Here is the simplified steps needed to hack users of Whonix KVM outside of LAN:
-
Download and setup masscan
-
Scan the internet for ports 5901 and 5902. 5901 is usually Gateway and 5902 is Workstation
-
Install virt-viewer
package (available in all distros)
-
You are now connected to them and can see their screen, control their mouse and keyboard and execute arbitrary commands
(Connecting to a spice server or session does not cancel other sessions, meaning the user is completely unaware someone connected and is watching them)
Additionally spice by default does not require authentication
As for de-anonymization, you already know their real IP from port scan and can tie it to Whonix
Here is the simplified steps needed to hack users of Whonix KVM inside of LAN:
- Download and install
nmap
(available in all distros)
- Port scan as previously mentioned
- virt-viewer, connect, tada!
To de-anonymoize you can use your own IP since it’s also their IP behind NAT. Incase of IPV6, you can still fetch their IP from inside NAT
Linux does not come with a firewall enabled by default (all major distros)
Spice is enabled by default in Whonix KVM XML configuration files
Now that I talked about how regular people can hack Whonix, let’s talk about the Government, ISPs and routers:
Goverments and ISPs can hack users this way, even if they have NAT + Firewall enabled! it is very easy actually
TR069 is “tech support” protocol built-in all routers and usually cannot be disabled at all. It is a backdoor.
Now that goverment can access the LAN, the Linux host is no longer protected by router NAT and firewall, they can do above steps to connect, spy, and de-anonymize
All of this can be solved by either disabling spice, or better yet, requiring a firewall setup step in the Wiki for Whonix KVM