all wireless communication stacks are equally broken
play

All wireless communication stacks are equally broken Jiska Classen - PowerPoint PPT Presentation

All wireless communication stacks are equally broken Jiska Classen Secure Mobile Networking Lab - SEEMOO Technische Universitt Darmstadt, Germany A foundation talk??? Wireless communication is fun damentally broken focus: everything in


  1. All wireless communication stacks are equally broken Jiska Classen Secure Mobile Networking Lab - SEEMOO Technische Universität Darmstadt, Germany

  2. A foundation talk??? Wireless communication is fun damentally broken… …focus: everything in a smartphone . Communication range Specification length Wi-Fi LTE Bluetooth NFC Lines of code Higher complexity rises chance of issues with the specification and implementation! 2

  3. Complexity LTE Vendor-specific additions 3

  4. WIRELESS EXPLOITATION NEW Fuzzing Techniques NEW Escalation Targets 4

  5. Layers and Privileges Execution within a component means ● security measures like encryption Up to $1.5m User become ineffective . Messenger Applications Space Zero Click Less interaction / more distance / ● RCE+LPE harder to find / privileged component / higher market demand Daemons / Subsystem Up to $200k → more expensive Privileged Stuff Baseband Attackers hate physical proximity! ● RCE+LPE Driver Up to $100k Hardware Firmware Wi-Fi RCE F�E� ��N�� RCE: Remote Code Execution, LPE: Local Privilege Escalation. 5 Zerodium price list in December 2019, actual prices on the black market might vary.

  6. Advanced Wireless Tooling @ SEEMOO NFCGate Nexmon Qualcomm LTE Project lead: Project lead: Matthias Schulz Project lead: ● ● ● Max Maass Binary patching framework for Arash Asadi ● Broadcom Wi-Fi 2.4 GHz software-defined radio ● InternalBlue Project lead: Jiska ● Broadcom Bluetooth ● OWL / OpenDrop Project lead: Milan Stute ● Open source Apple AirDrop ● implementation Most of our projects are available online! https://github.com/seemoo-lab 6 Hackers gonna hack… Google Project Zero ● InternalBlue was used to ● Honeypots @ Black Hat ● (April 2017, Gal Beniamini) demonstrate the KNOB attack AirDos ● Broadpwn ● on Bluetooth key negotiation (December 2019, Kishan Bagaria) (July 2017, Nitay Artenstein) (August 2019, Daniele Antonioli Quarkslab ● et. al.) (April 2019, Hugues Anguelkov)

  7. Hackers gonna hack... Google Project Zero (April 2017, Gal Beniamini) ● Broadpwn (July 2017, Nitay Artenstein) ● Quarkslab (April 2019, Hugues Anguelkov) ● GREETINGS IF EVERYONE USES OUR TOOLS FOR EXPLOITATION Demonstration of the KNOB attack on ● Bluetooth key negotiation (August 2019, Daniele Antonioli et. al.) Honeypots @ Black Hat WHY NOT DO IT ● AirDos ● OURSELVES? (December 2019, Kishan Bagaria) 7

  8. NEAR FIELD COMMUNICATION 8

  9. NFCGate Wireless signals travel with speed of light, distance bounding is possible. ● NFC applications usually do not check any time constraints. ● Lab project: ● Forward communication of an NFC-based payment system. ○ Vulnerable to relays and even modification of messages in some cases. ○ Solution: ● 3rd parties asked our students to stop testing :) ○ https://github.com/nfcgate/nfcgate (also by SEEMOO) 9

  10. Near Field Communication VISA … … specification compliant fraud \o/ Other 3rd parties continued analyzing NFC security. First Contact - Vulnerabilities in Contactless Payments: https://www.blackhat.com/eu-19/briefings/schedule/index.html#first-contact---vulnerabilities-in-contactless-payments-17454 10

  11. BLUETOOTH CHIP REMOTE CODE EXECUTION Applications Daemons / Subsystem Driver Firmware 11

  12. Code Execution on a Bluetooth Chip Request the encryption keys for any MAC address. ● Specification compliant request: HCI_Link_Key_Request . ○ Impersonate devices, overhear encrypted ○ communication, … → Break Android Smart Lock and similar features! LAST TIME I UPDATED BLUETOOTH IN MY CAR? More possibilities to escalate into other components. ● 12

  13. Exploit Persistence Broadcom/Cypress chips only ● flush queues, connections, etc. upon reset. No full hardware reset. Many operating systems will only ● issue a HCI_Reset command. Flight mode might hard reset ● the chip. Reboot might hard reset the ● chip. (Coexistence behavior sometimes persists…) Turning off your smartphone ● will hard reset the chip. 13

  14. Frankenstein NEW Fuzzing Techniques Emulate Bluetooth firmware with Linux Host the same speed as in hardware for realistic full-stack fuzzing . Pseudo UART Terminal The Linux host can run a full Bluetooth ● stack on a desktop setup. Add an xmit_state hook to the ● Bluetooth firmware function of interest, Snapshot e.g., device scanning, active connection, … Reattach emulated snapshot with Fake IO ● Modem Registers btattach , enter a similar state on the desktop, and start fuzzing. Air Fuzzed Input DEMO! Jan Ruge fuzzed the unfuzzable! 14

  15. Fuzzinating! Jan: Fuzzes early connection states , finds heap overflows in basic packet types. iPhone 11: Can you hear me? I come with Bluetooth 5.1! Me: The connection state can be paired and encrypted, any user or app interaction is valid input, as long as I can get code execution on that chip. … enters a more complicated state for fuzzing … Me: Oh noes, they misconfigured the heap on this one specific evaluation board. Fixing the heap hard-bricked one evaluation board. … porting ~200 handwritten hooks to another evaluation board with correct heap … 15

  16. Fuzz next? Android Linux macOS Fake IO Software- Registers defined radio Fuzzed Input Air Just a roadmap, we didn’t build this yet! Opens way more possibilities than just fuzzing. 16

  17. CHIP LEVEL ESCALATION Applications Daemons / Subsystem Driver Firmware Firmware 17

  18. Coexistence: Escalation within the Chip Bluetooth / Wi-Fi Combo Chip Bluetooth Wi-Fi Coexistence Francesco Gringoli and me worked on this. 18

  19. Coexistence??? Francesco: I guess it’s just a marketing feature. Me: Aww it must be an exploitation feature! … traveling to Italy for eating some gelato … Reality: Hard-coded blacklisting and traffic classes for Bluetooth and Wi-Fi. Tons of patents. NEW Proprietary deluxe! Escalation Targets 19

  20. Almost a Demo :) You can disable Wi-Fi via Bluetooth and Bluetooth via Wi-Fi. ● Sometimes requires manual reboot to get wireless stuff working again. ● Buggy driver panics some older Androids and all up-to-date iPhones . ● Broadcom says six months might be sufficient to fix firmware . ● … but exploitation requires code execution on the Bluetooth or Wi-Fi chip. ● iOS 13 Release Notes panic-full Tested iOS 12.4 (reported end of August), still not fixed in 13.3... 20

  21. ESCALATE ALL THE STACKS Applications Daemons / Subsystem Driver Firmware 21

  22. Attacking Bluetooth Hosts BlueBorne: Various attacks on Android, Windows, Linux, iOS. ● … okay but that was 2017? ● If someone looked into it, it must be secure now! Vulnerability with a logo! IoT gadgets, wireless headphones, fitness trackers, … ● Apple ecosystem: Bluetooth is almost everywhere and always enabled. ● Web Bluetooth : BLE support within various browsers. ● 2020 might bring a couple of BlueBorne like attacks. BlueBorne by Armis https://www.armis.com/blueborne/ 22

  23. The Linux Bluetooth Stack Number of commits in BlueZ: 23% Committer #1 ● 17% Committer #2 ● 15% Committer #3 ● 5% Committer #4 ● The BlueZ Man Group Tim Walter did some fuzzing in the Linux Bluetooth Stack :) 23

  24. The Apple Bluetooth Stack(s) NOT SURE IF HARD TO REVERSE ENGINEER OR JUST REALLY BAD CODE WHY NOT BOTH? Dennis Heinze (@ttdennis) ported InternalBlue to iOS, Davide Toldo (@unixb0y) ported it to macOS. They enjoyed it a lot! 24 Alexander Heinrich (@Sn0wfreeze) supervised by Milan Stute looked into Handoff.

  25. The Android Bluetooth Stack ??? !!! OK?? Because all our chip reversing projects start on Android. 25

  26. Bluetooth for Bluescreens??? :( Sadly I couldn’t find any student who wants to work on this yet. 0% complete But if you are really into pain, consider this as a job offer for a student thesis @ SEEMOO :D 26

  27. LTE* * LONG TERM EXPLOITATION 27

  28. All Assembly is Beautiful! ! P S D n o g a x e H m m o c l a u Q , u o y t o N 28

  29. Simjacker and WIBAttack Purpose of a SIM card: Protect sensitive key material . (??!!) ● SIM cards can be configured remotely by your ● telecommunication provider. … SIM cards including eSIMs … ● Vulnerability Receiving a victim’s location, ○ with a logo! SIM card technology fraud by dialing premium numbers, ○ from A-Z … launch browser. ○ LaF0rge I’m a Telekom business customer, making a call to the ● support hotline takes less than 3 minutes. Phone: 13.9. 2x, 19.9., 21.9., 27.9., 1.10., 17.10. ● Mails: 3x … ● LAUNCH BROWSER Still no answer what is running on my SIM cards. ● https://simjacker.com/ 29

  30. LTEFuzz Highly complex LTE state ● machines. Implementation failures in ● backends and mobile devices. SigOver + alpha CheolJun Park, Mincheol Son https://sites.google.com/view/ltefuzz 30

  31. RESPONSIBLE DISCLOSURE 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend