Through Glass Transfer (TGXf)

(207 views)

  The TGXf application demonstrates that:
  • Any file that a user can read (use) can be downloaded (disclosure) via the screen, and;
  • There are currently no technical controls to mitigate the proof-of-concept implementation.

  Although technical vulnerability is constantly evolving (the proof-of-concept is defeatable), there is no foreseeable mitigation to the class of vulnerability described (storage based covert channels) and the general approach taken. This has the most impact when considering domestic enterprises that provide off-shore (overseas) partners with access to domestic data and processing infrastructure on-shore.

In technical terms, TGXf encodes binary data into packets that can be displayed on the screen of one computer and then captured (via camera) on another, where they are decoded and the data is stored on disk. By doing this, TGXf turns any display surface into a binary data transfer interface and bypasses enterprise security strategies (including defence-in-depth strategies).

  You can see a TGXf transfer in action here;

    Android smart-phone in flight mode, downloading a PDF from Youtube via a Laptop screen
    

  Taking the same approach, I have written the Through Keyboard Transfer (TKXf) protocol and application.

  The TKXf application demonstrates that:
  • Any user with write access to an environment can upload arbitrary scripts/executables/data.
  • There are currently no technical controls to mitigate the proof-of-concept implementation.

  You can see a TKXf-like transfer in action here (this example does not use a full TKXf implementation);

    TKXf Demo - Keyboard upload of payload via Windows to Linux
    

When you combine both TGXf and TKXf you get a full Through Console Transfer (TCXf) capability that enables full duplex (async) streaming binary data through the screen and keyboard, that is even able to facilitate networking through that screen and keyboard.

A TCXf demonstration can be seen here, facilitating SSH over PPP over Screen and Keyboard, via SSH from a Windows Thin Client to a Linux Server.

    TCXf Demo - IP networking over Screen and Keyboard!
    

This issue is not limited to the technical domain.  In June this year I wrote to the Office of the Australian Information Commissioner to advise of the legal implications of TGXf's transformation of "use" to "disclosure"
against the revised Australian Privacy Principles (as published February 2014).  And this is obviously not limited to the Australian regulatory frameworks or technologies in use in Australia, I believe that it will also directly affect those working with HIPAA, for example.

In that regard, I have published an information site online to draw the attention of the information security industry to the problem (https://thruglassxfer.com/). I have also presented directly to the industry on the topic, at the COSAC/SABSA conference two days ago in Dublin.  That presentation can be downloaded from the information site;

    Piano Thieving for Experts: That Bathroom Window IS Big Enough
    https://thruglassxfer.com/Piano%20Thieving%20for%20Experts%20-%20SABSA%202014%20-%20v1.5.ppt

  A participant of that presentation published an article on it yesterday;

    Data Leak Prevention Has A New Challenge:
    Introducing Through Glass Transfer
    https://www.forbes.com/sites/richardstiennon/2014/10/01/data-leak-prevention-has-a-new-challange-introducing-through-glass-transfer/


For your convenience, I have produced a 200 page white paper that covers the above and much more (including a test plan, the impact on Enterprise Security Architectures, a potential controls frame-work, and the gaps in NIST's Special Publications - for those relying on that framework);

    ThruConsoleXfer (TCXf) White Paper
    https://thruglassxfer.com/TCXf%20White%20Paper%20-%20Midnight%20Code%20-%20v1.1.pdf


​Source: ​

https://midnightcode.org/

November 7, 2014
Subscribe
Notify of
guest
3 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
7 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

joblow
joblow
9 years ago

How well would SSTV work with this?.

brutelogic
9 years ago

Awesome!

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.