Loading…
Welcome to the full schedule of the OWASP AppSec Research EU 2013 conference days. You’ll find the schedule for the training days at http://trainings2013.appsec.eu
Friday, August 23 • 10:25am - 11:10am
Q-Box and H-Box: Raspberry PI for the Infrastructure and Hacker

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

This is a presentation/demonstration of utilizing Raspberry Pi to create two products hailed as the Q-Box and the H-Box
1. H-Box: Hacking Arsenal 
2. Q-Box: Small-Form Infrastructure Monitoring device. 

The Q-box represents a breakthrough in combining various network monitoring
functions in a small form factor with extremely low power consumption (8 watts) device. It represents a new generation of devices suitable for branch offices as well as small and medium-sized businesses that have heretofore been priced out of the market for this depth of network monitoring and intrusion detection. This presentation is an implementation of Nagios, Snort, and ModSecurity within the framework of Raspberry PI. Each of these aforementioned tools have significant deployment worldwide, all are efficient at their respective tasks, yet they are generally used as a foundation for products that cost very large sums. This presentation is not a demonstration to hype the benefit of using Raspberry PI. Rather, it is a proof-of-concept demonstration that visually addresses the ability of combining professional security tools into the infrastructure of an SMB or multinational client without the expensive outlay of server hardware. 

We will also compare and address the benefits of Q-box and the limitations of today’s Off the Shelf (OTF) solutions. A major limitation that has not been addressed is the processing limitations of an OTF Raspberry PI solution available in today’s market. Currently, our research utilizes a swap file capacity of 1.5 GB that will generate the rPi functional equivalent of 2GB RAM. This is far more than what is found in the rPi components on the market today and quite possibly as much as what may be found in far more expensive network appliance implementations that corporations use for monitoring and intrusion detection. The final benefit of the Q-box is its ability to convert the GPU into a RISC CPU. Network applicances do not need the graphics card, so this altercation was available and as such increases the efficiency of executing commands while minimizing power output.

There will be two live demonstrations: the Q-box on a private network and the H-Box on a local running Web Application.

The second demonstration is an implementation of H-Box. H-Box is a radical advance in a small form factor, easy to deploy hacking arsenal. Although there is at least one known implementation of Metasploit on a Raspberry Pi architecture, there are far more tools that can be added to one’s portable battery of hacking tools. This device is inconspicuous and offers security professionals a rapid breach solution via the HDMI or USB port of a computer, laptop or node.

Speakers
avatar for Fred Donovan

Fred Donovan

Fred is a Professor and an application security researcher.


Friday August 23, 2013 10:25am - 11:10am CEST
Aussichtsreich Emporio