SlideShare ist ein Scribd-Unternehmen logo
1 von 87
Downloaden Sie, um offline zu lesen
Alexey	
  @Gi*sUngiven	
  Osipov	
  
Alexander	
  @arbitrarycode	
  Zaitsev	
  
Who we are?
•  Full	
  <me	
  funemployed	
  security	
  researchers	
  
•  Independent	
  consultants	
  TM©®	
  
ROUTINE	
  FUN	
  PART	
  
Yes it’s true
•  20	
  mW	
  UMTS	
  Access	
  Point	
  
•  Permanently	
  sold	
  on	
  Taobao	
  
•  Branded	
  versions	
  appear	
  on	
  Ebay	
  
Unboxing
Unboxing
Unboxing
Unboxing
What’s inside?
•  Radio	
  board	
  
What’s inside?
•  Main	
  board	
  
What’s inside?
•  Main	
  board	
  
Finding #1
+	
  
Finding #1: UART
==	
  
Finding #1: UART
==	
   ==	
  
Finding #1: UART
Key	
  
pressed?	
  
Power	
  up	
  
Boot	
  to	
  main	
  
SW	
  
VxWorks	
  
“shell”	
  
Yes	
  No	
  
Blue	
  pill	
  mode	
   Red	
  pill	
  mode	
  
Blue pill mode
•  Unpacks	
  main	
  so*ware	
  
•  Ends	
  up	
  in	
  “normal”	
  mode	
  
Nmap	
  scan	
  report	
  for	
  172.16.1.1	
  
Host	
  is	
  up	
  (0.0018s	
  latency).	
  
PORT	
  	
  	
  	
  	
  	
  STATE	
  SERVICE	
  
443/tcp	
  open	
  	
  hdps	
  
Red pill mode
•  VxWorks	
  shell	
  
•  Debug	
  
•  C	
  interpreter	
  
•  Flash	
  file	
  system	
  access	
  
•  Basic	
  networking	
  support	
  
Red pill mode: Debug
•  Full	
  blown	
  debugger	
  
•  Breakpoints	
  
•  Step/step	
  over/cret	
  
•  Stack	
  trace	
  
•  Disasm	
  
Red pill mode: Debug
•  Other	
  interes<ng	
  commands	
  
•  Task	
  management	
  
•  Memory	
  dump	
  
•  Memory	
  edit	
  
•  Registers	
  manipula<on	
  
•  File-­‐to-­‐memory	
  dump	
  
•  Even	
  symbols	
  are	
  here	
  
Red pill mode: C interpreter
	
  
serv_addr	
  =	
  malloc(0x10)	
  
bzero(serv_addr,	
  0x10)	
  
	
  
m	
  serv_addr,	
  1	
  
0x00	
  
0x02	
  
0x00	
  
0x51	
  
0xac	
  
0x10	
  
0x01	
  
0xf0	
  
.	
  	
  
	
  
sockfd	
  =	
  socket(2,	
  1,	
  0)	
  
connect(sockfd,	
  serv_addr,	
  0x10)	
  
buffer	
  =	
  "Hello	
  BHUSA"	
  
write(sockfd,buffer,strlen(buffer))	
  
Results	
  in	
  …	
  
 
DEMO	
  
Red pill mode: C interpreter
Red pill mode: FFS access
Red pill mode: Networking
•  Rou<ng	
  configura<on	
  
•  rlogin	
  and	
  *p	
  clients	
  
	
  
	
  
Example:	
  
-­‐>	
  hostAdd	
  "tyrell_corp",	
  "1.3.3.7"	
  
-­‐>	
  netDevCreate	
  "tyrell_corp:",	
  "tyrell_corp",	
  1	
  
-­‐>	
  iam	
  "JFSebas<an",	
  "M0r3_Hum4n_7h4n_hum4n"	
  
-­‐>	
  copy	
  <evil_files:/usr/nexus5/src/life_es<mate.c	
  
Red pill mode: Let’s go!
•  What’s	
  running?	
  
Pew!	
  
Pew!	
  
Pew!	
  
Exit	
  to	
  Blue	
  Pill	
  mode	
  
Red pill mode: Oh really?
•  They	
  are	
  actually	
  running	
  
•  [pre]Red	
  pill	
  mode	
  only	
  	
  
•  A*er	
  we	
  issue	
  tr	
  "Boot2App”	
  command	
  or	
  reboot	
  to	
  blue	
  pill	
  all	
  is	
  lost	
  
Nmap	
  scan	
  report	
  for	
  172.16.1.1	
  
Host	
  is	
  up	
  (0.0048s	
  latency).	
  
PORT	
  	
  	
  	
  	
  	
  STATE	
  SERVICE	
  
21/tcp	
  open	
  	
  *p	
  
23/tcp	
  open	
  	
  telnet	
  
17185/udp	
  open	
  	
  wdbrpc	
  
Red pill mode: Another way in?
•  Do	
  we	
  actually	
  need	
  to	
  mess	
  with	
  UART	
  every	
  <me?	
  
•  In	
  fact	
  ports	
  are	
  open	
  before	
  jumping	
  to	
  Blue	
  Pill	
  mode	
  
	
  
-­‐>	
  
Red pill mode: Hunting the memories
•  Need	
  to	
  find	
  Blue	
  Pill	
  mode	
  code	
  
•  Break	
  a*er	
  image	
  unpacks	
  
•  Dump	
  it	
  with	
  “d”	
  -­‐	
  command	
  
	
  
-­‐	
  Not	
  really	
  convenient	
  
-­‐	
  Quite	
  slow	
  
Red pill mode: Hunting the memories
•  Need	
  to	
  find	
  Blue	
  Pill	
  mode	
  code	
  
•  Break	
  a*er	
  image	
  unpacks	
  
•  Dump	
  it	
  with	
  wdbrpc	
  
	
  
-­‐  Binary	
  output	
  
-­‐  Really	
  fast	
  
-­‐  Dumps	
  the	
  right	
  size	
  
-­‐  Debug	
  capabili<es	
  are	
  so	
  close…	
  
IDA Pro. Finally!
•  Addi<onal	
  convenience!	
  
•  Symbol	
  table	
  is	
  in	
  place	
  
•  Some	
  python	
  to	
  show	
  ‘em	
  right	
  
Base64(AES(fvZAIeaqIRSkdKeDhOyc/Fit4ltVB81bN7vPpnvsCcZjrIMu0wtKdvYzgAMAyvAu9DdtFu/A5YaWxRAaP0pLhg==),	
  key)	
  
Take a Red Pill after Blue
•  We	
  want	
  to	
  execute	
  our	
  code	
  in	
  Blue	
  Pill	
  mode	
  
•  There	
  are	
  at	
  least	
  two	
  ways:	
  
•  Download,	
  extract,	
  patch,	
  pack	
  and	
  upload	
  Blue	
  Pill	
  image	
  –	
  long	
  and	
  boring	
  
•  Patch	
  Blue	
  Pill	
  from	
  the	
  Red	
  Pill	
  in	
  run<me	
  –	
  quick	
  fun	
  and	
  dirty	
  
•  Obviously,	
  we’ve	
  chosen	
  the	
  fun	
  one!	
  
Take a Red Pill after Blue: the fun way
•  “Loader”	
  –	
  small	
  asm	
  snippet	
  
•  Wriden	
  upon	
  some	
  func<on	
  that	
  is	
  called	
  in	
  Blue	
  Pill	
  	
  mode	
  (we	
  chose	
  web	
  log	
  in)	
  
•  Opens	
  socket	
  and	
  connects	
  back	
  
•  Receives	
  compiled	
  C-­‐code	
  
•  Allocates	
  memory	
  
•  Copies	
  the	
  code	
  
•  Spawns	
  the	
  new	
  task	
  from	
  the	
  code	
  
•  Profit!	
  
Not all femtocells are created equal L
•  Unfortunately	
  _older_	
  firmware	
  versions	
  have	
  some	
  limita<ons	
  
•  No	
  UART	
  
•  No	
  telnet	
  
•  No	
  wdbrpc	
  
•  Is	
  everything	
  lost?	
  
•  No.	
  
Ancient evil has awaken
Ancient evil has awaken
Arduino	
  Due	
  	
  
+	
  	
  
JTAGEnum*	
  	
  
=	
  	
  
Poor	
  man’s	
  JTAG	
  locator	
  
hdps://github.com/cyphunk/JTAGenum	
  
Ancient evil has awaken
RaspberryPi	
  	
  
+	
  
fresh	
  OpenOCD	
  
=	
  
Poor	
  man’s	
  JTAG	
  adapter	
  
	
  
JTAG	
   RPi	
  
TRST	
   7	
  
TDO	
   9	
  
TDI	
   10	
  
TCK	
   11	
  
TMS	
   25	
  
hdps://github.com/synthetos/PiOCD/wiki/Using-­‐a-­‐Raspberry-­‐Pi-­‐as-­‐a-­‐JTAG-­‐Dongle	
  
Ancient evil has awaken
•  So	
  we	
  know	
  that	
  the	
  D6121	
  processor	
  is	
  based	
  on	
  ARM926EJ	
  
•  But	
  then	
  what’s	
  wrong	
  with	
  OpenOCD?	
  
Ancient evil has awaken
•  Actually	
  it’s	
  OK	
  
•  Closer	
  look	
  on	
  the	
  board	
  reveals	
  things…	
  Again.	
  
Jumper	
   IDCODE	
  
no	
  jumper	
   0x46121003	
  
jtagmode0	
   0x0500510d	
  
jtagmode1	
   0x07926477	
   ==	
  ARM926EJ	
  
Ancient evil has awaken
Ancient evil has awaken
But	
  can	
  we	
  make	
  it	
  more	
  convenient?	
  
Would	
  be	
  nice	
  to	
  debug	
  with	
  IDAPro…	
  
Ancient evil has awaken
But	
  can	
  we	
  make	
  it	
  more	
  convenient?	
  
Would	
  be	
  nice	
  to	
  debug	
  with	
  IDAPro…	
  
L
Ancient evil has awaken
Well,	
  Internets	
  are	
  full	
  of	
  things!	
  
hdps://gist.github.com/warewolf/f8a16e46e7d8eb3078c5	
  
Ancient evil has awaken
Let’s	
  try	
  again…	
  
Ancient evil has awaken
Let’s	
  try	
  again…	
  
VxWorks – conclusions made
Digging	
  in	
  telecom	
  devices	
  especially	
  Huawei	
  ;)	
  
We	
  see	
  it	
  everywhere:	
  
•  Femtocells	
  
•  Usb-­‐modems	
  
•  Smartphones	
  
•  ...	
  
You	
  may	
  think	
  it’s	
  not	
  there,	
  but	
  it	
  is.	
  
	
  
We	
  were	
  not	
  alone	
  in	
  digging	
  VxWorks	
  telco:	
  
•  Timur	
  @a66at	
  Yunusov	
  
•  Kirill	
  @k_v_Nesterov	
  Nesterov	
  
	
  see	
  hdps://www.hackinparis.com/sites/hackinparis.com/files/<mur_yusinov_root_via_sms.pdf	
  
DEADLY	
  SERIOUS	
  PART	
  
Femtocell-centric network
SeGW
• Security	
  gateway	
  
• VPN	
  
• Protects	
  all	
  connec<ons	
  over	
  untrusted	
  networks	
  
• IPSEC	
  -­‐	
  Main	
  mode	
  
• EAP-­‐AKA	
  /	
  EAP-­‐SIM	
  
EAP-SIM / EAP-AKA
•  EAP-­‐SIM	
  is	
  based	
  on	
  GSM	
  Authen<ca<on	
  
•  Send	
  RAND	
  
•  Get	
  52-­‐64	
  bits	
  out	
  of	
  Kc	
  
•  Repeat	
  3	
  <mes	
  un<l	
  you	
  get	
  enough	
  key	
  material	
  
•  Encrypt	
  and	
  authen<cate	
  packets	
  based	
  on	
  this	
  key	
  	
  
•  ?????	
  
•  Profit	
  
•  Challenge-­‐response	
  authen<ca<on	
  with	
  secure	
  element.	
  Seems	
  legit.	
  
EAP-SIM
• Based	
  on	
  GSM	
  Authen<cate	
  	
  
• No	
  replay	
  protec<on	
  
VPN termination
• Take	
  SIM	
  card	
  out	
  of	
  femtocell	
  
• Insert	
  into	
  SIM	
  reader	
  
• Create	
  three	
  different	
  pairs	
  of	
  RAND:Kc	
  
• Connect	
  femtocell	
  to	
  yourself	
  any<me,	
  anywhere	
  
• We	
  know	
  what	
  you	
  are	
  thinking.	
  But	
  that	
  would	
  be	
  illegal	
  	
  
SeGW open source
• StrongSwan	
  
• All	
  kinds	
  and	
  flavors	
  of	
  EAP	
  
• EAP-­‐SIM-­‐File	
  
img	
  from	
  hdp://habrahabr.ru/post/250859/	
  
StrongSwan configs
StrongSwan configs
Inside tunnel
• New	
  field	
  for	
  adack	
  
• New	
  IP	
  address	
  inside	
  VPN	
  
•  New	
  open	
  ports	
  
•  New	
  connec<ons	
  from	
  femtocell	
  over	
  “secure”	
  channel	
  
• Different	
  protocols	
  
•  TR-­‐069	
  
•  SCTP,	
  HNBAP,	
  RUA,	
  RANAP,	
  DTAP	
  
	
  
HMS
• Home	
  Node	
  B	
  Management	
  Server	
  
• Protocol:	
  TR-­‐069	
  
• Ini<al	
  HMS	
  
•  Possibly	
  checks	
  authen<ca<on	
  
•  Provides	
  address	
  to	
  serving	
  SeGW	
  
• Serving	
  HMS	
  
•  Checks	
  geo-­‐loca<on	
  
•  Provides	
  configura<on	
  of	
  radio	
  part	
  
•  Enables	
  access	
  to	
  HNBGW	
  
Configuration options
• OVER	
  9000	
  
• Sniff	
  neighbor	
  base-­‐sta<ons	
  
• Enable	
  debug	
  services	
  
• FTP	
  
• OAM	
  
HNBGW
• Home	
  Node	
  B	
  Gateway	
  
• Really	
  just	
  a	
  gateway	
  
• Receives	
  RUA	
  packet	
  from	
  femtocell	
  with	
  special	
  header	
  and	
  
sends	
  it	
  where	
  he	
  was	
  told	
  to.	
  
• When	
  femtocell	
  is	
  connected	
  to	
  serving	
  HNBGW	
  from	
  it's	
  
point	
  of	
  view	
  it	
  is	
  connected	
  to	
  Core	
  Network	
  
Further actions
• Receive	
  all	
  packets	
  
• Accept	
  all	
  requests	
  
• Hope	
  that	
  everything	
  will	
  be	
  fine	
  
• Exploit	
  everything	
  exploitable	
  
• ??????	
  
• Profit	
  
Problems
Protocols (SCTP)
• Stream	
  Controlled	
  Transport	
  Protocol	
  
• Kernel	
  module	
  in	
  Linux	
  since	
  …	
  long	
  
• Userland	
  bindings	
  that	
  hangs	
  every	
  second	
  minute	
  
• But	
  widely	
  used	
  in	
  telecom	
  networks	
  
Protocols (HNBAP)
• HNBAP	
  
• HNB	
  Register	
  Request	
  –	
  HNB	
  Register	
  Accept	
  –	
  OK	
  
• UE	
  Register	
  Request	
  –	
  UE	
  Register	
  Accept	
  –	
  OK	
  
It's alive
Protocols (RANAP)
•  RANAP	
  –	
  CS	
  domain	
  
•  Loca<on	
  update	
  request	
  –Try	
  to	
  Accept	
  –	
  Fail	
  
•  RANAP	
  –	
  PS	
  domain	
  
•  Rou<ng	
  update	
  request	
  –	
  Try	
  to	
  Accept	
  –	
  Fail	
  
Specification
• Everything	
  is	
  described	
  
• 5	
  DVD	
  disks	
  with	
  PDFs	
  
• Over	
  100000	
  pages	
  of	
  text	
  
• Documents	
  refer	
  other	
  documents,	
  that	
  refer	
  other	
  
documents	
  and	
  so	
  on	
  
TS 24.008
• Core	
  network	
  protocols	
  
• Describes	
  integrity	
  protec<on	
  of	
  packets	
  
• No	
  protec<on	
  for	
  
• Iden<ty	
  requests	
  
• Authen<ca<on	
  requests	
  
Identity request
•  TS	
  24.008	
  (subclause	
  9.2.15a)	
  
•  IMSI	
  
•  IMEI	
  
•  IMEISV	
  
•  TMSI	
  
•  The	
  MM	
  informa<on	
  procedure	
  may	
  be	
  invoked	
  by	
  the	
  network	
  at	
  
any	
  <me	
  during	
  an	
  RR	
  connec<on.	
  
Identity request
•  TS	
  24.008	
  
•  IMSI	
  –	
  iden<fies	
  SIM	
  card	
  of	
  subscriber	
  
•  IMEI	
  –	
  Iden<fies	
  mobile	
  sta<on	
  of	
  subscriber	
  
•  IMEISV	
  =	
  IMEI	
  
•  TMSI	
  
IMSI catcher stuff
•  Surveillance	
  against	
  user	
  is	
  not	
  covered	
  by	
  mutual	
  authen<ca<on	
  in	
  
UMTS	
  
•  User	
  can	
  be	
  iden<fied	
  both	
  by	
  SIM	
  card	
  and	
  by	
  mobile	
  phone	
  
GMM/MM Information
• Full	
  name	
  of	
  network	
  
• Time	
  management	
  
•  Time	
  zone	
  data	
  
•  Local	
  <me	
  
HSTS bypass
•  hdps://www.blackhat.com/eu-­‐14/archives.html#bypassing-­‐hdp-­‐
strict-­‐transport-­‐security	
  
•  Man-­‐in-­‐the-­‐middle	
  adack	
  against	
  unauthen<cated	
  NTP	
  connec<on	
  
•  Client	
  issued	
  requests	
  
•  Some	
  restric<ons	
  apply	
  (maximum	
  <me	
  to	
  shi*,	
  amount	
  of	
  <mes	
  to	
  
do	
  so,	
  etc.)	
  
HSTS bypass UMTS style
•  MM	
  Informa<on	
  –	
  Time	
  Zone	
  and	
  Time	
  data	
  
•  Server	
  issued	
  
•  No	
  restric<ons	
  –	
  all	
  data	
  considered	
  trusted	
  
Pre-auth integrity check bypass
•  According	
  to	
  spec	
  –	
  we	
  can't	
  send	
  any	
  good	
  packets	
  to	
  mobile	
  device	
  
without	
  knowledge	
  of	
  keys	
  
•  But	
  bad	
  code	
  for	
  server	
  should	
  be	
  also	
  considered	
  fuzzing	
  
•  What	
  if	
  we	
  will	
  send	
  packets	
  lidle	
  bit	
  out	
  of	
  order?	
  
“We don't know yet”
•  Under	
  certain	
  condi<ons	
  mobile	
  phone	
  and	
  femtocell	
  ignores	
  lack	
  of	
  
integrity	
  protec<on	
  
•  One	
  of	
  such	
  packets	
  is	
  SMS	
  packet	
  	
  
 
	
  
DEMO	
  
SMS implications
• Fake	
  SMS	
  with	
  spoofed	
  sender	
  
• SMS	
  DoS	
  	
  
• “Binary”	
  SMS	
  
Binary SMS
•  Gather	
  Kc	
  
•  Update	
  files	
  on	
  SIM	
  card	
  file	
  system	
  
•  Install	
  javacard	
  applica<ons	
  
•  Conduct	
  DoS	
  adacks	
  against	
  SIM	
  card	
  
•  See	
  related	
  researches:	
  
•  hdp://bit.ly/1IHsqll	
  by	
  Karsten	
  Nohl	
  
•  hdp://bit.ly/1KQTvJs	
  by	
  Alexander	
  Zaitsev	
  and	
  Sergey	
  Gordeychik	
  
Authentication and integrity control
• GSM	
  
•  Kc	
  –	
  ciphering	
  key	
  for	
  A5/*	
  algorithms	
  
•  Proof	
  of	
  authen<ca<on	
  of	
  client	
  –	
  RES	
  (4	
  bytes)	
  
• UMTS	
  
•  CK	
  –	
  ciphering	
  key	
  
•  IK	
  –	
  integrity	
  key	
  
•  Proof	
  of	
  authen<ca<on	
  of	
  client	
  AND	
  base	
  sta<on	
  –	
  knowledge	
  of	
  
IK,	
  with	
  which	
  every	
  packet	
  is	
  “signed”,	
  RES	
  is	
  actually	
  redundant	
  
Authentication in UMTS
• TS	
  33.102	
  
GSM	
  AKA	
   UMTS	
  AKA	
  
Auth	
  in	
  GSM	
   Normal	
  	
  
behavior	
  
If	
  available	
  
Auth	
  in	
  UMTS	
   If	
  allowed	
  	
  
by	
  USIM	
  
Normal	
  
behavior	
  
Authentication in UMTS
•  GSM	
  AKA	
  for	
  GSM	
  –	
  completely	
  broken,	
  rainbow	
  tables	
  exist	
  
•  UMTS	
  AKA	
  for	
  UMTS	
  –	
  main	
  mode,	
  protec<on	
  against	
  replay	
  adacks	
  
•  UMTS	
  AKA	
  for	
  GSM	
  –	
  re-­‐usage	
  of	
  CK	
  and	
  IK	
  to	
  create	
  Kc.	
  Might	
  be	
  
considered	
  secure,	
  requires	
  thorough	
  examina<on	
  	
  
GSM AKA for UMTS
•  GSM	
  authen<ca<on.	
  Yes,	
  again.	
  
•  We	
  send	
  into	
  SIM	
  128-­‐bit	
  RAND	
  
•  We	
  receive	
  64-­‐bit	
  Kc	
  
•  Now	
  we	
  have	
  to	
  obtain	
  128-­‐bit	
  IK	
  and	
  128-­‐bit	
  CK	
  
GSM AKA for UMTS
•  Let's	
  concatenate	
  and	
  XOR	
  the	
  same	
  key	
  
•  Effec<vely	
  decreasing	
  bruteforce	
  resistance	
  to	
  64-­‐bits	
  
•  When	
  the	
  user	
  is	
  adached	
  to	
  a	
  UTRAN,	
  the	
  R99+	
  VLR/SGSN	
  derives	
  
the	
  UMTS	
  cipher/integrity	
  keys	
  from	
  the	
  GSM	
  cipher	
  key	
  using	
  the	
  
following	
  conversion	
  func<ons:	
  
Possible attack vectors
•  Use	
  Kraken	
  to	
  obtain	
  Kc	
  for	
  given	
  RAND	
  
•  Remember	
  pre-­‐auth	
  binary	
  SMSes?	
  Access	
  file	
  system	
  to	
  obtain	
  Kc	
  
•  With	
  privileged	
  access	
  to	
  certain	
  TARs	
  you	
  can	
  enable	
  UMTS	
  AKA	
  to	
  
GSM	
  AKA	
  downgrade	
  
•  Or	
  just	
  use	
  smartcard	
  reader,	
  Luke	
  
•  Authen<cate	
  user	
  on	
  UMTS	
  femtocell.	
  Single	
  Kc	
  is	
  sufficient	
  to	
  
convince	
  SIM	
  that	
  base	
  sta<on	
  is	
  legi<mate	
  
For those who understand
Giveaways
•  “UMTS-­‐in-­‐the-­‐box”	
  toolkit	
  –	
  func<onal	
  SeGW	
  server,	
  HMS	
  server,	
  
HNBGW	
  server	
  with	
  parts	
  of	
  core	
  network.	
  Toolkit	
  will	
  be	
  sufficient	
  to	
  
connect	
  some	
  of	
  your	
  SIMs	
  to	
  femtocell	
  and	
  receive	
  SMSes	
  
•  Reverse-­‐friendly	
  femtocell	
  with	
  firmware	
  ready	
  to	
  be	
  patched	
  
•  	
  Knowledge	
  that	
  not	
  everything	
  that	
  good	
  and	
  with	
  3G	
  networks.	
  And	
  
that	
  they	
  might	
  be	
  ready	
  of	
  amateurs	
  and	
  specialists	
  
Future plans
•  Deep	
  firmware	
  analysis,	
  including	
  DSP	
  
•  Mobile	
  phones	
  interfaces	
  fuzzing.	
  ASN.1	
  should	
  be	
  friendly	
  for	
  
different	
  BoF	
  adacks	
  	
  
•  Full	
  handover	
  support	
  
•  Full	
  fledged	
  UMTS	
  sta<on	
  for	
  private	
  communica<on	
  (in	
  different	
  
countries,	
  where	
  it	
  is	
  possible)	
  
•  Fun	
  
Kudos
•  Kirill	
  Nesterov	
  (@k_v_nesterov)	
  
•  Gleb	
  Gritsai	
  (@repdet)	
  
•  Timur	
  Yunusov	
  (@a66at)	
  
•  Benoit	
  Michau	
  (hdp://michau.benoit.free.fr/	
  for	
  awesome	
  library	
  	
  
hdps://github.com/mitshell/libmichfor	
  python)	
  
•  And	
  all	
  other	
  guys!	
  
Thank you
Alexey	
  Osipov	
  gi*sungiv3n@gmail.com	
  
Alexander	
  Zaitsev	
  my@arbitrary.co.de	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01Michael Gough
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OSWilliam Lee
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system errorFrya Lora
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Abdulkarim Zakaria
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationSatria Ady Pradana
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
Make static instrumentation great again, High performance fuzzing for Windows...
Make static instrumentation great again, High performance fuzzing for Windows...Make static instrumentation great again, High performance fuzzing for Windows...
Make static instrumentation great again, High performance fuzzing for Windows...Lucas Leong
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Michael Gough
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for Android
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for AndroidApp Optimizations Using Qualcomm Snapdragon LLVM Compiler for Android
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for AndroidQualcomm Developer Network
 
Android for Embedded Linux Developers
Android for Embedded Linux DevelopersAndroid for Embedded Linux Developers
Android for Embedded Linux DevelopersOpersys inc.
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsRhydham Joshi
 

Was ist angesagt? (20)

Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OS
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
 
Make static instrumentation great again, High performance fuzzing for Windows...
Make static instrumentation great again, High performance fuzzing for Windows...Make static instrumentation great again, High performance fuzzing for Windows...
Make static instrumentation great again, High performance fuzzing for Windows...
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for Android
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for AndroidApp Optimizations Using Qualcomm Snapdragon LLVM Compiler for Android
App Optimizations Using Qualcomm Snapdragon LLVM Compiler for Android
 
Android for Embedded Linux Developers
Android for Embedded Linux DevelopersAndroid for Embedded Linux Developers
Android for Embedded Linux Developers
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Monitor troubleshooting
Monitor troubleshootingMonitor troubleshooting
Monitor troubleshooting
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of Artifacts
 

Andere mochten auch

When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesMichele Orru
 
Html5: something wicked this way comes - HackPra
Html5: something wicked this way comes - HackPraHtml5: something wicked this way comes - HackPra
Html5: something wicked this way comes - HackPraKrzysztof Kotowicz
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 201244CON
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloudqqlan
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDCscriptjunkie
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...Zoltan Balazs
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Olga Kochetova
 
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Andy Robbins
 
Bringing SDR to the pentest community - BlackHat USA 2014
Bringing SDR to the pentest community - BlackHat USA 2014Bringing SDR to the pentest community - BlackHat USA 2014
Bringing SDR to the pentest community - BlackHat USA 2014jmichel.p
 
Introduction to Apache Accumulo
Introduction to Apache AccumuloIntroduction to Apache Accumulo
Introduction to Apache AccumuloJared Winick
 
Windows Attacks AT is the new black
Windows Attacks   AT is the new blackWindows Attacks   AT is the new black
Windows Attacks AT is the new blackRob Fuller
 
Movimiento en 2 d
Movimiento en 2 dMovimiento en 2 d
Movimiento en 2 dlorena025
 
живопись византии
живопись византииживопись византии
живопись византииHOME
 
Carlos Castaneda - Segundo círculo do poder
Carlos Castaneda -  Segundo círculo do poderCarlos Castaneda -  Segundo círculo do poder
Carlos Castaneda - Segundo círculo do poderIndioê Alan Autovicz
 
White Paper: Social Monitoring
White Paper: Social MonitoringWhite Paper: Social Monitoring
White Paper: Social MonitoringCory Grassell
 
Routes Tips (a world of routes in your pocket)
Routes Tips (a world of routes in your pocket)Routes Tips (a world of routes in your pocket)
Routes Tips (a world of routes in your pocket)Julia Sidorova
 
Pdf de taller apicultura marzo
Pdf de taller apicultura marzoPdf de taller apicultura marzo
Pdf de taller apicultura marzoRuben NotFun
 

Andere mochten auch (20)

When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the masses
 
Html5: something wicked this way comes - HackPra
Html5: something wicked this way comes - HackPraHtml5: something wicked this way comes - HackPra
Html5: something wicked this way comes - HackPra
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloud
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
 
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24
 
Bringing SDR to the pentest community - BlackHat USA 2014
Bringing SDR to the pentest community - BlackHat USA 2014Bringing SDR to the pentest community - BlackHat USA 2014
Bringing SDR to the pentest community - BlackHat USA 2014
 
Introduction to Apache Accumulo
Introduction to Apache AccumuloIntroduction to Apache Accumulo
Introduction to Apache Accumulo
 
Windows Attacks AT is the new black
Windows Attacks   AT is the new blackWindows Attacks   AT is the new black
Windows Attacks AT is the new black
 
Movimiento en 2 d
Movimiento en 2 dMovimiento en 2 d
Movimiento en 2 d
 
Associacions i tv
Associacions i tvAssociacions i tv
Associacions i tv
 
живопись византии
живопись византииживопись византии
живопись византии
 
Apelacion
ApelacionApelacion
Apelacion
 
Carlos Castaneda - Segundo círculo do poder
Carlos Castaneda -  Segundo círculo do poderCarlos Castaneda -  Segundo círculo do poder
Carlos Castaneda - Segundo círculo do poder
 
Luciano F
Luciano FLuciano F
Luciano F
 
White Paper: Social Monitoring
White Paper: Social MonitoringWhite Paper: Social Monitoring
White Paper: Social Monitoring
 
Routes Tips (a world of routes in your pocket)
Routes Tips (a world of routes in your pocket)Routes Tips (a world of routes in your pocket)
Routes Tips (a world of routes in your pocket)
 
Pdf de taller apicultura marzo
Pdf de taller apicultura marzoPdf de taller apicultura marzo
Pdf de taller apicultura marzo
 

Ähnlich wie Adventures in Femtoland: 350 Yuan for Invaluable Fun

The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...
The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...
The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...The Hacker News
 
Steelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trashSteelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trashinfodox
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal PurzynskiPROIDEA
 
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdf
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdfeu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdf
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdfssuser6e61b3
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...Hackito Ergo Sum
 
2011-03 Developing Windows Exploits
2011-03 Developing Windows Exploits 2011-03 Developing Windows Exploits
2011-03 Developing Windows Exploits Raleigh ISSA
 
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with PythonSteelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Pythoninfodox
 
SMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiSMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiTakuya ASADA
 
Project Basecamp: News From Camp 4
Project Basecamp: News From Camp 4Project Basecamp: News From Camp 4
Project Basecamp: News From Camp 4Digital Bond
 
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...jamieayre
 
110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-huntingbob dobbs
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangLyon Yang
 
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware AnalysisStealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware AnalysisTamas K Lengyel
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 
Hacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitHacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitChad Udell
 
Hacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitHacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitChad Udell
 
Micro control idsecconf2010
Micro control idsecconf2010Micro control idsecconf2010
Micro control idsecconf2010idsecconf
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Marc Wickenden
 

Ähnlich wie Adventures in Femtoland: 350 Yuan for Invaluable Fun (20)

Who Broke My Crypto
Who Broke My CryptoWho Broke My Crypto
Who Broke My Crypto
 
The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...
The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...
The Hacker News: Hacking Wireless DSL routers via Admin Panel Password Reset ...
 
Steelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trashSteelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trash
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski
 
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdf
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdfeu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdf
eu-19-LimitedResults-Fatal-Fury-On-ESP32-Time-To-Release-Hardware-Exploits.pdf
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
 
2011-03 Developing Windows Exploits
2011-03 Developing Windows Exploits 2011-03 Developing Windows Exploits
2011-03 Developing Windows Exploits
 
Effective Benchmarks
Effective BenchmarksEffective Benchmarks
Effective Benchmarks
 
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with PythonSteelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Python
 
SMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiSMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgi
 
Project Basecamp: News From Camp 4
Project Basecamp: News From Camp 4Project Basecamp: News From Camp 4
Project Basecamp: News From Camp 4
 
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
 
110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
 
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware AnalysisStealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Hacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitHacking Robots for Fun and Profit
Hacking Robots for Fun and Profit
 
Hacking Robots for Fun and Profit
Hacking Robots for Fun and ProfitHacking Robots for Fun and Profit
Hacking Robots for Fun and Profit
 
Micro control idsecconf2010
Micro control idsecconf2010Micro control idsecconf2010
Micro control idsecconf2010
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)
 

Kürzlich hochgeladen

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Kürzlich hochgeladen (7)

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 

Adventures in Femtoland: 350 Yuan for Invaluable Fun

  • 1. Alexey  @Gi*sUngiven  Osipov   Alexander  @arbitrarycode  Zaitsev  
  • 2. Who we are? •  Full  <me  funemployed  security  researchers   •  Independent  consultants  TM©®  
  • 4. Yes it’s true •  20  mW  UMTS  Access  Point   •  Permanently  sold  on  Taobao   •  Branded  versions  appear  on  Ebay  
  • 15. Finding #1: UART Key   pressed?   Power  up   Boot  to  main   SW   VxWorks   “shell”   Yes  No   Blue  pill  mode   Red  pill  mode  
  • 16. Blue pill mode •  Unpacks  main  so*ware   •  Ends  up  in  “normal”  mode   Nmap  scan  report  for  172.16.1.1   Host  is  up  (0.0018s  latency).   PORT            STATE  SERVICE   443/tcp  open    hdps  
  • 17. Red pill mode •  VxWorks  shell   •  Debug   •  C  interpreter   •  Flash  file  system  access   •  Basic  networking  support  
  • 18. Red pill mode: Debug •  Full  blown  debugger   •  Breakpoints   •  Step/step  over/cret   •  Stack  trace   •  Disasm  
  • 19. Red pill mode: Debug •  Other  interes<ng  commands   •  Task  management   •  Memory  dump   •  Memory  edit   •  Registers  manipula<on   •  File-­‐to-­‐memory  dump   •  Even  symbols  are  here  
  • 20. Red pill mode: C interpreter   serv_addr  =  malloc(0x10)   bzero(serv_addr,  0x10)     m  serv_addr,  1   0x00   0x02   0x00   0x51   0xac   0x10   0x01   0xf0   .       sockfd  =  socket(2,  1,  0)   connect(sockfd,  serv_addr,  0x10)   buffer  =  "Hello  BHUSA"   write(sockfd,buffer,strlen(buffer))   Results  in  …  
  • 21.   DEMO   Red pill mode: C interpreter
  • 22. Red pill mode: FFS access
  • 23. Red pill mode: Networking •  Rou<ng  configura<on   •  rlogin  and  *p  clients       Example:   -­‐>  hostAdd  "tyrell_corp",  "1.3.3.7"   -­‐>  netDevCreate  "tyrell_corp:",  "tyrell_corp",  1   -­‐>  iam  "JFSebas<an",  "M0r3_Hum4n_7h4n_hum4n"   -­‐>  copy  <evil_files:/usr/nexus5/src/life_es<mate.c  
  • 24. Red pill mode: Let’s go! •  What’s  running?   Pew!   Pew!   Pew!   Exit  to  Blue  Pill  mode  
  • 25. Red pill mode: Oh really? •  They  are  actually  running   •  [pre]Red  pill  mode  only     •  A*er  we  issue  tr  "Boot2App”  command  or  reboot  to  blue  pill  all  is  lost   Nmap  scan  report  for  172.16.1.1   Host  is  up  (0.0048s  latency).   PORT            STATE  SERVICE   21/tcp  open    *p   23/tcp  open    telnet   17185/udp  open    wdbrpc  
  • 26. Red pill mode: Another way in? •  Do  we  actually  need  to  mess  with  UART  every  <me?   •  In  fact  ports  are  open  before  jumping  to  Blue  Pill  mode     -­‐>  
  • 27. Red pill mode: Hunting the memories •  Need  to  find  Blue  Pill  mode  code   •  Break  a*er  image  unpacks   •  Dump  it  with  “d”  -­‐  command     -­‐  Not  really  convenient   -­‐  Quite  slow  
  • 28. Red pill mode: Hunting the memories •  Need  to  find  Blue  Pill  mode  code   •  Break  a*er  image  unpacks   •  Dump  it  with  wdbrpc     -­‐  Binary  output   -­‐  Really  fast   -­‐  Dumps  the  right  size   -­‐  Debug  capabili<es  are  so  close…  
  • 29. IDA Pro. Finally! •  Addi<onal  convenience!   •  Symbol  table  is  in  place   •  Some  python  to  show  ‘em  right   Base64(AES(fvZAIeaqIRSkdKeDhOyc/Fit4ltVB81bN7vPpnvsCcZjrIMu0wtKdvYzgAMAyvAu9DdtFu/A5YaWxRAaP0pLhg==),  key)  
  • 30. Take a Red Pill after Blue •  We  want  to  execute  our  code  in  Blue  Pill  mode   •  There  are  at  least  two  ways:   •  Download,  extract,  patch,  pack  and  upload  Blue  Pill  image  –  long  and  boring   •  Patch  Blue  Pill  from  the  Red  Pill  in  run<me  –  quick  fun  and  dirty   •  Obviously,  we’ve  chosen  the  fun  one!  
  • 31. Take a Red Pill after Blue: the fun way •  “Loader”  –  small  asm  snippet   •  Wriden  upon  some  func<on  that  is  called  in  Blue  Pill    mode  (we  chose  web  log  in)   •  Opens  socket  and  connects  back   •  Receives  compiled  C-­‐code   •  Allocates  memory   •  Copies  the  code   •  Spawns  the  new  task  from  the  code   •  Profit!  
  • 32. Not all femtocells are created equal L •  Unfortunately  _older_  firmware  versions  have  some  limita<ons   •  No  UART   •  No  telnet   •  No  wdbrpc   •  Is  everything  lost?   •  No.  
  • 34. Ancient evil has awaken Arduino  Due     +     JTAGEnum*     =     Poor  man’s  JTAG  locator   hdps://github.com/cyphunk/JTAGenum  
  • 35. Ancient evil has awaken RaspberryPi     +   fresh  OpenOCD   =   Poor  man’s  JTAG  adapter     JTAG   RPi   TRST   7   TDO   9   TDI   10   TCK   11   TMS   25   hdps://github.com/synthetos/PiOCD/wiki/Using-­‐a-­‐Raspberry-­‐Pi-­‐as-­‐a-­‐JTAG-­‐Dongle  
  • 36. Ancient evil has awaken •  So  we  know  that  the  D6121  processor  is  based  on  ARM926EJ   •  But  then  what’s  wrong  with  OpenOCD?  
  • 37. Ancient evil has awaken •  Actually  it’s  OK   •  Closer  look  on  the  board  reveals  things…  Again.   Jumper   IDCODE   no  jumper   0x46121003   jtagmode0   0x0500510d   jtagmode1   0x07926477   ==  ARM926EJ  
  • 39. Ancient evil has awaken But  can  we  make  it  more  convenient?   Would  be  nice  to  debug  with  IDAPro…  
  • 40. Ancient evil has awaken But  can  we  make  it  more  convenient?   Would  be  nice  to  debug  with  IDAPro…   L
  • 41. Ancient evil has awaken Well,  Internets  are  full  of  things!   hdps://gist.github.com/warewolf/f8a16e46e7d8eb3078c5  
  • 42. Ancient evil has awaken Let’s  try  again…  
  • 43. Ancient evil has awaken Let’s  try  again…  
  • 44. VxWorks – conclusions made Digging  in  telecom  devices  especially  Huawei  ;)   We  see  it  everywhere:   •  Femtocells   •  Usb-­‐modems   •  Smartphones   •  ...   You  may  think  it’s  not  there,  but  it  is.     We  were  not  alone  in  digging  VxWorks  telco:   •  Timur  @a66at  Yunusov   •  Kirill  @k_v_Nesterov  Nesterov    see  hdps://www.hackinparis.com/sites/hackinparis.com/files/<mur_yusinov_root_via_sms.pdf  
  • 47. SeGW • Security  gateway   • VPN   • Protects  all  connec<ons  over  untrusted  networks   • IPSEC  -­‐  Main  mode   • EAP-­‐AKA  /  EAP-­‐SIM  
  • 48. EAP-SIM / EAP-AKA •  EAP-­‐SIM  is  based  on  GSM  Authen<ca<on   •  Send  RAND   •  Get  52-­‐64  bits  out  of  Kc   •  Repeat  3  <mes  un<l  you  get  enough  key  material   •  Encrypt  and  authen<cate  packets  based  on  this  key     •  ?????   •  Profit   •  Challenge-­‐response  authen<ca<on  with  secure  element.  Seems  legit.  
  • 49. EAP-SIM • Based  on  GSM  Authen<cate     • No  replay  protec<on  
  • 50. VPN termination • Take  SIM  card  out  of  femtocell   • Insert  into  SIM  reader   • Create  three  different  pairs  of  RAND:Kc   • Connect  femtocell  to  yourself  any<me,  anywhere   • We  know  what  you  are  thinking.  But  that  would  be  illegal    
  • 51. SeGW open source • StrongSwan   • All  kinds  and  flavors  of  EAP   • EAP-­‐SIM-­‐File   img  from  hdp://habrahabr.ru/post/250859/  
  • 54. Inside tunnel • New  field  for  adack   • New  IP  address  inside  VPN   •  New  open  ports   •  New  connec<ons  from  femtocell  over  “secure”  channel   • Different  protocols   •  TR-­‐069   •  SCTP,  HNBAP,  RUA,  RANAP,  DTAP    
  • 55. HMS • Home  Node  B  Management  Server   • Protocol:  TR-­‐069   • Ini<al  HMS   •  Possibly  checks  authen<ca<on   •  Provides  address  to  serving  SeGW   • Serving  HMS   •  Checks  geo-­‐loca<on   •  Provides  configura<on  of  radio  part   •  Enables  access  to  HNBGW  
  • 56. Configuration options • OVER  9000   • Sniff  neighbor  base-­‐sta<ons   • Enable  debug  services   • FTP   • OAM  
  • 57. HNBGW • Home  Node  B  Gateway   • Really  just  a  gateway   • Receives  RUA  packet  from  femtocell  with  special  header  and   sends  it  where  he  was  told  to.   • When  femtocell  is  connected  to  serving  HNBGW  from  it's   point  of  view  it  is  connected  to  Core  Network  
  • 58. Further actions • Receive  all  packets   • Accept  all  requests   • Hope  that  everything  will  be  fine   • Exploit  everything  exploitable   • ??????   • Profit  
  • 60. Protocols (SCTP) • Stream  Controlled  Transport  Protocol   • Kernel  module  in  Linux  since  …  long   • Userland  bindings  that  hangs  every  second  minute   • But  widely  used  in  telecom  networks  
  • 61. Protocols (HNBAP) • HNBAP   • HNB  Register  Request  –  HNB  Register  Accept  –  OK   • UE  Register  Request  –  UE  Register  Accept  –  OK  
  • 63. Protocols (RANAP) •  RANAP  –  CS  domain   •  Loca<on  update  request  –Try  to  Accept  –  Fail   •  RANAP  –  PS  domain   •  Rou<ng  update  request  –  Try  to  Accept  –  Fail  
  • 64. Specification • Everything  is  described   • 5  DVD  disks  with  PDFs   • Over  100000  pages  of  text   • Documents  refer  other  documents,  that  refer  other   documents  and  so  on  
  • 65. TS 24.008 • Core  network  protocols   • Describes  integrity  protec<on  of  packets   • No  protec<on  for   • Iden<ty  requests   • Authen<ca<on  requests  
  • 66. Identity request •  TS  24.008  (subclause  9.2.15a)   •  IMSI   •  IMEI   •  IMEISV   •  TMSI   •  The  MM  informa<on  procedure  may  be  invoked  by  the  network  at   any  <me  during  an  RR  connec<on.  
  • 67. Identity request •  TS  24.008   •  IMSI  –  iden<fies  SIM  card  of  subscriber   •  IMEI  –  Iden<fies  mobile  sta<on  of  subscriber   •  IMEISV  =  IMEI   •  TMSI  
  • 68. IMSI catcher stuff •  Surveillance  against  user  is  not  covered  by  mutual  authen<ca<on  in   UMTS   •  User  can  be  iden<fied  both  by  SIM  card  and  by  mobile  phone  
  • 69. GMM/MM Information • Full  name  of  network   • Time  management   •  Time  zone  data   •  Local  <me  
  • 70. HSTS bypass •  hdps://www.blackhat.com/eu-­‐14/archives.html#bypassing-­‐hdp-­‐ strict-­‐transport-­‐security   •  Man-­‐in-­‐the-­‐middle  adack  against  unauthen<cated  NTP  connec<on   •  Client  issued  requests   •  Some  restric<ons  apply  (maximum  <me  to  shi*,  amount  of  <mes  to   do  so,  etc.)  
  • 71. HSTS bypass UMTS style •  MM  Informa<on  –  Time  Zone  and  Time  data   •  Server  issued   •  No  restric<ons  –  all  data  considered  trusted  
  • 72. Pre-auth integrity check bypass •  According  to  spec  –  we  can't  send  any  good  packets  to  mobile  device   without  knowledge  of  keys   •  But  bad  code  for  server  should  be  also  considered  fuzzing   •  What  if  we  will  send  packets  lidle  bit  out  of  order?  
  • 73. “We don't know yet” •  Under  certain  condi<ons  mobile  phone  and  femtocell  ignores  lack  of   integrity  protec<on   •  One  of  such  packets  is  SMS  packet    
  • 75. SMS implications • Fake  SMS  with  spoofed  sender   • SMS  DoS     • “Binary”  SMS  
  • 76. Binary SMS •  Gather  Kc   •  Update  files  on  SIM  card  file  system   •  Install  javacard  applica<ons   •  Conduct  DoS  adacks  against  SIM  card   •  See  related  researches:   •  hdp://bit.ly/1IHsqll  by  Karsten  Nohl   •  hdp://bit.ly/1KQTvJs  by  Alexander  Zaitsev  and  Sergey  Gordeychik  
  • 77. Authentication and integrity control • GSM   •  Kc  –  ciphering  key  for  A5/*  algorithms   •  Proof  of  authen<ca<on  of  client  –  RES  (4  bytes)   • UMTS   •  CK  –  ciphering  key   •  IK  –  integrity  key   •  Proof  of  authen<ca<on  of  client  AND  base  sta<on  –  knowledge  of   IK,  with  which  every  packet  is  “signed”,  RES  is  actually  redundant  
  • 78. Authentication in UMTS • TS  33.102   GSM  AKA   UMTS  AKA   Auth  in  GSM   Normal     behavior   If  available   Auth  in  UMTS   If  allowed     by  USIM   Normal   behavior  
  • 79. Authentication in UMTS •  GSM  AKA  for  GSM  –  completely  broken,  rainbow  tables  exist   •  UMTS  AKA  for  UMTS  –  main  mode,  protec<on  against  replay  adacks   •  UMTS  AKA  for  GSM  –  re-­‐usage  of  CK  and  IK  to  create  Kc.  Might  be   considered  secure,  requires  thorough  examina<on    
  • 80. GSM AKA for UMTS •  GSM  authen<ca<on.  Yes,  again.   •  We  send  into  SIM  128-­‐bit  RAND   •  We  receive  64-­‐bit  Kc   •  Now  we  have  to  obtain  128-­‐bit  IK  and  128-­‐bit  CK  
  • 81. GSM AKA for UMTS •  Let's  concatenate  and  XOR  the  same  key   •  Effec<vely  decreasing  bruteforce  resistance  to  64-­‐bits   •  When  the  user  is  adached  to  a  UTRAN,  the  R99+  VLR/SGSN  derives   the  UMTS  cipher/integrity  keys  from  the  GSM  cipher  key  using  the   following  conversion  func<ons:  
  • 82. Possible attack vectors •  Use  Kraken  to  obtain  Kc  for  given  RAND   •  Remember  pre-­‐auth  binary  SMSes?  Access  file  system  to  obtain  Kc   •  With  privileged  access  to  certain  TARs  you  can  enable  UMTS  AKA  to   GSM  AKA  downgrade   •  Or  just  use  smartcard  reader,  Luke   •  Authen<cate  user  on  UMTS  femtocell.  Single  Kc  is  sufficient  to   convince  SIM  that  base  sta<on  is  legi<mate  
  • 83. For those who understand
  • 84. Giveaways •  “UMTS-­‐in-­‐the-­‐box”  toolkit  –  func<onal  SeGW  server,  HMS  server,   HNBGW  server  with  parts  of  core  network.  Toolkit  will  be  sufficient  to   connect  some  of  your  SIMs  to  femtocell  and  receive  SMSes   •  Reverse-­‐friendly  femtocell  with  firmware  ready  to  be  patched   •   Knowledge  that  not  everything  that  good  and  with  3G  networks.  And   that  they  might  be  ready  of  amateurs  and  specialists  
  • 85. Future plans •  Deep  firmware  analysis,  including  DSP   •  Mobile  phones  interfaces  fuzzing.  ASN.1  should  be  friendly  for   different  BoF  adacks     •  Full  handover  support   •  Full  fledged  UMTS  sta<on  for  private  communica<on  (in  different   countries,  where  it  is  possible)   •  Fun  
  • 86. Kudos •  Kirill  Nesterov  (@k_v_nesterov)   •  Gleb  Gritsai  (@repdet)   •  Timur  Yunusov  (@a66at)   •  Benoit  Michau  (hdp://michau.benoit.free.fr/  for  awesome  library     hdps://github.com/mitshell/libmichfor  python)   •  And  all  other  guys!  
  • 87. Thank you Alexey  Osipov  gi*sungiv3n@gmail.com   Alexander  Zaitsev  my@arbitrary.co.de