Bluetooth Keyboards: Who Owns Your Keystrokes?

Slides:



Advertisements
Similar presentations
Introduction to Bluetooth®
Advertisements

System Security Scanning and Discovery Chapter 14.
Mohamed Mokdad Ecole d’Ingénieurs de Bienne
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 10:
MIS Week 11 Site:
RFID Review / Bluetooth ENGR 475 – Telecommunications Harding University December 5, 2006 Jonathan White.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Hacking the Bluetooth Pairing Authentication Process Graduate Operating System Mini Project Siyuan Jiang and Haipeng Cai.
Graduate Operating Systems Mini-Project: Hacking Bluetooth In Linux Alan Joseph J Caceres.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Multimedia & Communications ATMEL Bluetooth Background information on Bluetooth technology ATMEL implementation of Bluetooth spec.
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
Late September…ToorCon X Bluetooth Device Discovery Bruce Potter Bob Fleck.
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
DIUF, Seminar in Telecommunications, M. Hayoz The Bluetooth TM wireless technology A brief overview.
Bluetooth Presented by Venkateshwar R Gotur CMPT
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wii mote interfacing. The product It is a wireless device, using standard Bluetooth technology to communicate The Wii Remote uses the standard Bluetooth.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Bluetooth on CE. Mid - Presentation Roman Zoltsman & Oren Haggai Group /2001 Instructor: Nir Borenshtein HSDSL Lab. Technion.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
WiFi networks & RAW SOCKETS IL-HACK2009 Eddie Harari.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
Intro to Raspberry Pi A Southwest Florida Hackerspace Workshop Presented by: Russell Benzing & Eric Schiffli.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
KyungPook National University CSOS Hye Youn Kang.
Bluetooth To RS-232 –One To One MACHINE PC One to one - plug and play, do not modify program Bluetooth -masterBluetooth -slave.
BTSTACK RTLAB YuJin Park. Bluetooth Protocol Stack Protocol Stack Applications TCS Binary RFCOMM Service Discovery Protocol (SDP) Logical Link Control.
SCADA NETWORK SECURITY BY LICET 4-AUG-12.
After Construction Name: Per #:.
OPERATING SYSTEM.
Agenda BLE in IoT devices Bluetooth Low Energy Protocol Stack
Penetration Testing: Concepts,Attacks and Defence Stratagies
Instructor Materials Chapter 2: Configure a Network Operating System
Chapter 2: Configure a Network Operating System
Bluetooth Low Energy Overview.
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Wireless Network Security
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
Evaluating Existing Systems
Outline What does the OS protect? Authentication for operating systems
Advanced Penetration testing
Evaluating Existing Systems
Chapter 5: Switch Configuration
Exam Review.
Wireless Hacking.
Outline What does the OS protect? Authentication for operating systems
Introduction to Computers
Building an All-Channel Bluetooth Monitor
Advanced Penetration testing
Chapter 2: Configure a Network Operating System
“I don’t have to be careful, I’ve got a gun.”
Advanced Penetration testing
Bluetooth Profiles.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
PREPARED BY: RIDDHI PATEL (09CE085)
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
4/26/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure Ranging] Date Submitted: [19 September.
The bios.
Engineering Secure Software
Advanced Penetration testing
Presentation transcript:

Bluetooth Keyboards: Who Owns Your Keystrokes? Michael Ossmann ShmooCon 2010

I work for the government, but this presentation is based on my own work. Don't blame the government for any of this.

Certain commercial equipment, materials, and software are sometimes identified to specify technical aspects of the reported procedures and results. In no case does such identification imply recommendations or endorsement by the U.S. Government, its departments, or its agencies; nor does it imply that the equipment, materials, and software identified are the best available for this purpose.

Scope Bluetooth HID profile Mostly keyboards 2003 Bluetooth 1.2 Newer standards unused in keyboards I tested General vulnerabilities

Crypto-Gram-0302 Article about importance of authentication

“you probably don't want to use Bluetooth for that”

Anatomy Power switch Connect button LCD or LED Dongle with connect button Printed BD_ADDR

The connect button initiates a “virtual cable” between the dongle and keyboard Virtual cable != pairing

The HID Profile USB/HID over Bluetooth Encryption “support” required for keyboards Not required for mice Not required for hosts

HID operates over HCI between host (PC) and dongle. HID operates over the baseband (air) interface between dongle and device (keyboard)

Gr-bluetooth for baseband GNU Radio USRP/USRP2 USB dongles for HCI BlueZ tools I've tried to focus on assessment methods that can be done by good guys with dongles, but we should assume an attacker has a USRP or even better equipment

Boot protocol vs. report protocol Both from USB HID spec Boot protocol used by BIOS

Bluetooth HID boot mode Boot protocol used Optional USB HID emulation hid2hci Sometimes cleartext operation

Spectrogram of waveform captured with gr-bluetooth

Wireshark bluetooth baseband (btbb) plugin Included with gr-bluetooth Dissects baseband (air) interface

Btaptap Joshua Wright Included with gr-bluetooth Pulls keystrokes from pcap files (either baseband or HCI)

Beware boot mode Avoid it completely if you can Test it if you can't

Connect to device

Connect to host

HID Attack By Collin Mulliner xkbd-bthid hidattack BIOS vs. OS Stuff keystrokes over mouse connection Encryption optional

No link key, no service Test your devices to ensure authentication is required

How to get BD_ADDR

Kismet-BTSCAN By Mike Kershaw Included with Kismet Active scanning Finds discoverable devices (inquiry)

Kismet-Bluetooth Included with gr-bluetooth Passive monitor Requires USRP

How to get link key

Bthidproxy Man in the middle Plain dongles Sniff without a USRP Can add injection

Got encryption? Test your devices to ensure they initiate encryption

Apple keyboard firmware attack By K. Chen Black Hat USA 2009

Extra PSMs (Protocol Service Multiplexers) on Apple Wireless Keyboard One is used for firmware updates

Firmware update sequence

Modified firmware Proof of concept hack: changed the “Service Provider”

Pairing attacks Wool & Shaked Cracked PIN and link key 4-digit PIN cracked in 63 ms on Pentium IV

BTCrack By Thierry Zoller btpincrack By David Hulton Require: Master BD_ADDR Slave BD_ADDR Other parameters exchanged during pairing Assume master initiates pairing Assume slave has variable PIN

Exceptions Slave initiates pairing Swap order of arguments Responder has fixed PIN Slave BD_ADDR not observed Shaked & Wool assume it can be observed by forcing re-connection, but this is not always true Observe LAP Discover UAP Determine NAP Educated guess with BNAP BNAP Active role switch attack Try all NAPs

My favorite bug (BTCrack) PIN: 0000 If nobody else found this bug it is probably because people aren't cracking PINs

Only pair in Faraday cage

“a clear value-added security benefit to Bluetooth keyboards over existing wireless keyboards” - Bluetooth HID Profile I believe this is true, but it isn't saying much.

Future: Baseband injection Bluetooth Low Energy

Big thanks: Joshua Wright Dominic Spill Mike Kershaw K. Chen

Slides, links, code: http://ossmann.com/shmoo-2010

Bluetooth Keyboards: Who Owns Your Keystrokes?