house Leave any sort of evidence that you werethere (besides the image) Pay for the advert and claim it was ahack.

Who would do this? (Graffiti) ArtistsIt’s a new medium that is in a public place that gets lotsof exposure. Young peopleHormones Destruction of someone else’s property lulz HackersIt’s something new to exploit and take advantage of.

Who would want to do this?(Cont.) ExtremistsDigital billboards would be a great way for them tospread their message to a large audience quickly andwith little or no cost to them. GovernmentsSee above.

Why would they want to? VandalismThere will always be someone who wants to destroysomeone else’s property (for example, adding a wordbubble next to [insert name here]’s face that says“LOLDONGS”). Digital GraffitiAgain, it’s a new medium and they can either slightlyalter pre-existing adverts to convey something else orthe images can be taken offline and the graffiti artistscould use the then-blank billboard as a clean canvas.

Why would they want to dothis? (cont.) Guerilla AdvertisingSort of became a buzz word that doesn’t hold any true meaning tothe listener. It usually alludes to aggressive, unconventionalmarketing methods that is done on the cheap, uses psychologyand focuses more on creativity and generating more referrals andbigger transactions. Spreading propagandaWhy just settle for the news, tv commercials, emails, and posters?By posting your message on the billboard network, it’ll appear foreight seconds on every billboard in that particular networkrepeatedly for an undetermined amount of time. The LulzNote: This defense will only be useful in Internet court.

EOF For more informationcontact Tottenkoph:tottenkoph@gmail.com Website with pictures, information andvideo coming soon!

In case you wanted to try hacking the billboard, here’s some information and tools that will come in handy. Obligatory Disclaimer We are not suggesting, teaching, or condoning the hacking of The Company’s Outdoor Digital Billboard Network. /Obliga

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Zoom Flex Outdoor Billboard ZOOM-FLX-OD-BB The Zoom Flex Outdoor Billboard is a strong, flexible billboard perfect for outdoor promotions and events. Features include sturdy base plates on the inside of the unit and tube frame construction with flexible fiberglass poles near the top, which allow the display to move with the wind.

The Hollywood Reporter /Billboard Film & TV Music Conference. Nov. 16 -17 at the Renaissance Hollywood Hotel, Los Angeles. Information: 646 -654 -4660 Billboard Music Awards. Dec. 8 at the MGM Grand Arena, LasVegas. Information: 646- 654 -4600 billboardevents.com BILLBOARD OCTOBER 30, 2004 www.billboard.com www.billboard.biz 3

A - provider is used by AngularJS internally to create services, factory etc. B - provider is used during config phase. C - provider is a special factory method. D - All of the above. Q 10 - config phase is the phase during which AngularJS bootstraps itself. A - true B - false Q 11 - constants are used to pass values at config phase. A - true B .