Difference between revisions of "DyKnow"

From the Linux and Unix Users Group at Virginia Teck Wiki
Jump to: navigation, search
imported>Mutantmonkey
imported>Mhazinsk
Line 19: Line 19:
  
 
If it is preferable for the traffic to remain unencrypted for some time, using [[socat]] as a [[Socat#Cleartext_to_SSL_Tunnel_for_DyKnow|plaintext-to-SSL proxy]] allows the final end of the connection to be encrypted but the initial segment to remain unencrypted.
 
If it is preferable for the traffic to remain unencrypted for some time, using [[socat]] as a [[Socat#Cleartext_to_SSL_Tunnel_for_DyKnow|plaintext-to-SSL proxy]] allows the final end of the connection to be encrypted but the initial segment to remain unencrypted.
 +
 +
DyKnow 5.7 installed a hardcoded root certificate on student computers, allowing traffic to be intercepted in attacks similar to the Superfish vulnerability. SWAT has provided a [remediation tool https://swat.eng.vt.edu/expanded-information-regarding-dyknow-57-vulnerability] to remove the certificate and proxy features of DyKnow.
  
 
==File Format==
 
==File Format==

Revision as of 01:48, 30 December 2017

DyKnow Vision is proprietary classroom software made by Dynamic Knowledge Transfer, LLC and used by the College of Engineering at Virginia Tech. It is mostly written in C# but has many native components and cannot be run with Mono. Attempts to run it under Wine have been unsuccessful. Both DyKnow Vision and DyKnow Monitor are known to contain malware-style features allowing for remote screen capture and forced full-screen.

Malware Features

DyKnow Monitor, which comes bundled in some versions of DyKnow Vision, includes malware-style features such as application and URL blocking, remote opening and closing of programs and displays of student screens.[1] DyKnow Monitor can be prevented from installing by editing the MSI to set a DONT_INSTALL_MONITOR flag. In the current version of DyKnow provided by Virginia Tech, the DONT_INSTALL_MONITOR flag is set by default. However, DyKnow Vision retains many malware features, such as forced full-screen mode and remote screen-capture.

Occasionally, professors have enabled the malware features of DyKnow Vision in class, forcing full-screen mode and spying on students through the remote screen-capture functionality. In earlier versions of DyKnow, certain key combinations could easily break this forced full-screen mode. More specific information regarding this would be informative.

Unless students give consent to have their privacy invaded by merely showing up to class and running required software, the malware functionality breaks the Virginia Tech Acceptable Use Policy, but to date, this hasn't seem to have garnered any attention.

Running the Proprietary Software

Virtual Machines

DyKnow runs fine in virtualized environments such as VirtualBox. Using a virtual machine is a nice way to soften the effects of its malware capabilities.

Making the Installer Skip Dependencies

The web-based dependency installer is broken under wine, but if you trick it into skipping dependencies, you can at least get DyKnow Vision installed. To do so, you'll need to run the DyKnow installer with Wine then delete the dependency entries from a temporary folder in c:\windows.

Security

In the spring of 2009, the IT Security Office and DyKnow were alerted that the login process was unsafe. Passwords are sent by DyKnow over the wire as an MD5 hash with a static salt and symmetrically encrypted with AES. While the salted MD5 hash is invulnerable to standard precomputation attacks, the symmetric encryption was performed with key information shared between all clients, allowing for simple decryption if the traffic can be intercepted. Within a month of notification, the issue was worked around at Virginia Tech. Users were instructed to enable SSL for transactions and unencrypted access to the server was shut off. No response from DyKnow on this issue is known of.

If it is preferable for the traffic to remain unencrypted for some time, using socat as a plaintext-to-SSL proxy allows the final end of the connection to be encrypted but the initial segment to remain unencrypted.

DyKnow 5.7 installed a hardcoded root certificate on student computers, allowing traffic to be intercepted in attacks similar to the Superfish vulnerability. SWAT has provided a [remediation tool https://swat.eng.vt.edu/expanded-information-regarding-dyknow-57-vulnerability] to remove the certificate and proxy features of DyKnow.

File Format

The .dyz file format is a gzipped XML file. After decompressing the file, it can easily be parsed using any standard XML library; pen strokes are stored as base64-encoded binary strings that are provided by the Microsoft Ink library. The DyKnow format also has support for storing complete file history, including erased, resized, and moved pen strokes as well as other deleted or changed elements.[2]

Patents

DyKnow has been granted three software patents.

References

External Links