As part of our preparation for our presentation for OzSecCon 2018, we were given a 4 layer tamper evident lock box challenge to try. The goal of the challenge was to get into the box, copy a computer file, and reseal the box with all tamper evident seals back in place. We were given a few rules on what we could and couldn’t do. These were:
- We have to bypass the seals, not dismantle the box or use some other method of getting in
- No lockpicking of the lock. The key has to be used to unlock the box
- At the end, there must be no evidence the box has been tampered with or the file had been stolen
There were 4 types of seals:
- A Padlock seal, with serial number
- A non-transfer tamper evident label, with serial number
- A tamper evident bag, with serial number
- A total transfer tamper evident seal, no serial number
Having seals with serial numbers made it even harder as we couldn’t destroy the seal and swap it with another one. We had to be very careful not to wreck them.
We used 4 different methods to defeat the seals:
- Padlock seal – we cut the wire, then used electrolysis to dissolve the metal, and then replaced the metal with new one from another seal
- Non-transfer tamper evident label – we froze the label using an upside down can of compressed air
- Tamper evident bag – we very slowly used a heat gun to soften the glue and open the bag
- Total transfer tamper evident seal – we used a chemical bypass method using Shellite
Once we got through all 4 seals we accessed the “garbage file” which was funny as it’s from one of our favourite movies, Hackers! ????
We then replaced all seals with the USB key back in the bag and closed it all up.
Watch our video and see it all in action!!!
We can’t wait for our next challenge!!!
0 Comments