SlideShare ist ein Scribd-Unternehmen logo
1 von 106
Downloaden Sie, um offline zu lesen
Not Quite ZigBee; or,
   How to Sniff a Strange Radio



                                                        Open with “Why should
                                                        you give a shit?”

                                                        List of Exploits




                                 Travis Goodspeed
22 April 2010 -- Source Boston
                                 travis@radiantmachines.com
Introduction

✀   WiïŹ

✀   Bluetooth

    ✀   Ubertooth

✀   ZigBee

    ✀   KillerBee, GoodFET, Freakduino Chibi, Daintree

✀   What about everything else?
Introduction


✀   This is not a USRP lecture.

✀   Weird radios are usually one-off designs.

    ✀   Bad cryptography, if any.

    ✀   Little testing, quality control.

✀   Vulnerabilities inherited from the chipset.
Citations


✀   Max Moser and Thorsten Schröder

✀   Michael Ossmann



✀   Read my articles for the rest,
    http://travisgoodspeed.com
Example Targets


✀   Radio Remote Controls

✀   Apple/Nike+ Shoe Pod

✀   Garmin ANT+ Watch

✀   Microsoft Keyboard
Methodology

✀   Dissect a device.

    ✀   Part numbers, chip die photographs, ïŹrmware.

✀   Determine radio encoding, rate, and frequency.

    ✀   2FSK, 2Mbps, 2.4GHz

    ✀   QPSK, 1Mbps, 2.4GHz

✀   Build a transceiver.
Part Numbers


✀   CC2420, EM250, A7125

    ✀   Uniquely identify the part, index the datasheet.

    ✀   Vulnerabilities are indexed by part number, not product name.

✀   Sometimes they are missing or ground off.

    ✀   HNO3 and H2SO4 are your friends!
Datasheets


✀   Describe registers and pins.

✀   Sometimes private, but often public.

✀   Read the whole damned thing, and you’re secure to ïŹnd bugs.

✀   Also read the errata sheets.

    ✀   For this chip and its ancestors.
Datasheets
Die Badges


✀   Identify the internal part number.

✀   Sometimes this is the public one.

✀   Sometimes it isn’t.

    ✀   Animals, Logos

    ✀   Lot numbers.
TI/Chipcon CC1110
Amiccon 7125
Amiccon 7125
nRF24L01+
Ember EM357
Ember EM357 Magnum
Mystery 2.4GHz Radio

                     nRF24E1G




✀   Logo ïŹrst.

✀   Inductors.

    ✀   Lollypops!

✀   Fill Pattern
✀   ffo

✀
Mystery vs. CC1110
Mystery vs. EM357
Mystery vs. nRF24L01+
Mystery vs. nRF24L01+
Meet the Lineup


✀   Chipcon

✀   Nordic RF

✀   Amiccom

✀   Others
Chipcon ISM Band


✀   CC1100, 2500 radio.

✀   CC1110, 2500 system-on-chip.

✀   Very conïŹgurable.

    ✀   CC1110 talks to anything sub-GHz.

    ✀   Undocumented 4FSK, use register settings for CC1101.
Nordic RF


✀   No promiscuous mode.

    ✀   There’s a hack, but it’s ugly.

✀   Not very conïŹgurable:                ✀   Microsoft Keyboards, Mice

    ✀   2FSK, ïŹxed deviation.            ✀   OpenBeacon

    ✀   Integer MHz channels.            ✀   Sparkfun Keyfob

                                         ✀   ANT+, Nike+
Amiccom A7125


✀   2.4GHz, 2FSK

✀   Doccos in English, Chinese

✀   Unbuffered mode for outputting symbols directly.

    ✀   2 million symbols/second!

    ✀   Handy, but not necessary, for prom. snifïŹng of Nordic trafïŹc.
Modulation Schemes

✀   Frequency Shift Keying (FSK)

    ✀   Cheap digital radios, Bluetooth.

✀   Amplitude Shift Keying (ASK, OOK)

    ✀   Car remotes, garage door openers.

✀   Phase Shift Keying (PSK)

    ✀   WiïŹ, ZigBee

✀   Complicated variations of each.
Frequency Shift Keying

✀   Symbol Rate: Integer or ïŹ‚oating?

✀   Frequency: Integer or fractional?

✀   SYNC: ConïŹgurable? Repurposed as the address?

✀   Deviation: Space between highest and lowest symbol.

✀   Encoding:

    ✀   2FSK: Low frequency is zero, high frequency is 1.

    ✀   4FSK: +1, +1/3, -1/3, -1
Getting a radio board.

✀   Chips are difïŹcult to use directly.

    ✀   QFN or BGA chip packages.

    ✀   Radio layout requires a custom board.

✀   Modules are available with radio and analog chain.

    ✀   Often lack an MCU, so use a GoodFET.

✀   Commercial boards are often useful.

    ✀   GirlTech IMME, Next Hope Badge
Configuring the Radio


✀   All digital radios are conïŹgured by Special Function Registers (SFR).

✀   Register settings can come from multiple sources:

    ✀   SmartRF Studio conïŹguring TI/Chipcon radios.

    ✀   Datasheets

    ✀   Ask Ossmann
✀   RF Parameters

✀   Register Addresses

✀   Register Values
Always bring it back to Python
GoodFET Radio Architecture

✀   Firmware in C, client in Python.

✀   Py2Exe port for Win32.

    ✀   Only tested on the Chinese build.

✀   Firmware is trimmed to support only the needed drivers.

✀   New drivers can be written in pure-Python.

    ✀   Port functions to C as needed.
Turning Point Clicker

✀   Classroom remote control.

✀   Attendance, Quizzing

✀   Nordic nRF24E1G

    ✀   8051 MCU

    ✀   2.4GHz Radio

    ✀   External Flash
Radio+8051 MCU




SPI ROM
Dumping Firmware


✀   Chips

    ✀   nRF24E1G -- 8051 MCU + nRF2401 Radio

    ✀   24C32 Boot Rom

✀   Documentation

    ✀   Datasheets, Reference Design
nRF24E1

✀   8051 Microcontroller

    ✀   More popular than ARM and X86.

✀   Internal nRF2401 Radio

    ✀   1Mbps GFSK Radio

    ✀   2.4 to 2.5 GHz, 1MHz Channel Spacing

✀   No internal Flash. Boots from external EEPROM.

✀   No promiscuous mode. (The hack comes later.)
Radio+8051 MCU




SPI ROM
nRF24E1 Firmware in IDA



✀   ``goodfet.spi25c dump clicker.hex’’

✀   Copy all but ïŹrst 7 bytes to clicker.bin.

✀   Load clicker.bin to CODE memory at 0x0000.
Just 3kB of Code
nRF24E1 Internal Arrangement




✀   8051 MCU

✀   Internal SPI Bus

✀   RADIO register #0x80
Useful Registers

✀   SPI_DATA, SPICLK, SPI_CNTRL, EXIF

✀   P1 LED Port

✀   P0.0 SPI EEPROM Slave Select

✀   RADIO #0x80

    ✀   RADIO.3 is Radio Slave Select

    ✀   RADIO.7 is Power Up
From Registers to Functions
RADIOWRCONFIG


✀   Just a lot of SPIRXTX.

    ✀   08 08 00 00 00 00 00 00 00

    ✀   (1B) (1C) (1D)

    ✀   63 6F

    ✀   (1A)+1
Data Width

                 ADR
        ADR Width
         CRC LEN

ConïŹg    Channel
RADIOWRCONFIG


✀   Just a lot of SPIRXTX.
                                     ✀   Channel at 0x1A
    ✀   08 08 00 00 00 00 00 00 00
                                     ✀   MAC at 0x1B, 0x1C, 0x1D
    ✀   (1B) (1C) (1D)
                                     ✀   4 bytes of data
    ✀   63 6F
                                     ✀   1 byte checksum
    ✀   (1A)+1
Transmission


 ✀   Function takes one byte of input.

 ✀   Repeated calls to SPITXRX

     ✀   (1E) (1F) (20)   //Destination MAC Address

     ✀   (1B) (1C) (1D)   //Source MAC Address

     ✀   (input)          //Button Code
Destination MAC at 1E, 1F, 20



✀   MOV 0x1E, #0x12   ✀   DMAC is 0x123456

✀   MOV 0x1F, #0x34   ✀   Payload length is 4 bytes.

✀   MOV 0x20, #0x56   ✀   One byte checksum.
Turning Point Sniffing


✀   2.441 GHz, 1Mbps

✀   Address: [0x12, 0x34, 0x56]

✀   Payload:

    ✀   3 byte MAC

    ✀   1 byte Button (ASCII)
Load the Registers by GoodFET
Microsoft Keyboard

✀   2.4GHz Nordic, XOR crypto

✀   SYNC varies by unit.

    ✀   Again, there’s no promiscuous mode.

✀   Initial Exploit in Keykeriki 2.0

    ✀   Max Moser and Thorsten Schröder

    ✀   Amiccom A7125, nRF24L01+
Holy crap that’s bad crypto!
Promiscuity is a Citizen’s Duty

✀   If the crypto is so bad, why is it hard to sniff?

    ✀   SYNC ïŹeld is unique to the unit.

    ✀   Receiver must know the SYNC to receive a packet.

✀   Two solutions:

    ✀   1) Search raw radio trafïŹc for Preamble. (Keykeriki)

    ✀   2) Use the preamble as if it were a SYNC. (GoodFET)
Schröder and Moser’s Solution

✀   A7125 samples raw bits at 2Mbps.

✀   ARM CPU looks for Preamble.

✀   When the MAC is found,

    ✀   Load nRF24L01+ to sniff.

    ✀   Dump to PC for interpretation.

✀   Can it be cheaper?
GoodFET Autotune

✀   Reduce MAC length to two bytes.

✀   Disable checksums.

✀   Set MAC to 0x0055 or 0x00AA.

✀   Count occurrences of 5-byte sequences:

    ✀   Might by shifted off by a bit.

    ✀   Filter out noise.
GoodFET Autotune
GoodFET Autotune
Conclusions
Sidebar



✀   Somehow we have time left.

✀   Let’s not waste it.
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols
Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols

Weitere Àhnliche Inhalte

Was ist angesagt?

Insecure Obsolete and Trivial - The Real IOT
Insecure Obsolete and Trivial - The Real IOTInsecure Obsolete and Trivial - The Real IOT
Insecure Obsolete and Trivial - The Real IOTPrice McDonald
 
6to4tunnel sample config
6to4tunnel sample config6to4tunnel sample config
6to4tunnel sample configjebong03
 
Thotcon 0x8 - Hardware Hacking on a Budget
Thotcon 0x8 - Hardware Hacking on a BudgetThotcon 0x8 - Hardware Hacking on a Budget
Thotcon 0x8 - Hardware Hacking on a BudgetPrice McDonald
 
Everything you never wanted to know about mobile voip
Everything you never wanted to know about mobile voipEverything you never wanted to know about mobile voip
Everything you never wanted to know about mobile voipPaloSanto Solutions
 
Better living through microcontrollers
Better living through microcontrollersBetter living through microcontrollers
Better living through microcontrollersjgrahamc
 
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD ScreenShawn Lee
 
G1-component computer(processor)
G1-component computer(processor)G1-component computer(processor)
G1-component computer(processor)nurazrinmalik
 
Sistem all tanpa sound dan sensor garis
Sistem all tanpa sound dan sensor garisSistem all tanpa sound dan sensor garis
Sistem all tanpa sound dan sensor garisLindawani Siregar
 
RFID: EPC protocol
RFID: EPC protocolRFID: EPC protocol
RFID: EPC protocolAmjed Majid
 
Handling Asynchronous Events in MCUs
Handling Asynchronous Events in MCUsHandling Asynchronous Events in MCUs
Handling Asynchronous Events in MCUsCorrado Santoro
 
93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)Devanshu Suman
 
Vista 1600 c epon olt quick start manual(r1.2)
Vista 1600 c epon olt quick start manual(r1.2)Vista 1600 c epon olt quick start manual(r1.2)
Vista 1600 c epon olt quick start manual(r1.2)Shanxi Cai
 
Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)Marco Balduzzi
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityMichael Smith
 
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...DefconRussia
 
Brochua đáș§u ghi hĂŹnh QTD-6100 Series
Brochua đáș§u ghi hĂŹnh QTD-6100 SeriesBrochua đáș§u ghi hĂŹnh QTD-6100 Series
Brochua đáș§u ghi hĂŹnh QTD-6100 SeriesVi TĂ­nh HoĂ ng Nam
 

Was ist angesagt? (20)

Insecure Obsolete and Trivial - The Real IOT
Insecure Obsolete and Trivial - The Real IOTInsecure Obsolete and Trivial - The Real IOT
Insecure Obsolete and Trivial - The Real IOT
 
6to4tunnel sample config
6to4tunnel sample config6to4tunnel sample config
6to4tunnel sample config
 
Thotcon 0x8 - Hardware Hacking on a Budget
Thotcon 0x8 - Hardware Hacking on a BudgetThotcon 0x8 - Hardware Hacking on a Budget
Thotcon 0x8 - Hardware Hacking on a Budget
 
Everything you never wanted to know about mobile voip
Everything you never wanted to know about mobile voipEverything you never wanted to know about mobile voip
Everything you never wanted to know about mobile voip
 
Jtag
JtagJtag
Jtag
 
Better living through microcontrollers
Better living through microcontrollersBetter living through microcontrollers
Better living through microcontrollers
 
000682
000682000682
000682
 
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen
0.47 inch LCD Micro Dispalay 800x600 Resolution RGB Interface LCD Screen
 
DMVPN Lab WorkBook
DMVPN Lab WorkBookDMVPN Lab WorkBook
DMVPN Lab WorkBook
 
G1-component computer(processor)
G1-component computer(processor)G1-component computer(processor)
G1-component computer(processor)
 
Codigo circuitos integrados cuadro
Codigo circuitos integrados cuadroCodigo circuitos integrados cuadro
Codigo circuitos integrados cuadro
 
Sistem all tanpa sound dan sensor garis
Sistem all tanpa sound dan sensor garisSistem all tanpa sound dan sensor garis
Sistem all tanpa sound dan sensor garis
 
RFID: EPC protocol
RFID: EPC protocolRFID: EPC protocol
RFID: EPC protocol
 
Handling Asynchronous Events in MCUs
Handling Asynchronous Events in MCUsHandling Asynchronous Events in MCUs
Handling Asynchronous Events in MCUs
 
93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)
 
Vista 1600 c epon olt quick start manual(r1.2)
Vista 1600 c epon olt quick start manual(r1.2)Vista 1600 c epon olt quick start manual(r1.2)
Vista 1600 c epon olt quick start manual(r1.2)
 
Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency Security
 
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...
ОлДг ĐšŃƒĐżŃ€Đ”Đ”ĐČ - ĐžĐ±Đ·ĐŸŃ€ Đž ĐŽĐ”ĐŒĐŸĐœŃŃ‚Ń€Đ°Ń†ĐžŃ ĐœŃŽĐ°ĐœŃĐŸĐČ Đž трюĐșĐŸĐČ ĐžĐ· ĐŸĐ±Đ»Đ°ŃŃ‚Đž Đ±Đ”ŃĐżŃ€ĐŸĐČĐŸĐŽĐœŃ‹Ń… ...
 
Brochua đáș§u ghi hĂŹnh QTD-6100 Series
Brochua đáș§u ghi hĂŹnh QTD-6100 SeriesBrochua đáș§u ghi hĂŹnh QTD-6100 Series
Brochua đáș§u ghi hĂŹnh QTD-6100 Series
 

Ähnlich wie Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols

Highway to Hell: Hacking Toll Systems (Blackhat 2008)
Highway to Hell: Hacking Toll Systems (Blackhat 2008)Highway to Hell: Hacking Toll Systems (Blackhat 2008)
Highway to Hell: Hacking Toll Systems (Blackhat 2008)Nate Lawson
 
Robokits gps 01
Robokits gps 01Robokits gps 01
Robokits gps 01Jyoti Luhach
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin VernouxHackito Ergo Sum
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinEC-Council
 
Using ARM Dev.Board in physical experimental instruments
Using ARM Dev.Board in physical experimental instrumentsUsing ARM Dev.Board in physical experimental instruments
Using ARM Dev.Board in physical experimental instrumentsa_n0v
 
Rig nitc [autosaved] (copy)
Rig nitc [autosaved] (copy)Rig nitc [autosaved] (copy)
Rig nitc [autosaved] (copy)Aravind E Vijayan
 
Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles E hacking
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)Michael Smith
 
Software Defined Radio (SDR)
Software Defined Radio (SDR)Software Defined Radio (SDR)
Software Defined Radio (SDR)Drew Fustini
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllersardiri
 
Tablet in 2012
Tablet in 2012Tablet in 2012
Tablet in 2012JJ Wu
 
This Document gives a complete understanding of the I3C protocol which is int...
This Document gives a complete understanding of the I3C protocol which is int...This Document gives a complete understanding of the I3C protocol which is int...
This Document gives a complete understanding of the I3C protocol which is int...rohitvasanad
 
Introduction to PICAXE Microcontrollers
Introduction to PICAXE MicrocontrollersIntroduction to PICAXE Microcontrollers
Introduction to PICAXE MicrocontrollersL. Paul Verhage
 
Embest catalog 2011
Embest catalog 2011Embest catalog 2011
Embest catalog 2011yclinda666
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRootedCON
 
Pc based wire less data aquisition system using rf(1)
Pc based wire less data aquisition system using rf(1)Pc based wire less data aquisition system using rf(1)
Pc based wire less data aquisition system using rf(1)Vishalya Dulam
 

Ähnlich wie Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols (20)

Highway to Hell: Hacking Toll Systems (Blackhat 2008)
Highway to Hell: Hacking Toll Systems (Blackhat 2008)Highway to Hell: Hacking Toll Systems (Blackhat 2008)
Highway to Hell: Hacking Toll Systems (Blackhat 2008)
 
Robokits gps 01
Robokits gps 01Robokits gps 01
Robokits gps 01
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc Newlin
 
Using ARM Dev.Board in physical experimental instruments
Using ARM Dev.Board in physical experimental instrumentsUsing ARM Dev.Board in physical experimental instruments
Using ARM Dev.Board in physical experimental instruments
 
Rig nitc [autosaved] (copy)
Rig nitc [autosaved] (copy)Rig nitc [autosaved] (copy)
Rig nitc [autosaved] (copy)
 
Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)
 
Software Defined Radio (SDR)
Software Defined Radio (SDR)Software Defined Radio (SDR)
Software Defined Radio (SDR)
 
8051 zigbee interface
8051 zigbee interface8051 zigbee interface
8051 zigbee interface
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllers
 
Tablet in 2012
Tablet in 2012Tablet in 2012
Tablet in 2012
 
This Document gives a complete understanding of the I3C protocol which is int...
This Document gives a complete understanding of the I3C protocol which is int...This Document gives a complete understanding of the I3C protocol which is int...
This Document gives a complete understanding of the I3C protocol which is int...
 
Introduction to PICAXE Microcontrollers
Introduction to PICAXE MicrocontrollersIntroduction to PICAXE Microcontrollers
Introduction to PICAXE Microcontrollers
 
Embest catalog 2011
Embest catalog 2011Embest catalog 2011
Embest catalog 2011
 
Osmocom
OsmocomOsmocom
Osmocom
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
 
Pc based wire less data aquisition system using rf(1)
Pc based wire less data aquisition system using rf(1)Pc based wire less data aquisition system using rf(1)
Pc based wire less data aquisition system using rf(1)
 
M qcardiac
M qcardiacM qcardiac
M qcardiac
 
3D-DRESD ASIDA
3D-DRESD ASIDA3D-DRESD ASIDA
3D-DRESD ASIDA
 

Mehr von Source Conference

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser BotnetSource Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 

Mehr von Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

KĂŒrzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

KĂŒrzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Sniffing Strange Radios: Exploiting Vulnerabilities in Wireless Protocols

  • 1. Not Quite ZigBee; or, How to Sniff a Strange Radio Open with “Why should you give a shit?” List of Exploits Travis Goodspeed 22 April 2010 -- Source Boston travis@radiantmachines.com
  • 2. Introduction ✀ WiïŹ ✀ Bluetooth ✀ Ubertooth ✀ ZigBee ✀ KillerBee, GoodFET, Freakduino Chibi, Daintree ✀ What about everything else?
  • 3. Introduction ✀ This is not a USRP lecture. ✀ Weird radios are usually one-off designs. ✀ Bad cryptography, if any. ✀ Little testing, quality control. ✀ Vulnerabilities inherited from the chipset.
  • 4. Citations ✀ Max Moser and Thorsten Schröder ✀ Michael Ossmann ✀ Read my articles for the rest, http://travisgoodspeed.com
  • 5. Example Targets ✀ Radio Remote Controls ✀ Apple/Nike+ Shoe Pod ✀ Garmin ANT+ Watch ✀ Microsoft Keyboard
  • 6. Methodology ✀ Dissect a device. ✀ Part numbers, chip die photographs, ïŹrmware. ✀ Determine radio encoding, rate, and frequency. ✀ 2FSK, 2Mbps, 2.4GHz ✀ QPSK, 1Mbps, 2.4GHz ✀ Build a transceiver.
  • 7.
  • 8. Part Numbers ✀ CC2420, EM250, A7125 ✀ Uniquely identify the part, index the datasheet. ✀ Vulnerabilities are indexed by part number, not product name. ✀ Sometimes they are missing or ground off. ✀ HNO3 and H2SO4 are your friends!
  • 9. Datasheets ✀ Describe registers and pins. ✀ Sometimes private, but often public. ✀ Read the whole damned thing, and you’re secure to ïŹnd bugs. ✀ Also read the errata sheets. ✀ For this chip and its ancestors.
  • 11.
  • 12.
  • 13. Die Badges ✀ Identify the internal part number. ✀ Sometimes this is the public one. ✀ Sometimes it isn’t. ✀ Animals, Logos ✀ Lot numbers.
  • 15.
  • 21. Mystery 2.4GHz Radio nRF24E1G ✀ Logo ïŹrst. ✀ Inductors. ✀ Lollypops! ✀ Fill Pattern
  • 22. ✀ ffo ✀
  • 26.
  • 27.
  • 29. Meet the Lineup ✀ Chipcon ✀ Nordic RF ✀ Amiccom ✀ Others
  • 30. Chipcon ISM Band ✀ CC1100, 2500 radio. ✀ CC1110, 2500 system-on-chip. ✀ Very conïŹgurable. ✀ CC1110 talks to anything sub-GHz. ✀ Undocumented 4FSK, use register settings for CC1101.
  • 31.
  • 32. Nordic RF ✀ No promiscuous mode. ✀ There’s a hack, but it’s ugly. ✀ Not very conïŹgurable: ✀ Microsoft Keyboards, Mice ✀ 2FSK, ïŹxed deviation. ✀ OpenBeacon ✀ Integer MHz channels. ✀ Sparkfun Keyfob ✀ ANT+, Nike+
  • 33.
  • 34.
  • 35. Amiccom A7125 ✀ 2.4GHz, 2FSK ✀ Doccos in English, Chinese ✀ Unbuffered mode for outputting symbols directly. ✀ 2 million symbols/second! ✀ Handy, but not necessary, for prom. snifïŹng of Nordic trafïŹc.
  • 36. Modulation Schemes ✀ Frequency Shift Keying (FSK) ✀ Cheap digital radios, Bluetooth. ✀ Amplitude Shift Keying (ASK, OOK) ✀ Car remotes, garage door openers. ✀ Phase Shift Keying (PSK) ✀ WiïŹ, ZigBee ✀ Complicated variations of each.
  • 37. Frequency Shift Keying ✀ Symbol Rate: Integer or ïŹ‚oating? ✀ Frequency: Integer or fractional? ✀ SYNC: ConïŹgurable? Repurposed as the address? ✀ Deviation: Space between highest and lowest symbol. ✀ Encoding: ✀ 2FSK: Low frequency is zero, high frequency is 1. ✀ 4FSK: +1, +1/3, -1/3, -1
  • 38. Getting a radio board. ✀ Chips are difïŹcult to use directly. ✀ QFN or BGA chip packages. ✀ Radio layout requires a custom board. ✀ Modules are available with radio and analog chain. ✀ Often lack an MCU, so use a GoodFET. ✀ Commercial boards are often useful. ✀ GirlTech IMME, Next Hope Badge
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Configuring the Radio ✀ All digital radios are conïŹgured by Special Function Registers (SFR). ✀ Register settings can come from multiple sources: ✀ SmartRF Studio conïŹguring TI/Chipcon radios. ✀ Datasheets ✀ Ask Ossmann
  • 53.
  • 54.
  • 55. ✀ RF Parameters ✀ Register Addresses ✀ Register Values
  • 56. Always bring it back to Python
  • 57. GoodFET Radio Architecture ✀ Firmware in C, client in Python. ✀ Py2Exe port for Win32. ✀ Only tested on the Chinese build. ✀ Firmware is trimmed to support only the needed drivers. ✀ New drivers can be written in pure-Python. ✀ Port functions to C as needed.
  • 58. Turning Point Clicker ✀ Classroom remote control. ✀ Attendance, Quizzing ✀ Nordic nRF24E1G ✀ 8051 MCU ✀ 2.4GHz Radio ✀ External Flash
  • 59.
  • 60.
  • 61.
  • 63. Dumping Firmware ✀ Chips ✀ nRF24E1G -- 8051 MCU + nRF2401 Radio ✀ 24C32 Boot Rom ✀ Documentation ✀ Datasheets, Reference Design
  • 64. nRF24E1 ✀ 8051 Microcontroller ✀ More popular than ARM and X86. ✀ Internal nRF2401 Radio ✀ 1Mbps GFSK Radio ✀ 2.4 to 2.5 GHz, 1MHz Channel Spacing ✀ No internal Flash. Boots from external EEPROM. ✀ No promiscuous mode. (The hack comes later.)
  • 66. nRF24E1 Firmware in IDA ✀ ``goodfet.spi25c dump clicker.hex’’ ✀ Copy all but ïŹrst 7 bytes to clicker.bin. ✀ Load clicker.bin to CODE memory at 0x0000.
  • 67. Just 3kB of Code
  • 68. nRF24E1 Internal Arrangement ✀ 8051 MCU ✀ Internal SPI Bus ✀ RADIO register #0x80
  • 69. Useful Registers ✀ SPI_DATA, SPICLK, SPI_CNTRL, EXIF ✀ P1 LED Port ✀ P0.0 SPI EEPROM Slave Select ✀ RADIO #0x80 ✀ RADIO.3 is Radio Slave Select ✀ RADIO.7 is Power Up
  • 70. From Registers to Functions
  • 71. RADIOWRCONFIG ✀ Just a lot of SPIRXTX. ✀ 08 08 00 00 00 00 00 00 00 ✀ (1B) (1C) (1D) ✀ 63 6F ✀ (1A)+1
  • 72. Data Width ADR ADR Width CRC LEN ConïŹg Channel
  • 73. RADIOWRCONFIG ✀ Just a lot of SPIRXTX. ✀ Channel at 0x1A ✀ 08 08 00 00 00 00 00 00 00 ✀ MAC at 0x1B, 0x1C, 0x1D ✀ (1B) (1C) (1D) ✀ 4 bytes of data ✀ 63 6F ✀ 1 byte checksum ✀ (1A)+1
  • 74. Transmission ✀ Function takes one byte of input. ✀ Repeated calls to SPITXRX ✀ (1E) (1F) (20) //Destination MAC Address ✀ (1B) (1C) (1D) //Source MAC Address ✀ (input) //Button Code
  • 75. Destination MAC at 1E, 1F, 20 ✀ MOV 0x1E, #0x12 ✀ DMAC is 0x123456 ✀ MOV 0x1F, #0x34 ✀ Payload length is 4 bytes. ✀ MOV 0x20, #0x56 ✀ One byte checksum.
  • 76. Turning Point Sniffing ✀ 2.441 GHz, 1Mbps ✀ Address: [0x12, 0x34, 0x56] ✀ Payload: ✀ 3 byte MAC ✀ 1 byte Button (ASCII)
  • 77.
  • 78. Load the Registers by GoodFET
  • 79.
  • 80. Microsoft Keyboard ✀ 2.4GHz Nordic, XOR crypto ✀ SYNC varies by unit. ✀ Again, there’s no promiscuous mode. ✀ Initial Exploit in Keykeriki 2.0 ✀ Max Moser and Thorsten Schröder ✀ Amiccom A7125, nRF24L01+
  • 81. Holy crap that’s bad crypto!
  • 82. Promiscuity is a Citizen’s Duty ✀ If the crypto is so bad, why is it hard to sniff? ✀ SYNC ïŹeld is unique to the unit. ✀ Receiver must know the SYNC to receive a packet. ✀ Two solutions: ✀ 1) Search raw radio trafïŹc for Preamble. (Keykeriki) ✀ 2) Use the preamble as if it were a SYNC. (GoodFET)
  • 83. Schröder and Moser’s Solution ✀ A7125 samples raw bits at 2Mbps. ✀ ARM CPU looks for Preamble. ✀ When the MAC is found, ✀ Load nRF24L01+ to sniff. ✀ Dump to PC for interpretation. ✀ Can it be cheaper?
  • 84. GoodFET Autotune ✀ Reduce MAC length to two bytes. ✀ Disable checksums. ✀ Set MAC to 0x0055 or 0x00AA. ✀ Count occurrences of 5-byte sequences: ✀ Might by shifted off by a bit. ✀ Filter out noise.
  • 87.
  • 88.
  • 90. Sidebar ✀ Somehow we have time left. ✀ Let’s not waste it.