{"id":1895,"date":"2013-05-18T15:08:55","date_gmt":"2013-05-18T15:08:55","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=1895"},"modified":"2013-05-18T15:14:32","modified_gmt":"2013-05-18T15:14:32","slug":"the-hades-haz-you-phantom-%ec%9c%a0%eb%a0%b9-the-dfir-drama-from-south-korea","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2013\/05\/18\/the-hades-haz-you-phantom-%ec%9c%a0%eb%a0%b9-the-dfir-drama-from-south-korea\/","title":{"rendered":"The Hades haz you. Phantom (\uc720\ub839) &#8211; The DFIR drama from South Korea"},"content":{"rendered":"<p>The way the movies portray hacking, forensics, security research and coding is obviously metaphoric and usually made as visually rich as possible to ensure the audience &#8216;gets it&#8217; and as a bonus can see how cool the process is. Anyone who spent a few sleepless nights with Olly and Ida Pro, worked around the clock on forensic cases, reviewed vulnerability reports or source code, or worked in their head on a particular algorithm for a few weeks before actually sitting down and writing the code knows that the reality is a bit more boring \ud83d\ude42<\/p>\n<p>If you ask a random security pro what are &#8216;the best&#8217; hacking movies they will surely laugh pointing out at least a few from the following list:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=2efhrCxI4J0\">Hackers<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=rjGbvpr_dB8\">Swordfish<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=hkDD03yeLnU\"> &#8216;the Visual Basic&#8217; episode of CSI<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?feature=player_detailpage&amp;v=46qKHq7REI4#t=21s\">The Net (IP 23.75.345.200 \ud83d\ude42<\/a><\/li>\n<li><a href=\"http:\/\/www.youtube.com\/watch?feature=player_detailpage&amp;v=mIq9jFdEfZo#t=99s\">The Golden Eye<\/a><\/li>\n<li><a href=\"http:\/\/www.youtube.com\/watch?v=aApTVqeGJMw\">Skyfall <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?feature=player_detailpage&amp;v=vAf9mUnafcQ#t=36s\">Social Network<\/a><\/li>\n<\/ul>\n<p>..and perhaps at some stage they will suddenly become a bit more serious and mention that &#8216;but Matrix did show <a href=\"http:\/\/nmap.org\/movies\/\">NMAP<\/a> in action&#8217;.<\/p>\n<p>Luckily, there are actually movies out there that beat all the above mentioned productions in terms of technical accuracy, and show a relatively realistic representation of\u00a0 IT security work.<\/p>\n<p>This post is about one of them.<\/p>\n<p>A while ago I happened to stumble upon a Korean TV Drama called &#8220;<a href=\"http:\/\/www.amazon.com\/Ghost-Phantom-Korean-Region-Episodes\/dp\/B00C6SK9LY\">Phantom<\/a>&#8221; (also know as &#8220;<a href=\"http:\/\/www.yesasia.com\/global\/the-ghost-dvd-ep-1-20-end-multi-audio-english-subtitled-sbs-tv-drama\/1032410357-0-0-0-en\/info.html\">Ghost<\/a>&#8220;) that made my jaws drop. The drama was produced by a Korean Network <a href=\"http:\/\/tv.sbs.co.kr\/phantom\/\">SBS<\/a>.<\/p>\n<p>The plot of the drama is simple &#8211; The <a href=\"https:\/\/www.youtube.com\/watch?v=v2gfBJ7MeN0\">Hades<\/a> haz you \ud83d\ude42<\/p>\n<p><a href=\"https:\/\/www.hexacorn.com\/blog\/wp-content\/uploads\/2013\/05\/hades.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-1903\" alt=\"hades\" src=\"https:\/\/www.hexacorn.com\/blog\/wp-content\/uploads\/2013\/05\/hades.png\" width=\"622\" height=\"309\" srcset=\"https:\/\/www.hexacorn.com\/blog\/wp-content\/uploads\/2013\/05\/hades.png 622w, https:\/\/www.hexacorn.com\/blog\/wp-content\/uploads\/2013\/05\/hades-300x149.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><span>Copyright notice: The picture of Hades logo was taken from the clip on Youtube. The copyright belongs to SBS.