SLIDE 1 FROM CHINA WITH LOVE
by Oleg Kupreev & Nikita Tarakanov
SLIDE 2
WHO IS OLEG KUPREEV?
v Russian Security Researcher v Hardware researching v Software researching v Reverse engineering v Exploit development
SLIDE 3
WHO IS NIKITA TARAKANOV?
v Independent Russian Security Researcher v Aka Vulnerability Assassin v Aka Crazy Wild Russian v Aka Stars Alinger v Nice dude J
SLIDE 4
AGENDA
v Hardware overview v Software overview v Infection ideas v Pwning ideas v Conclusion v Q&A
SLIDE 5
HARDWARE
v Many Mobile Partners (Beeline, Megafon, MTS, T-Mobile, Vodafone) ¡users in different countries v One modem vendor - HUAWEI v One SOC vendor – Qualcomm
SLIDE 6
3G MODEMS
SLIDE 7
MORE 3G MODEMS
SLIDE 8
4G LTE MODEMS
SLIDE 9
VENDOR SOFTWARE
v Huawei Dashboard Tool for ISO dumping and executable dashboard generation v Qualcomm QPST,QXDM,QMAT are used for all kind of baseband reverse engineering
SLIDE 10
HUAWEI TOOL
SLIDE 11
HUAWEI_TOOL.AU3
SLIDE 12
DASHBOARD UPDATABLE!
SLIDE 13
UNLOCK LOG
SLIDE 14
QUALCOMM INFO
SLIDE 15
HARDWARE SUMMARY
Modem Network Qualcomm SOC CD-ROM capacity E1550 2G/3G MSM6246 64MB E171 2G/3G MSM6290 128MB E173 2G/3G MSM6290 128MB E352 2G/3G MSM6290 128MB E392 2G/3G/4G LTE MDM9600 256MB E3276 (M150) 2G/3G/4G LTE MDM9225 128MB
SLIDE 16
HOMEBREW SOFT
v Different Unlockers (DC-Unlocker, Huawei Modem Unlocker 5.8.1 by Bojs, Huawei Calculator, Huawei NCK Calc) v QcomInfoReader v Custom dashboards v Custom baseband firmwares
SLIDE 17
MOBILE PARTNER CD
Dialing software and modem drivers are stored at hybrid CD image (ISO9660/HFS+) and contains: v Mobile Partner (lots of misc stuff) and drivers for Windows v Mobile Partner installation script for Linux v Mobile Partner app for OS X v Windows + Linux + OS X – sweet targets to rootkit
SLIDE 18
WINDOWS PART 1
SLIDE 19
WINDOWS PART 2
SLIDE 20
SYSCONFIG.DAT
SLIDE 21
LINUX
SLIDE 22
LINUX INSTALL PART1
SLIDE 23
LINUX INSTALL PART 2
SLIDE 24
MAC OSX
SLIDE 25
WTF IS DASHBOARD?
Mobile Partner application stored on Huawei modem CD image ¡in modem flash memory: v Modem drivers v Dialing application with voice calling features v Mobile Partner additional applications (multifon, trava) v And some CONFIG FILES
SLIDE 26
BUNCH OF DRIVERS
SLIDE 27
BUNCH OF PLUGINS
SLIDE 28
PLUGINS
SLIDE 29
MOBILE PROFILE
SLIDE 30
NICE PROFILE TO INFECT
SLIDE 31
CUSTOM MOBILE PROFILE
SLIDE 32
PROCESSES
SLIDE 33
MODEM SERVICES
SLIDE 34
OUC.EXE OUCH!!!
SLIDE 35
KERNEL PART
v No need in live debugging v There are lot of code that helps you v Debug prints in production code v That Rulezzz
SLIDE 36
MAY BE DEBUG?
SLIDE 37
DEBUGLEVEL++
SLIDE 38
VENDOR SOURCE CODE
v Driver source code leaked http://en.pudn.com/downloads181/sourcecode/comm/usb/ detail844652_en.html
SLIDE 39
MAIN RESEARCH IDEAS
INFECT AS MUCH AS POSSIBLE!
SLIDE 40 INFECTION VECTORS
v BOOTKIT for USB-CD & USB-SD boot via MBR v CD autorun v DNS poisoning via dashboard config infection v Auto update by infecting XML configuration v WiFi autoconnect with presets v Voice calling spyware $$$ v GPS & P2P in future releases?
SLIDE 41
BOOTKIT
v SD card MBR infection is standard and simple v CD image updated by dashboard flasher v Force BSOD/kernel panic/reboot v Profit!
SLIDE 42
DNS POISONING
SLIDE 43
DNS POISONING RAW XML
SLIDE 44
ANTIVIRUS
SLIDE 45
VIRUS_INSTALL=1
SLIDE 46
AND EVEN WI-FI PROFILE
SLIDE 47
BASEBAND RESEARCH
v Qualcomm Baseband fuzzing for vulnerabilities v EEPROM patching v JTAG RVERSE KIT (Medusa Box)
SLIDE 48
NVRAM ¡(EEPROM)
SLIDE 49
FUZZING = KILLING
SLIDE 50
CENTRALIZED UPDATES
SLIDE 51
CONCLUSION
v Software part is very insecure v Hardware part is also insecure(research is in progress) v All security of 3G/4G Huawei modems hangs on security of one Web-site, that works on IIS 6.0. Call/Ask Charlie for 0day exploit ;)
SLIDE 52
THE END?