Scenario:

#Hacking #Bitcoin #Cypherpunks

Say you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to ā€œinfectā€ or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.

The MacBook is closed, asleep, and locked with the basic password.

What could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?

If yes, what would you need to pull it off?

#asknostr

Reply to this note

Please Login to reply.

Discussion

Boot into tails via and copy files

How could you prevent usb logging though? I plugged in nothing but a charge cable and immediately unplugged it and there were like 100+ IOPort logs and kernel logs.

Booting to another OS would happen at the firmware/BIOS level, I don’t think it would create a macOS level event in the logs

But the laptop was on but closed & asleep, how would you shut down, boot into another OS & then return it to the previous state without logs?

Ya fair! I was only thinking USB logs in that specific instance, not thinking through the whole scenario

Aren't newer macbooks hard drives natively encrypted so that the files would be encrypted on download? I also don't think TAILS can boot on Apple Silicon (yet)

I don’t think Tails would have access to the local filesystem

I'm not a good hacker

Tis what I do šŸ˜…

the data are encrypted

Recovery is a better way, you can even reset passwords, it’s integrated, no logs

Tails still does not support M-series chips. MacOS recommends to encrypt all data on the first setup.

Easy. Rubber Ducky. Wouldn’t necessarily meet the no logs requirement, but there’s a lot you can do to obscure the commands you run. Plus, almost no one has the skill required to go through logs and craft together what actually happened.

https://shop.hak5.org/products/usb-rubber-ducky

In this case there are explicitly zero logs whatever for the time in which this would’ve occurred.

I don’t see how that’s possible tbh. At some level SOME log has to exist for activities performed.

Does a MacOS filesystem log reads (mounted read only) if not natively booted? And does Mac BIOS setting for USB boot or an encrypted filesystem/storage remain an obstacle to a viable attack vector?

I'm not a hacker or a Mac user since long ago. I'm an defender of opsec for self and those who value it.

I think by default the filesystem is encrypted, so you wouldn’t be able to read if you booted from another drive. There are times where there are vulnerabilities in firmware that allow this sort of thing though.

If you’re talking about a specific thing that’s happened, what likely happened is the attacker just deleted the logs of their activities.

How would they get root access to delete the logs? They wouldn’t be able to without it right?

The real question is about whether someone got into the computer at all, or if it wasn’t even touched. Because during the time span the logging has no records.

So either it was a sophisticated actor with merging I’m not aware of, or they could get root access. But then the question is how they could get root access to delete logs, and then also are there separate logs for deleting things from the file system? šŸ¤”

So ya I’d say that if there are ZERO logs of any kind at the exact time of attack, that’s definitely suspicious. MacOS is extremely verbose, so I can’t see that happening.

As far as getting root, it’s possible they found a privilege escalation vulnerability. It’s not terribly uncommon, especially if you’ve heavily customized things or write a lot of code, which could inevitably give someone a way to root.

As far as logs for deleting logs, it’s definitely possible but I’m not familiar enough with their logging structure to say off hand.

Sucks dude, hope you figure out what happened. One thing you can do is hire a forensics firm, but that’s big money.

I tested it for 10 minutes while asleep just in this train ride. Zero logs whatever. It appears to be shockingly asleep when it is in fact asleep.

When I plug **anything** into any port however, for even the slightest amount of time, there are hundreds of logs.

Hmm… this kinda makes me think you’re safe then tbh. Does it create those logs if you plug in while it’s asleep?

Take out the hard drive and replace it with a new hard drive perfectly set to make the pc work.

How would you do it?

I have no idea. I’m trying to find out if someone got into my MacBook because someone broke into our room and rummaged through our shit

That's shit.

If someone rummaged through your stuff, what’s the likelihood they have the technical ability to pull it off that quickly? Do you know who it was? Or was it a break in?

I’ll be doing an episode on it, but it was in the hotel. We have video of him entering and when he left

People fucking suck.

Were these guys there?

No FileVault?

I think that modern macbook has storage soldered on motherboard…

You need a keyboard combo, an install disk to boot to, and a payload.

Interestingly enough, if I recall, you could at one time do an internet recovery on your Mac. If this is still the case. Boot into recovery set a root password, and set up ssh to accept connections. From there you can deliver payloads and gather information outside the constraints of the 10 minutes.

Can you do that without interrupting the sleep though if the computer is already on and booted?

The computer was specifically asleep, then when checked there was literally no indication that I’ve found so far of tampering. When I opened it back up it appeared to be in the exact same state. You couldn’t boot into another OS without closing the other down right? šŸ¤”

Not without an exploit that hasn't been published anywhere.

You need a keyboard combo, an install disk to boot to, and a payload.

Interestingly enough, if I recall, you could at one time do an internet recovery on your Mac. If this is still the case. Boot into recovery set a root password, and set up ssh to accept connections. From there you can deliver payloads and gather information outside the constraints of the 10 minutes.

This is a definite possibility too, but logs would still be present

Now that I've thought about this a little bit, it would probably be easier to throw a few little cameras into the room and a device to listen for key strokes, but if they rummaged and left a signal they were in there I doubt that's what happened.

They actually didn’t leave much indication that they were there. No obvious suggestion that the laptop was even touched, BUT it happened at the bitcoin conference, was at the speaker’s hotel, and happened *during* the speaker’s dinner. It seems obvious that it was a targeted attack in at least some fashion.

Then you might want to have a lookyloo around or request a room change, if the hotel can be trusted(maybe new hotel). Or just throw every corner of the room a close up of your asshole. Fuck these people.

If the MacBook has not been restarted. So I still was on the same standby. I would think you are good.

For the future:

But best is to have it off when not in direct possession. I always power it off.

There are additional features like a firmware password you can set.

Emzy reminded me that if its in standby the encryption would already be bypassed at that point. if its a silicon version.

I think it would be easier to go after someone’s Apple ID. If you can log into the Apple ID, And their data is backed up on the cloud, You have access to pretty much everything. It’s just the stuff downloaded onto the hard drive that you would not see. Otherwise removing and backing up the hard drive to an external hard drive would be the easiest way, But you actually just need to take apart the computer and plug in the hard drive to a backup device, You would not actually need the password for the Lock Screen. Apple security is basically meant to prevent attacks from stupid gangbanger types that stole someone’s computer to sell for a quick buck. Trust me bro is a much more effective attack for actually getting someone’s data. But good luck taking apart and re assembling someone’s MacBook in 10 minutes without it looking tampered with.

Just a usb and about 60 seconds. Logs would still show up though so they would need to have some persistent way to log in remotely and delete logs.

What would you have on the ISB, and how would you root it to get remote access later?

Not sure its still a valid project one called poisontap comes to mind. You would plug it in and it would Exfiltrate cookies, poison your DNS cache, and then installed persistent backdoor for logging in later. As far as I know it worked on all OS's

This was the project im refering to.

https://samy.pl/poisontap/

does not work with https and some new caching and isolation countermeasures added by browsers

Ah yeah. I knew it dident work with https. I was not aware of newer browser countermeasures, hence why I said it's probably not a valid project anymore.

It’s a side effect of privacy ones actually.

Caching and cookies are now isolated by top level origin

I think you actually get the most data from the exterior.

serial numbers (potentially figure out when and where they bought it)

company inventory numbers (if it's for work), where they work, etc.

stickers (are you into bitcoin, games, ...)

steal it and return it, gain trust and start phishing...

The scenario as proposed is not possible. Not in only 10 minutes, and not without leaving ANY logs.

nostr:npub1gnwpctdec0aa00hfy4lvadftu08ccs9677mr73h9ddv2zvw8fu9smmerrq had a good point though that with remote login they could delete the logs as soon as I got it turned back on maybe? šŸ¤”

My MacOS forensics skills are a little rusty, but even that would leave an indication that something happened for someone looking.

But I don't think you could even get that far if the device is locked and password protected unless you already know the password.

You must’ve found Christine Lagarde’s laptop 🤭

Find any comfort after this scenario? Hope so, good luck brother.