<\/span><\/p>\n<p>Okay, the <a href=\"http:\/\/asianwiki.com\/Phantom_%28Korean_Drama%29\">plot<\/a> is a bit more complicated &#8211; it&#8217;s a &#8220;Face off&#8221; meet &#8220;Jason Bourne&#8221; meet CSI.<\/p>\n<p>Or<\/p>\n<p>Evil Hackers from Korea and Hong Kong vs. Forensic guys from Korean Police.<\/p>\n<p>Since it&#8217;s not IMDB, just a short note on the movie &#8211; I have already described bits of the plot; I don&#8217;t want to spoil it so I won&#8217;t add more information here. The music is all right. The acting is so so (the lead characters are a little bit too stiff and rarely smile). There are gaps in the story as well, but it&#8217;s a TV Drama after all, and it&#8217;s Korean so there is lots of melodrama &#8216;by default&#8217;. There is also a very strong product placement, but if this the only way to get funds to make TV dramas then so be it.<\/p>\n<p>Okay, back to &#8216;technical&#8217; stuff.<\/p>\n<p>What makes this particular TV Drama stand out is the attention to details. While they didn&#8217;t completely escape typical Hollywood\u00a0clich\u00e9 (computers with the evidence are thrown out of the window, logic bombs with a progress bar, etc.) the makers really did their homework and put quite an effort to demonstrate how a typical hacking works. And how forensic guys investigate it.<\/p>\n<p>Lots of scenes are taken in the forensic lab, or on the crime scene &#8211; in internet coffee shops, data centers, etc.. We also witness the actual data acquisition, evidence analysis (HDD, mobile, CCTV footage, video manipulation analysis, social media, Event Logs) and most importantly &#8211; lots of popular DFIR\/RCE software is used to &#8216;understand&#8217; the data and code. This is really not just a single random tool or a hand made HTML page that is supposed to look like &#8216;analysis results&#8217;. Quite the opposite &#8211; many of the most common tools from the DFIR\/RCE\/pentesting arsenal somehow found its way to the drama.<\/p>\n<p>The software I remember seeing includes:<\/p>\n<ul>\n<li>Encase<\/li>\n<li>WinHex<\/li>\n<li>Metasploit<\/li>\n<li>OllyDbg<\/li>\n<li>DCode<\/li>\n<li>SecureCRT<\/li>\n<li>Wireshark<\/li>\n<li>XRY<\/li>\n<li>BackTrack<\/li>\n<li>Process Explorer<\/li>\n<\/ul>\n<p>and lots more (I wish I took notes!).<\/p>\n<p>Last, but not least &#8211; there are also realistic attacks being used as a part of the plot including, but not limited to:<\/p>\n<ul>\n<li>0Day exploits (using documents from Hangul Word Processor)<\/li>\n<li>malware infections<\/li>\n<li>billboard hacking<\/li>\n<li>spoofed emails<\/li>\n<li>identity theft<\/li>\n<li>SCADA attacks<\/li>\n<li>car hacking<\/li>\n<li>hacking back in real time<\/li>\n<li>DDoS attacks<\/li>\n<li>Wi-Fi hacking<\/li>\n<li>social engineering<\/li>\n<\/ul>\n<p>and lo and behold &#8211; even STUXNET is mentioned!<\/p>\n<p>Thumbs up South Korea!!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The way the movies portray hacking, forensics, security research and coding is obviously metaphoric and usually made as visually rich as possible to ensure the audience &#8216;gets it&#8217; and as a bonus can see how cool the process is. Anyone &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/05\/18\/the-hades-haz-you-phantom-%ec%9c%a0%eb%a0%b9-the-dfir-drama-from-south-korea\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[31],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/1895"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=1895"}],"version-history":[{"count":17,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/1895\/revisions"}],"predecessor-version":[{"id":1913,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/1895\/revisions\/1913"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=1895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=1895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=1895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}