Back to Talks 2025
Talk

From Dare to Discovery: How OSINT and Modern Recon Techniques Uncovered a Global VPN Infrastructure

Recon Village @ DEF CON 338th, 9th and 10th August 2025

Abstract

What started as a weekend gaming session and a friendly dare evolved into discovering critical vulnerabilities affecting OpenVPN endpoints on a global scale.

This talk demonstrates a comprehensive reconnaissance methodology that combines traditional OSINT techniques with modern cloud-based intelligence gathering to map and exploit critical infrastructure at scale.

The presentation follows a complete attack chain that showcases advanced reconnaissance techniques:

Phase 1: Intelligence Discovery & Infrastructure Mapping

1. VirusTotal RetroHunt OSINT: Writing custom YARA signatures to discover 50+ vulnerable drivers across the internet, demonstrating how one vulnerability discovery can reveal widespread systemic issues

2. Supply Chain Intelligence: OSINT techniques to identify that OpenVPN (the world's most popular open-source VPN) was the common denominator, affecting thousands of companies and numerous endpoints

3. Target Profiling: Understanding OpenVPN's multi-process architecture, plugin mechanisms, and Windows internals through open-source research

Phase 2: Remote Reconnaissance & Credential Harvesting

1. Network Enumeration: SMB enumeration, null session exploitation, and remote named pipe discovery

2. Credential Intelligence: Capturing NTLMv2 hashes through network reconnaissance and social engineering techniques

3. Cloud-Powered Cracking: Leveraging cloud GPU infrastructure (VAST.AI + Hashcat) to crack enterprise credentials at scale, demonstrating how modern attackers use accessible cloud resources

Phase 3: Remote-to-Local Attack Chain

1. Remote Code Execution: Using UNC paths and OpenVPN's plugin mechanism to execute code remotely

2. Local Privilege Escalation: "Open Potato" attack - exploiting named pipe hijacking and Windows impersonation for LPE

3. Security Product Bypass: Bring Your Own Vulnerable Driver (BYOVD) techniques to achieve kernel code execution and bypass security solutions

Reconnaissance Applications:

The methodologies demonstrated can be repurposed for legitimate security activities:

1. Red Team Operations: Comprehensive target profiling and credential harvesting techniques

2. Bug Bounty Research: Systematic vulnerability discovery across software ecosystems

3. Threat Intelligence: Understanding how threat actors chain reconnaissance techniques

4. Infrastructure Assessment: Mapping organizational VPN deployments and security postures

The talk includes live demonstrations of:

- Custom YARA signature development for vulnerability hunting

- Cloud-based credential cracking workflows

- Remote service enumeration and exploitation

- Building comprehensive target profiles through passive reconnaissance

- Security product evasion techniques applicable to red team scenarios

Attendees will learn practical reconnaissance methodologies that can be immediately applied to their own security research, with emphasis on the intelligence gathering processes that enable sophisticated attack chains.

Speaker

Vladimir Tokarev
Vladimir Tokarev

Senior Security Researcher @ Microsoft

Vladimir Tokarev is a seasoned senior security researcher, specializing in IoT/OT, Windows, and Linux vulnerabilities research. With extensive experience in cybersecurity, Vladimir has demonstrated a keen ability to identify and address critical security issues in various systems. In 2023, Vladimir presented his research titled "CoDe16: 16 Zero-Day Vulnerabilities Affecting CODESYS Framework, Leading to Remote Code Execution on Millions of Industrial Devices Across Industries" at Black Hat. This comprehensive study focused on vulnerabilities within the widely used CODESYS framework, revealing potential risks to industrial devices across different sectors. Vladimir's meticulous analysis uncovered a total of 31 new vulnerabilities, highlighting the importance of proactive security measures in OT environments. In addition to his research on CODESYS, Vladimir has contributed to enhancing security in other critical systems. He discovered two new vulnerabilities in the Windows Driver of Foxboro DCS Control Core Services and one new vulnerability in SFPMONITOR.SYS, a component used by SonicWall products. Furthermore, Vladimir has identified vulnerabilities in TP-Link products. twitter: @G1ND1L4

View full speaker profile →