forensic investigation of chinese smartwatches
play

Forensic investigation of Chinese smartwatches Renee Witsenburg - PowerPoint PPT Presentation

Forensic investigation of Chinese smartwatches Renee Witsenburg & Kasper van Brakel 1 A smartwatch is a wristband with sensors. Sensor information from the wristband is send to a mobile telephone. Furthermore, notifications from the


  1. Forensic investigation of Chinese smartwatches Renee Witsenburg & Kasper van Brakel 1

  2. A smartwatch is a wristband with sensors. Sensor information from the wristband is send to a mobile telephone. Furthermore, notifications from the mobile telephone are sent to the wristband. 2

  3. Research questions ● For which purposes are smartwatches used in a business environment? Which connections can ● When smartwatches are used in be made with the a business organisation environ- smartwatch? ment, what potential information ● Which security measures are leakage risks are encoun- in place? ● Which data is stored on the tered? smartwatch? ● Is it possible to tamper with, read or intercept this data? 3

  4. Smartwatches in a business environment 4

  5. Smartwatches in a business environment (1) 5

  6. Watches Amazfit Bip Kingwear KW18 Lemfo LEM8 6

  7. Attack scenarios Lost or theft Bluetooth USB 7

  8. Results ● Basic data retrieval and encryption test 8

  9. Results Major Device Major Minor Name #Blocks Name Path 259 blkext 179 0 mmcblk0 15267840 Whole mmcblk0 disk 7 loop 179 1 mmcblk0p1 1024 boot_para mmcblk0p1 179 2 mmcblk0p2 24576 134 sd recovery mmcblk0p2 179 3 mmcblk0p3 512 135 sd para mmcblk0p3 179 4 mmcblk0p4 20480 179 mmc expdb mmcblk0p4 253 device-mapper 179 31 mmcblk0p31 11859951 userdata mmcblk0p31 Partial output of /proc/partitions 254 zram Partial output ls -la /dev/block/platform/*/by-na Partial output of /proc/devices 9 me

  10. Results Composing the scatter-file Major Minor #Blocks Device Name Start addr Length 179 1 1024 mmclk0p1 boot_para 8000 100000 179 2 24576 mmclk0p2 expd 1800000 108000 179 3 512 mmclk0p3 para 1908000 80000 179 31 11859951 mmclk0p31 userdata 2D3DFBC00 CF000000 10

  11. Results Filling in the values in Flash ● tool Ext4 partitions ● 11

  12. Results Part Start addr End addr SF_boot 00000000 000001F0 BRLYT 00000200 000007F0 Unencrypted ● int_bootloader 00000800 000028C0 Data structure KW18 ● padding 000028D0 00005FF0 ext_bootloader 00006000 0000FB90 padding 0000FBA0 0001FFF0 FILE_01_mtk 00020000 00BE5000 User data 00BE5010 00FFFFF0 12 Overview over the data structure that was identified

  13. Results ● Contact details in the form of vCards. 13

  14. Results Whatsapp ● notifications in plaintext Possibility to ● Simulate a notification 14

  15. Understanding BLE devices Services Characteristics Descriptors Read/write access Request/notification 15

  16. nRF connect Unpair device and connect in mobile app. nRF Connect displays UUID’s of services 16

  17. Results (Amazfit) With nRF Connect it is possible to generate fake notifications (sms, mail, calendar, call) With the MiBand2 tool it is possible to read live data on a Linux device. 17

  18. Discussion ● Only three smartwatches were investigated ● Results Mediatek and BLE ● Countermeasures NCSC 18

  19. Conclusion ● Smartwatches in a business environment - email, agenda notifications and text messages. ● Attack scenarios ● Tamper with, read or intercept with the data 19

  20. Future work Categorize devices on communication protocol or chipset Develop generic tools to test security per protocol or chipset 20

  21. Questions? 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend