Hardware Attack Vectors Yashin Mehaboobe Security Researcher.

Slides:



Advertisements
Similar presentations
INDIVIDUAL PROJECT BY R.KARTHIKMANOJ
Advertisements

HARP-B HARP Software Demo July CAN Node Emulator Using the Vector CAN-Tech CANalyzer Raj Atwal CAN Node Emulator.
Transmitting & Receiving Contents  Hardware for Transmitting & Receiving:By Ryan Caulfield  Software for Transmitting & Receiving: By Todd John  Non-Computer.
Dr Silvio Cesare Qualys. Introduction  Lots of electronic systems  Converging with computing  IT security techniques can be used.
IR Control Materials taken from a variety of sources including IR Remote for the Boe-Bot by Andy Lindsay.
LOGSYS Development Environment of Embedded Systems Tamás Raikovich Béla Fehér Péter Laczkó Budapest University of Technology and Economics Department of.
CSCI 1412 Tutorial 1 Introduction to Hardware, Software Parminder Kang Home:
Car Hacking Patrick, James, Penny.
OutLine Overview about Project Wii Robot Escaper Robot Problems and Solutions Demo.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Design and Implementation of a Virtual Reality Glove Device Final presentation – winter 2001/2 By:Amos Mosseri, Shy Shalom, Instructors:Michael.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
SM3121 Software Technology Mark Green School of Creative Media.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Computer Networks IGCSE ICT Section 4.
Computer Networking Devices Seven Different Networking Components.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Wireless Networking 102.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Oppenheimer Technologies Rick King Jonathan Creekmore.
Little arduino microcontrollers Meghan Jimenez 12 February 2014.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
© Oxford University Press 2011 Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
1 Chapter Overview Wireless Technologies Wireless Security.
Using the PSoC USB March 17, 2012 Lloyd Moore, President/Owner.
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
RC CAR CONTROLLER BASED ON INTEL GALILEO SOC PLATFORM Nadav Shiloach Sagi Sabag Supervisor: Idan Shmuel Spring 2014 One Semester Project PROJECT’S ENDING.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
CIS 103 — Applied Computer Technology Last Edited: September 17, 2010 by C.Herbert Wireless Home Networks.
The ZigBee Development Enviroment Date: 2009/11/24 Speaker: Junn-Keh Yeh Advisor: Quincy Wu.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Speaker Control SYSTEM
The standards and protocols used in communication By William Kemp.
 The TenCup Entertainment Table is an interactive table that enhances the game-play experience of Beirut for both the player and the spectator.
Components of wireless LAN & Its connection to the Internet
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.
@packetjay Fun and games until someone uses IPv6 or TCP.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Lecture 7: Overview Microprocessors / microcontrollers.
21 st november  Iphone – texting-internet-apps- when texting it sends wirelessly to the reciver  Laptop-downloading-internet- it travels using.
THE INTERNET WHAT IS IT? WHERE IS IT? HOW DOES IT WORK? TIGER WU / KEVIN PARKS.
Activity 1 5 minutes to discuss and feedback on the following:
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
 ACCELEROMETER  TRANSMITTER- BLOCK DIAGRAM  RECEIVER- BLOCK DIAGRAM  COMPONENTS DESCRIPTION- ENCODER TRANSMITTER RECEIVER OPTICAL SENSOR.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
PROJECT OVERVIEW GSM SECTION BLUE TOOTH SECTION SOFTWARE DEVELOPMENT CIRCUIT DEVELOPMENT LESSONS LEARNED AND CHALLENGES FACED.
TV Remote As A Wireless Mouse For PC.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Common System Exploits Tom Chothia Computer Security, Lecture 17.
USING TV REMOTE AS A CORDLESS MOUSE FOR THE COMPUTER
CORDLESS MOUSE FEATURES BY TV REMOTE USING PIC MICROCONTROLLER
Firmware threat Dhaval Chauhan MIS 534.
Wireless Technologies
Project Title ARDUINO BASED WIRELESS ELECTRICAL APPARATUS CONTROL SYSTEM USING IR COMMUNICATION Under the Guidance of Submitted by.
How To Set Up A Wireless Network
RAILWAY TRACK SNAP NOTIFICATION
ETS Inside Product Launch
Advanced Penetration testing
Manual Robotics ..
Presentation transcript:

Hardware Attack Vectors Yashin Mehaboobe Security Researcher

#whoami Security Researcher, Open Security Interested in : Embedded system security Radio/ RTL-SDR research Malware Analysis My little projects (Arcanum, PyTriage) Organizer, Defcon Kerala ( Mar 4. Be there! ) Python aficionado Open source contributor.

Why Hardware? More interesting Less well known = easier to exploit More rewarding Usually open entry point into an otherwise secure network It’s awesome!

Keys to the kingdom?

Usual suspects Wireless LAN Web Applications Client Side exploits Remote exploits Hardware attacks

What is covered: The attack of the HID Simulating physical access for fun and profit. IR vector Let TVs be bygones. Radio Radio!= FM or Radio!= WiFi Bus attacks: Unprotected = Easy to pwn (mostly)

HIDe it A little bit of physical access is a dangerous thing. Usually physical access = pwning Software can’t protect hardware HID attacks simulate an automated keyboard and mouse =  Attacker gets to run code as if he is physically there.

The Rise of the Rubber Ducky USB Rubber Ducky by the Hak5 team. Comes with an automated script creator. Looks like a normal USB drive. Runs the payload burned into the memory when connected.

Teensy Arduino clone by PJRC Can emulate an HID device Existing tools like kautilya and SET to generate payloads. Again, multiplatform mayhem

DEMO

I R TV, Pedestrian lights, Old smartphones Uses one of four: Philips Sony NEC RAW IR Library already available for Arduino

Tools of the Trade: Arduino or a similar microcontroller TSOP382 IR receiver IR LED Little bit of mischief

IR Attack 1 : Replay Receive the code using TSOP382 Check the code type Transmit accordingly whenever the button is pressed

TV-B-Gone Most TVs have predefined poweroff sequence Widely available Create a script that goes through the popular off codes one by one No more pesky TVs

DEMO

Tangoing with Radio SDR=Software Defined Radio Usually pretty expensive. Until the rise of RTL- SDR Scope=AIS,GSM, ADS-B, GPS you name it.

RTL-SDR or cheap radio sniffer Mainly two types: E4000: Mhz R820T: Mhz Software used: GQRX rtl_sdr SDRSharp Log most data broadcast within the frequency ranges

Sniffing Radio Traffic AIS (ship transmissions) are easily picked up So is Aircraft broadcasts You can sniff most protocols off the air Decode using baudline Possible attacks against : Home automation systems and car keyfobs Keyfobs are supposed to use rolling key codes “Supposed to”

Antennas ● Dependent on the frequency that you want to capture. ● Different types for different purposes: ● Monopole: ACARS,ADS-B, AIS (Airplanes/Ships) ● Rubber Ducky Antennaes for short range ● Discone for wide coverage (More noise)

DisconeMonopole Rubber Ducky

DEMO TIME!

Bus Attacks

The Magic Electronic Buses ● Buses are used by components in an embedded system to communicate with each other ● Not secured ● Most commonly used protocols are SPI,I2C and UART ● No authentication ● I2C utilizes addressing

Attacking bus protocols ● Sniffing: ● Logic analyzers pick up most of the protocols ● Bus pirate is your friend ● Replay: ● Sniffed sequences can be played back at later times ● Bus pirate is your best friend ● Debug ports: ● UART/JTAG ports are left open for debugging purposes ● Can be used to dump firmware and mess with the memory

Here there be Pirates ● Hardware hacker's multitool ● Read/write I2C,SPI,UART ● Midlevel JTAG support ● AVR programmer too! ● Can be accessed via USB.

DEMO

Thank you! Questions?

Contact Details Twitter:twitter.com/yashin.mehaboobe yashinm92 gmail.com