luis ringzero net luis miras what i m not covering what i
play

luis@ringzero.net Luis Miras What Im Not Covering What I Will Be - PDF document

luis@ringzero.net Luis Miras What Im Not Covering What I Will Be Covering Attack Passive (Sniffing) authentication data sensitive data Active (Injection) Denial of Service Execution of arbitrary commands RF


  1. luis@ringzero.net Luis Miras

  2. What I’m Not Covering

  3. What I Will Be Covering

  4. Attack • Passive (Sniffing) – authentication data – sensitive data • Active (Injection) – Denial of Service – Execution of arbitrary commands

  5. RF • RF design is hard, not needed. • Scanners are not needed. • Devices come with TX and RX circuits. (use them) • Think of TX and RX circuits as a network socket.

  6. Let’s get HIDphy!!

  7. HID – human interface device • Keyboard – HID codes similar to ps/2 scan codes • Mice – Relative movements and buttons – Positional movement and buttons

  8. Device Research

  9. Device Internals

  10. Device Reversing

  11. Communication • One way traffic (replay attacks!) – except kb • No standard data protocol • Varied RF protocols and frequencies. – 27 Mhz – 900 Mhz – 2.4 Ghz

  12. 0111110 1010 1110 0110 0100 0111110 1010 1110 0110 0100

  13. 0111110 1010 1110 0110 0100 0111110 1010 1110 0110 0100

  14. Reversing the protocol • One way messages must include – Authentication data (serial number) – Data • Tap at the input to the TX Chip – No noise or errors • Tap at the output of RX to verify and build the sniffer.

  15. Clock Clock Clock Clock Sync Sync Sync Sync

  16. Data Data Data Data

  17. Reversing the Protocol Page Down 0111110 1010 1110 0110 0100 1001 0101 0010 1000001 Page Up 0111110 1010 1110 0110 0100 1101 0101 0110 1000001 “Hide” 0111110 1010 1110 0110 0100 1011 0101 1010 1000001

  18. Reversing the Protocol Page Down 0111110 0111110 1010 1110 0110 0100 1001 0101 0010 1000001 1000001 Page Up 0111110 0111110 1010 1110 0110 0100 1101 0101 0110 1000001 1000001 “Hide” 0111110 0111110 1010 1110 0110 0100 1011 0101 1010 1000001 1000001

  19. Reversing the Protocol Page Down 1010 1110 0110 0100 1001 0101 0010 Page Up 1010 1110 0110 0100 1101 0101 0110 “Hide” 1010 1110 0110 0100 1011 0101 1010

  20. Reversing the Protocol Page Down 1010 1110 0110 0100 1010 1110 0110 0100 1001 0101 0101 0010 Page Up 1010 1110 0110 0100 1010 1110 0110 0100 1101 0101 0101 0110 “Hide” 1010 1110 0110 0100 1010 1110 0110 0100 1011 0101 0101 1010

  21. Reversing the Protocol Page Down 1010 1110 0110 0100 1001 1001 0101 0010 0010 Page Up 1010 1110 0110 0100 1101 1101 0101 0110 0110 “Hide” 1010 1110 0110 0100 1011 1011 0101 1010 1010

  22. Reversing the Protocol header serial data serial data footer 0111110 xxxx xxxx xxxx xxxx xxxx xxxx xxxx 01001

  23. Attacks

  24. BYOM (bring your own MCU) • Ideally the original MCU would be reprogrammed – Most are OTP (One time programmable) – Can’t read them, security fuse blown • Our own MCUs are needed

  25. Sniffing at the chiplevel

  26. Injecting at the chiplevel

  27. Passive attacks • Needed to acquire authentication data • Sensitive data from keyboards (passwords) • Mouse data not very useful

  28. – Keyboards (including presenters) Attacks are HID type dependent Active attacks – Mice •

  29. + ‘R’ == (: Active Keyboard Attacks

  30. While at the cmd … Echo data to a bat file Run the bat file

  31. Active Mouse Attacks What can be done by being able to inject mouse movement and clicks? • Being able to see the screen. (Attacking a live presentation) • Blind

  32. Accessibility for the Attacker

  33. Mouse movement scripting No visual feedback. Educated guessing Blind Attacks • • •

  34. Getting Feedback • Attempt to connect to controlled webserver • Check logs • Readjust and reattack

  35. Microcontrollers

  36. More MCU uses • Custom bit stream sniffer/recorder/iterface • Custom bit generator driven by software

  37. Software controlled bit generation Scripting interface Future Work Keyboards • • •

  38. Summary • Find FCC ID info • Tap into data path. • Reverse the protocol • Inject/Sniff data using customized MCUs • Client enforced security is still client enforced security

  39. luis@ringzero.net Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend