SDIO: a new peripheral attack vector
Research Project 2
Thom Does thom.does@os3.nl Dana Geist dana.geist@os3.nl
SDIO: a new peripheral attack vector Research Project 2 Thom Does - - PowerPoint PPT Presentation
SDIO: a new peripheral attack vector Research Project 2 Thom Does Dana Geist thom.does@os3.nl dana.geist@os3.nl Introduction Secure Digital Input Output (SDIO) Adds I/O functions to SD PDAs, tablets, laptops SDIO
Thom Does thom.does@os3.nl Dana Geist dana.geist@os3.nl
○ Adds I/O functions to SD ○ PDAs, tablets, laptops
○ Inject keystrokes ○ Rogue DHCP
BadUSB-like attacks
2
Could SDIO be used as a new attack vector on SDIO-aware hosts?
3
○ Only simplified version available without license
○ Several microSD cards were tested ○ Reversed engineered firmware ○ Developed novel applications for microcontroller
4
Step 1
5
Step 1
6
Step 1
7
Step 2
8
Step 3
9
10
SPI SD Wide variety of applications Used by SD cards and readers Well-known “open” protocol License required Simple (one data line) More complex (commands, data lines) Supported natively by many MCUs Special purpose MCUs or bitbanging Fallback protocol for SD Default for SD
11
○ Formats ○ Initialization ○ Transfer modes
○ The card reader is the Master ○ The SDIO card is the slave
12
specific interfaces
○ Firmware ○ Drivers
○ WLAN, bluetooth, GPS
○ DHCP-client, command injection, navigation system
13
14
15
16
17
18
If host supports SPI
to implement protocol
the development
analyze the protocol
19
If host supports SD only
support the protocol
bitbanging could be cumbersome
software
○ Expensive ○ Steep learning curve ○ Requires business logic programming
20
○ Firmware embedded in SD card ○ Firmware loaded to device by the driver
21
SDIO attack BadUSB Hosts Laptops, tablets, PDAs Desktops, laptops, printers, routers Devices Limited vendors and applications Many vendors and applications Stealthiness Embedded in port Protruding from port Ease of exploitation No “off-the-shelf” products USB Armory, Rubber Ducky, known vulnerable firmware
22
○ Time consuming ○ Expensive ○ Not possible to create general purpose malicious firmware
○ Affects SDIO aware hosts only ○ Kernel module needs to be loaded
○ Wide range of attacks possible
23
○ Laptops, phones, tablets, PDAs
○ No protections found
○ SD is more effective than SPI
○ Ease of exploitation ○ Number of vendors / products supporting SDIO ○ Kernel module needs to be loaded
24
Research material:
○ https://www.sdcard.org/downloads/pls/index.html
○ https://www.youtube.com/watch?v=nuruzFqMgIw
○ http://hackaday.com/2013/12/29/hacking-sd-card-flash-memory-controllers/
○ http://www.thinkmind.org/download.php?articleid=icds_2011_4_30_10048 Images:
25