Errata Security: FERRET

Version 1.0

We presented at BlackHat Federal the idea of "data seepage": bits of benign data that people willingly broadcast to the world (as opposed to "leakage", which is data people want to hide from the world).

Examples of data seepage are what happens when you power-on your computer.  It will broadcast to the world the list of Wi-Fi access-points you've got cached on your computer, the previous IP address you used (requested by DHCP), your NetBIOS name, your login ID, and a list of servers (via NetBIOS request) you want connections to.

Even if you then establish a VPN connection to hide everything else, you've already broadcasted this information to everyone on the local network.

The FERRET tool gathers this broadcasted information and correlates it. It demonstrates how much you expose to hackers.

This is just the 1.0 version of the code that we rushed out for BlackHat.  It is feature-poor, buggy, and probably has a remote vulnerability in it.  It is just in the proof-of-concept stage.  It just prints the data to the command-line, we aren't ready to release the "viewer" utility that correlates it, although it's fairly straight forward to parse the command-line output and do your own correlation.

Get the slides here.

Get FERRET 1.0: