hacking of smart tv with 0 day
play

Hacking of smart TV with 0-day Hack in paris 2017 Security Analysis - PowerPoint PPT Presentation

Are you watching TV now? Is it real?: Hacking of smart TV with 0-day Hack in paris 2017 Security Analysis aNd Evaluation(SANE) Lab. Jongho Lee, Mingeun Kim*, Seungjoo Kim** hellsonic@korea.ac.kr, pr0v3rbs@kaist.ac.kr, skim71@korea.ac.kr CIST


  1. Are you watching TV now? Is it real?: Hacking of smart TV with 0-day Hack in paris 2017 Security Analysis aNd Evaluation(SANE) Lab. Jongho Lee, Mingeun Kim*, Seungjoo Kim** hellsonic@korea.ac.kr, pr0v3rbs@kaist.ac.kr, skim71@korea.ac.kr CIST (Center for Information Security Technologies), Korea University *KAIST **Corresponding Author

  2. Contents 1. Project introduction 2. webOS structure and analysis 3. webOS smart TV Vulnerability analysis 4. webOS smart TV Hacking Scenario & Demonstration 2

  3. 1. Project introduction Project topics ▪

  4. 1. Project introduction Project topics 4

  5. 1. Project introduction Project topics “Making hacking scenarios and demonstrate it, for smart TV through analysis of webOS vulnerability. ” Malware Install Hack Hacker er er Kernel Vulnerability App Vulnerability webOS based Smart TV Network Vulnerability … Invasion of Privacy Pirate Broadcasting 5

  6. 2. webOS structure and analysis webOSHistory ▪ Web SW Platform VS Native SW Platform ▪ webOSfeatures ▪ webOSSmart TV Emulator analysis ▪ webOSSmart TV structure ▪

  7. 2. webOS structure and analysis webOS History 2008 2009 2010 Presentation of Palm Pre based on • Selected as Palm's next webOS (CES 2009) generation OS Released Palm Pre • Competitor launch (Motorola DROID, • iPhone 3GS) HP take over Palm • Launched "low-cost smartphone" Palm • Attempt to mount webOS on • Pixi HP products 2011 2012 Released Touch Pad • HP WebOS external sales • 2013 announcement Open webOS project • announcement Rubinstein resigned two days • before webOS Project It is being developed as an • announcement operating system for mobile and smart TV and Internet of things 7

  8. 2. webOS structure and analysis Web SW Platform VS Native SW Platform Web SW Platform Native SW Platform Firefox OS Chrome OS webOS Apple iOS Android Ubuntu OS C , C++ , Java HTML , JavaScript Relatively fast Relatively slow • • Device-specific functions to increase Application can be developed based on web • • efficiency standards Application and development dependency Web engine alleviates platform dependencies • • affected by SW and HW platforms High upgrade flexibility • Difficulty of support multi-platform • Convenience of code portability • 8

  9. 2. webOS structure and analysis webOS features webOS Features Development environment based on Enyo Web App Framework Application is runs in browser that uses Increase of system HTML, JavaScript, HTTP, etc. scalability (Embedded-optimized Luna Bus system) Maximize the use of JavaScript Convenient Dependency Code (Node.js service framework) Development Mitigation Portability 9

  10. 2. webOS structure and analysis webOS features Luna Bus - Used to communicate apps and services. - Built-in apps that use services that restrict access due to security problems use Private Bus. - The 3rd party application registers with the public bus to prevent access to the internal API that use the private bus. webOS Features 10

  11. 2. webOS structure and analysis webOS features webOS structure /usr/sbin/sam ▪ Processes that run non-web-based applications /usr/bin/WebAppMgr ▪ Chrome-based QTWebEngine program that runs webOS app /usr/sbin/appinstalld ▪ Service process that creates and manages files when installing Application /usr/sbin/activitymanager ▪ A service process that manages all activities(apps, services, networks, etc.) running on the device /usr/palm/nodejs/unified_service_server.js ▪ Nodejs local server to run the webOS app 11

  12. 2. webOS structure and analysis webOS smart TV Emulator analysis Emulator analysis 12

  13. 2. webOS structure and analysis webOS smart TV Emulator analysis Why Analyze Emulator? ▪ Has a similar environment with real TV ▪ Was provided for application testing Node.js sam WebAppMgr appinstalld activitymanager service ▪ Rooting easily (maybe?) ▪ We can attack, even virtual disk! ▪ We can predict attack vectors for real TV 13

  14. 2. webOS structure and analysis webOS smart TV Emulator analysis Partitions of webOS Emulator ▪ boot ▪ / ▪ LUKS Encrypt ▪ appstore ▪ The mount order is partition 1 through 4. ▪ Partition 2 has a script that decrypts Partition 3. ▪ On encrypted Partition 3 , there will be a scripts to execute the important daemon. 14

  15. 2. webOS structure and analysis webOS smart TV Emulator analysis Partition 2 configuration file analysis Part rtit itio ion 3 decr cryptio ion pro rogram ▪ Analysis of service configuration file executed at emulator boot time ▪ /home/root/openV ▪ Partition 3 decryption program found. 15

  16. 2. webOS structure and analysis webOS smart TV Emulator analysis Partitions of webOS Emulator ▪ Partition 3 decrypted with the decryption key found by strace 16

  17. 2. webOS structure and analysis webOS smart TV Emulator analysis Modify the dropbear option inside Partition 3 Modify the dropbear option in 12.sh exec /usr/sbin/dropbear – w – g -B -F -d /var/lib/dropbear/dropbear_dss_host_key -r /var/lib/dropbear/dropbear_rsa_host_key exec /usr/sbin/dropbear – B – F – d /var/lib/dropbear/dropbear_dss_host_key -r /var/lib/dropbear/dropbear_rsa_host_key 17

  18. 2. webOS structure and analysis webOS smart TV Emulator analysis Emulator root shell root shell 18

  19. 2. webOS structure and analysis webOS smart TV structure Application Sandbox Each application was sandboxed. webOS Application / /var/palm/jail/{app} - /bin - /boot - /bin - /var/palm/jail - /dev - /dev - /etc - /etc - /home - /home - /lib - /lib - /media - /opt - /mnt - /proc - /opt - /run - /proc - /sbin - /sys - /sys - /tmp - /tmp - /usr - /usr - /var - /var - … 19

  20. 2. webOS structure and analysis webOS smart TV structure Other difference ▪ Remote Control ▪ Different binary ▪ Different work process ▪ ssh daemon ▪ Openssh ▪ FrameBuffer ▪ Can’t access with root privilege ▪ Architecture ▪ ARM 20

  21. 3. webOS smart TV Vulnerability analysis Attack vector ▪ Vulnerability ▪

  22. 3. webOS smart TV Vulnerability analysis Attack vector Key Process Daemon receiving Helps to run non-web-based sam appinstalld application install command applications. Daemons for Bluetooth server for ls-hubd bsa_server communication between communication applications with remote control HTTP protocol as a daemon Daemon that sends and receives upnpd ss.apiadapter for plug & play communication commands when remote control Pass the command through of mobile phone is connected 22

  23. 3. webOS smart TV Vulnerability analysis Attack vector Analysis of input vector as hacking path Commands in Luna protocol for application communication ls-hubd  Vulnerability due to xml tampering. (BOF, Command Injection) Modify command received from remote control ss.apiadapter  Replay attack, hidden service? Ability to modulate XML, HTTP header information when connecting to upnpd other devices with smartphone  Possible memory vulnerability(BOF) Page modifiable by user creating application. WebAppMgr / Running applications on the Node.js server. Nodejs server  Vulnerability in Chrome browser possible  Node.js server vulnerability attack target The remote control modulates the transmitted Bluetooth signal and attacks the running server bsa_server  Possible replay attack vulnerability  Possible BOF memory corruption vulnerability 23

  24. 3. webOS smart TV Vulnerability analysis Attack vector Analysis of input vector as hacking path Commands in Luna protocol for application communication ls-hubd  Vulnerability due to xml tampering. (BOF, Command Injection) ▪ Process luna protocol data centrally ▪ Transfers commands to a system or other apps ▪ Maybe has a vulnerabilities about… ▪ Command injection 24

  25. 3. webOS smart TV Vulnerability analysis Attack vector Analysis of input vector as hacking path Modify command received from remote control ss.apiadapter  Replay attack ▪ Communicate with mobile remote control ▪ Receives general TV functions (WSS) ▪ Receives touchpad inputs (WS) ▪ Maybe has a vulnerabilities about… ▪ Command injection ▪ Replay attack by capturing the packet 25

  26. 3. webOS smart TV Vulnerability analysis Attack vector Analysis of input vector as hacking path Ability to modulate XML, HTTP header information when connecting to upnpd other devices with smartphone  BOF, CSRF, command injection ▪ Broadcasts to announce the presence of TV ▪ Sends and receives upnp packets ▪ Maybe has a vulnerabilities about… ▪ CSRF ▪ Command Injection 26

  27. 3. webOS smart TV Vulnerability analysis Attack vector Analysis of input vector as hacking path Page modifiable by user creating application. WebAppMgr / Running applications on the Node.js server. Nodejs server  Vulnerability in Chrome browser possible  Node.js server vulnerability attack target ▪ Runs the webOS application ▪ Uses QtWebEngine based on chrome ▪ Maybe has a vulnerabilities about… ▪ Chrome ▪ Nodejs 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend