Xbox Account Lockout

Last month I got a new iPhone. This month I realized I forgot my Xbox One password when I tried to log in to download some Games With Gold.

I didnt think this would be a problem.  I forget and rest passwords all the time.

So I go through the normal steps and have it send me an email:

Screen Shot 2015-12-16 at 9.08.22 PM

Then I get this screen:
Screen Shot 2015-12-16 at 9.10.23 PM

Did I mention I got a new phone?  When you get a new phone the authenticator app resets and you have to add back your account so I click I dont know.

Screen Shot 2015-12-16 at 9.15.30 PM

I have to take responsibility for this.  I didn’t save a recovery code on my mac so I click no and I get this screen:

Screen Shot 2015-12-16 at 9.15.41 PM

This is where this goes off the rails for me.  30 days To reset my Xbox account because I enabled 2FA?

So I call Xbox support and Jacqueline says there is nothing they can do and I have to wait until January to reset my account password.

How does this make any sense?   Without 2FA I could have reset my password in 30 seconds with no problem but since I enabled it I wont be able to use my Xbox for a month?

Microsoft couldn’t text me a one time password, or give me a call or email an alternative email?  Someone decided 30 days was the right answer?

Microsoft you are doing account management wrong.  If you need me I will be buying a PS4.

UPDATE: After 2 hours and 43 minutes on the phone and zero help from any Microsoft staff I was able to find out that you can get a new recovery code for 2FA on the actual XBoxOne console:

2015-12-17 16.41.49

After I did that I was able to reset my password and disable 2FA.

Thoughts on TrueCrypt

On Wednesday night I tweeted this:

I started getting retweets and replies like this on Friday from people I respect (and a bunch from people I don’t know):

So people REALLY like TrueCrypt or I didn’t make my point articulately enough.  In case I didnt make my point well enough I will try to lay it out here.

3 Reasons Why I Think You Should Stop Using TrueCrypt:

The developer stopped maintaining it, took down the webpage and replaced it with this.
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues“.
Screen Shot 2015-12-12 at 2.51.13 PM

I think that this reason should be more than enough to get 99% of people to stop using it.

The latest version of HashCat includes support for TrueCrypt volumes.
If you are using good passphrases (most people don’t) it really isnt a big deal but it does lower the level of complexity for hacking a TrueCrypt volume with a weak password from a medium-high skill level (Think Security Professional) to downloading kali and following instructions (Think Help Desk Analyst).

The developer stopped maintaining it, took down the webpage and replaced it with this.
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues“.
Screen Shot 2015-12-12 at 2.51.13 PM

There are many other open source and paid alternatives that you can evaluate and pick the best one for you.  So unless you have an amazingly valid reason to not move off of TrueCrypt you should move off it as soon as possible. 

 

Decoding HID Proximity Cards

HID proximity cards encode a facility code and internal card number in hex on most cards.  Decoding it is extremely easy and should take less than a minute.

Equipent Needed:
Omnikey Reader (I like the 5025CL)
RFIDIOT
BRIVO Card Calculator

Steps:
Run isotype.py from the RFIDIot tool kit and copy the ID:
Terminal_004

Past the ID into the BRIVO decoder:
brivo

It is really that simple.  A made a quick video demo (that is tinted purple for some reason):

I have some writeable HID proximity cards on the way and will have a blog up soon on how to completely clone one.

$25 Handheld RFID Cloner

As part of my research into RFID security I came across the “EM4100 RFID Cloner kit” by KBEmbedded  which outside of having a terrible name is an amazing low-frequency (125 kHz) self-contained RFID cloner that can store  and replay 16 cards.

2015-12-05 16.45.28

I was lucky enough to be in the Portland area this week and be able to have dinner with Kris Bahnsen who designed the board and he said the that he thinks he could rewrite the software to read and replay HID proximity cards which would make this a must have gadget for all security professionals.

As it stands now this is an awesome $25 tool that is amazingly fun to play with and you should order one!

Cloning UIDs with Chameleon

I have recently started investigating RFID security and picked up a Chameleon Mini.  It is an amazing project with a ton of potential. In these quick demo videos I will show how to clone the UID of both a Mifare 1K 4B card and a Mifare 1K 7B card using the Chameleon.

Cloning the Mifare 1K UID (Aria Card):

Cloning the Mifare 1K 7B UID  (Oyster Card):

These were both extremely simple to do.  In the future I will be demoing how to take full card dumps from an RFID card and load it on to the Chameleon Mini for a “true clone”.

Tool List: 
ACR122U
ChamelemonMini
ZTerm
LibNFC
Cardpeek
Oyster Card
Aria Card

Hardware Picture: 

2015-12-02 07.55.17

Disclaimer: While cloning the UID isnt a full spoof of the card WAY (READ:MOST) more organizations rely on UID based authentication then should.  While the tools say the UIDs have been cloned I have not tested these on any live systems and would not without permission.