practical hardware attacks against soho routers & the internet of things

42

Click here to load reader

Upload: chase-schultz

Post on 17-Jan-2017

1.163 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Practical hardware attacks against SOHO Routers & the Internet of Things

P r a c t i c a l H a r d w a r e A t t a c k s a g a i n s t S O H O R o u t e r s a n d I o T

Chase Schultz, Senior Security Consultant [email protected]

@f47h3r_b0

Page 2: Practical hardware attacks against SOHO Routers & the Internet of Things

About ISE

Analysts• White boxPerspective

• Hackers; Cryptographers; RE

Research• Routers; NAS; HealthcareCustomers• Companies with high value assets

Exploits• iPhone; Android; Ford; Exxon; Diebold

Page 3: Practical hardware attacks against SOHO Routers & the Internet of Things

whoami• Chase Schultz• Senior Security Consultant • Independent Security Evaluators• Twitter – @f47h3r_b0• Interests:

– Reverse Engineering, Hardware, SDR, Fuzzing, Embedded Systems, Python & Go

Page 4: Practical hardware attacks against SOHO Routers & the Internet of Things

Agenda① Importance of Hardware Hacking & IoT Research② Scope of Talk③ Hardware Hacking Background④ Tools of the Trade⑤ Methodology⑥ Examples⑦ Photo Journal⑧ Demo!!⑨ Resources / Further Reading⑩ Thanks!

Page 5: Practical hardware attacks against SOHO Routers & the Internet of Things

Why is this important?

Page 6: Practical hardware attacks against SOHO Routers & the Internet of Things

A Journey of Pwnage

• Started getting interested in Hardware Hacking & IoT

• Software guy goes to school …

• Great way to get access and leverage for further research.

Page 7: Practical hardware attacks against SOHO Routers & the Internet of Things

IoT?• IoT is a buzzword (duh) …

– Lots of embedded devices doing all the things …

– Smart Homes– Medical Devices / Entertainment /

Health Fitness / Toys / Sensors etc

Page 8: Practical hardware attacks against SOHO Routers & the Internet of Things

Hardware Hacking• Interfaces

– UART (Universal Asynchronous Receive & Transmit)

– JTAG (Joint Test Action Group) – HW Debug

– SPI (Serial Peripheral Interface) – I2C (Inter-Integrated Circuit)

Page 9: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 10: Practical hardware attacks against SOHO Routers & the Internet of Things

Tools of the Trade

Page 11: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 12: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 13: Practical hardware attacks against SOHO Routers & the Internet of Things

http://int3.cc/products/the-shikra

Page 14: Practical hardware attacks against SOHO Routers & the Internet of Things

http://www.grandideastudio.com/portfolio/jtagulator/

Page 15: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 16: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 17: Practical hardware attacks against SOHO Routers & the Internet of Things

https://www.saleae.com/

Page 18: Practical hardware attacks against SOHO Routers & the Internet of Things

Hardware Attacks (Methodology)0) Open the device, void your warranty, and join the exploitation party.1) Identify Device, hardware revisions, document hardware

components2) Research chip datasheets - figure out features3) Identify hardware communication interfaces possibilities4) Continuity Testing and Electrical Pinout Reversing5) Identifying wireline protocol logic (How the hell do I talk to these

chips?)6) Hardware tools for accessing interfaces7) Wiring up to to the board8) Device Interrogation9) Firmware Reverse Engineering10) Vulnerability Research / Exploitation

Page 19: Practical hardware attacks against SOHO Routers & the Internet of Things

Void Some Warranties

Page 20: Practical hardware attacks against SOHO Routers & the Internet of Things

RTFM• Datasheets are your friend!

Page 21: Practical hardware attacks against SOHO Routers & the Internet of Things

Identifying HW Interfaces

Page 22: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 23: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 24: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 25: Practical hardware attacks against SOHO Routers & the Internet of Things

Pinout Reversing

Page 26: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 27: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 28: Practical hardware attacks against SOHO Routers & the Internet of Things

Saleae Logic Analyzer

Page 29: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 30: Practical hardware attacks against SOHO Routers & the Internet of Things

UART to Root Shells

Page 31: Practical hardware attacks against SOHO Routers & the Internet of Things

• VCC Pin – Steady Voltage (Also chirps)

• GND Pin – Metal Piece & Pin• Tx Pin – Fluctuation upon boot

• Baudrate

Page 32: Practical hardware attacks against SOHO Routers & the Internet of Things
Page 33: Practical hardware attacks against SOHO Routers & the Internet of Things

Accessing Shikra via Screenscreen /dev/cu.usbserial-145 115200

^ ^^

cmd device namebaudrate

ISE Confidential - not for distribution

Page 34: Practical hardware attacks against SOHO Routers & the Internet of Things

ISE Confidential - not for distribution

Page 35: Practical hardware attacks against SOHO Routers & the Internet of Things

ISE Confidential - not for distribution

Page 36: Practical hardware attacks against SOHO Routers & the Internet of Things

Demo!• In process of Responsible Disclosure.• Details to be published in the future.

Page 37: Practical hardware attacks against SOHO Routers & the Internet of Things

• JTAG – Joint Test Action Group– Finding TDI (Test Data In), TDO (Test

Data Out), TCK (Test Clock), TMS (Test Mode Select), TRST (Test Reset) optional.

– Hardware Debugging via OpenOCD / GDB

– Jtagulator is awesome for brute-forcing pinout

ISE Confidential - not for distribution

Page 38: Practical hardware attacks against SOHO Routers & the Internet of Things

Dumping Flash w/ Flashrom

Page 39: Practical hardware attacks against SOHO Routers & the Internet of Things

Resources to Learn• Trainings:

– SexViaHex.com – Software Exploitation Via Hardware Exploitation - Xipiter

– Hands on Hardware Hacking – Joe Grand

• Blogs– http://www.devttys0.com/ – https://

dontstuffbeansupyournose.com

Page 40: Practical hardware attacks against SOHO Routers & the Internet of Things

Your Turn!• Enable yourself as a security

researcher.

• Initial access for further research.

• You can do it too! Its fun!

ISE Confidential - not for distribution

Page 41: Practical hardware attacks against SOHO Routers & the Internet of Things

Thank You!• Derbycon Staff / Research / You!• Contact ISE --

https://securityevaluators.com/

https://github.com/f47h3r/firmware_collection

@f47h3r_b0

Page 42: Practical hardware attacks against SOHO Routers & the Internet of Things

Get Involved