symbolic execution
play

Symbolic Execution Mathy Vanhoef @vanhoefm HITB DXB 2018, Dubai, 27 - PowerPoint PPT Presentation

Rooting Routers Using Symbolic Execution Mathy Vanhoef @vanhoefm HITB DXB 2018, Dubai, 27 November 2018 Overview Symbolic Execution 4-way handshake Handling Crypto Results 2 Overview Symbolic Execution 4-way handshake Handling Crypto


  1. Rooting Routers Using Symbolic Execution Mathy Vanhoef — @vanhoefm HITB DXB 2018, Dubai, 27 November 2018

  2. Overview Symbolic Execution 4-way handshake Handling Crypto Results 2

  3. Overview Symbolic Execution 4-way handshake Handling Crypto Results 3

  4. Symbolic Execution Mark data as symbolic void recv(data, len) { Symbolic branch if (data[0] != 1) return if (data[1] != len) return int num = len/data[2] ... } 4

  5. Symbolic Execution data[0] != 1 data[0] == 1 void recv(data, len) { void recv(data, len) { if (data[0] != 1) if (data[0] != 1) return return if (data[1] != len) if (data[1] != len) return return int num = len/data[2] int num = len/data[2] ... ... } } 5

  6. Symbolic Execution PC = Path data[0] != 1 data[0] == 1 Constraint Continue execution: if (data[1] != len) 6

  7. Symbolic Execution data[0] != 1 data[0] == 1 && data[0] == 1 && data[1] != len data[1] == len Continue execution 7

  8. Symbolic Execution data[0] == 1 && data[1] == len void recv(data, len) { if (data[0] != 1) Yes! Bug detected! return if (data[1] != len) return Can data[2] equal zero int num = len/data[2] under the current PC? ... 8

  9. Implementations We build upon KLEE › Works on LLVM bytecode › Actively maintained Practical limitations: › 𝑞𝑏𝑢ℎ𝑡 = 2 |𝑗𝑔−𝑡𝑢𝑏𝑢𝑓𝑛𝑓𝑜𝑢𝑡| › Infinite-length paths › SMT query complexity 9

  10. Overview Symbolic Execution 4-way handshake Handling Crypto Results 10

  11. Motivating Example Mark data as symbolic void recv(data, len) { Summarize crypto algo. plain = decrypt(data, len) (time consuming) if (plain == NULL) return Analyze crypto algo. if (plain[0] == COMMAND) (time consuming) process_command(plain) else Won’t reach this function! ... } 11

  12. Efficiently handling decryption? Decrypted output = fresh symbolic variable 12

  13. Example Mark data as symbolic void recv(data, len) { Create fresh plain = decrypt(data, len) symbolic variable if (plain == NULL) return if (plain[0] == COMMAND) Normal analysis process_command(plain) else  Can now analyze code ... that parses decrypted data } 13

  14. Other than handling decryption Handling hash functions › Output = fresh symbolic variable › Also works for HMACs (Message Authentication Codes) Tracking use of crypto primitives? › Record relationship between input & output › = Treat fresh variable as information flow taint 14

  15. Detecting Crypto Misuse Timing side-channels › ∀(𝑞𝑏𝑢ℎ𝑡) : all bytes of MAC in path constraint? › If not: comparison exits on first byte difference Decryption oracles › Behavior depends on unauth. decrypted data › Decrypt data is in path constraint, but not in MAC 15

  16. Overview Symbolic Execution 4-way handshake Handling Crypto Results 16

  17. The 4-way handshake Used to connect to any protected Wi-Fi network Negotiates fresh PTK: Mutual authentication pairwise transient key 17

  18. 4-way handshake (simplified) 18

  19. 4-way handshake (simplified) 19

  20. 4-way handshake (simplified) PTK = Combine(shared secret, ANonce, SNonce) 20

  21. 4-way handshake (simplified) 21

  22. 4-way handshake (simplified) 22

  23. 4-way handshake (simplified) Encrypted with PTK 23

  24. 4-way handshake (simplified) 24

  25. 4-way handshake (simplified) 25

  26. 4-way handshake (simplified) Authenticated with a MAC 26

  27. We focus on the client Symbolic execution of Intel’s iwd deamon wpa_supplicant kernel driver How to get these working under KLEE? 27

  28. Intel’s iwd Avoid running full program under KLEE › Would need to model Wi-Fi stack symbolically Our approach › iwd contains unit test for the 4-way handshake › Reuse initialization code of unit test! › Symbolically execute only receive function 28

  29. wpa_supplicant Unit test uses virtual Wi-Fi interface › Would again need to simulate Wi- Fi stack… Alternative approach: › Write unit test that isolates 4-way handshake like iwd › Then symbolically execute receive function! › Need to modify code of wpa_supplicant (non-trivial) 29

  30. MediaTek’s Driver No unit tests & it’s a Linux driver › Symbolically executing the Linux kernel?! Inspired by previous cases › Write unit test & simulate used kernel functions in userspace › Verify that code is correctly simulated in userspace › Again symbolically execute receive function! 30

  31. Not all our unit tests have clean code https://github.com/vanhoefm/woot2018 31

  32. Overview Symbolic Execution 4-way handshake Handling Crypto Results 32

  33. Discovered Bugs I Timing side-channels › Authenticity tag not checked in constant time › MediaTek and iwd are vulnerable Denial-of-service in iwd › Caused by integer underflow › Leads to huge malloc that fails 33

  34. Discovered Bugs II Buffer overflow in MediaTek kernel module › Occurs when copying the group key › Remote code execution (details follow) Flawed AES unwrap crypto primitive › Also in MediaTek’s kernel driver › Manually discovered 34

  35. Decryption oracle in wpa_supplicant Decryption oracle: › Authenticity of Msg3 not checked › But decrypts and processes data  Decrypt group key in Msg3 (details follow) 35

  36. Rooting Routers: Buffer overflow in MediaTek kernel module 36

  37. MediaTek buffer overflow preconditions I Triggered when the client processes Msg3 › Adversary needs password of network › Examples: Wi-Fi at conferences, hotels, etc. 37

  38. MediaTek buffer overflow preconditions II Which clients use the MediaTek driver? › Not part of Linux kernel source tree › Used in repeater modes of routers Our target: › RT-AC51U running Padavan firmware › Original firmware has no WPA2 repeater 38

  39. Popularity of Padavan firmware 39

  40. Popularity of Padavan firmware We exploit this version 40

  41. The vulnerable code (simplified) void RMTPParseEapolKeyData(pKeyData, KeyDataLen, MsgType) { UCHAR GTK[MAX_LEN_GTK]; if (MsgType == PAIR_MSG3 || MsgType == GROUP_MSG_1) { PKDE_HDR *pKDE = find_tlv(pKeyData, KeyDataLen, WPA2GTK); GTK_KDE *pKdeGtk = (GTK_KDE*)pKDE->octet; UCHAR GTKLEN = pKDE->Len – 6; NdisMoveMemory(GTK, pKdeGtk->GTK, GTKLEN); } APCliInstallSharedKey(GTK, GTKLEN); } 41

  42. The vulnerable code (simplified) void RMTPParseEapolKeyData(pKeyData, KeyDataLen, MsgType) { UCHAR GTK[MAX_LEN_GTK]; if (MsgType == PAIR_MSG3 || MsgType == GROUP_MSG_1) { PKDE_HDR *pKDE = find_tlv(pKeyData, KeyDataLen, WPA2GTK); GTK_KDE *pKdeGtk = (GTK_KDE*)pKDE->octet; UCHAR GTKLEN = pKDE->Len – 6; NdisMoveMemory(GTK, pKdeGtk->GTK, GTKLEN); } APCliInstallSharedKey(GTK, GTKLEN); } 42

  43. The vulnerable code (simplified) void RMTPParseEapolKeyData(pKeyData, KeyDataLen, MsgType) { UCHAR GTK[MAX_LEN_GTK]; if (MsgType == PAIR_MSG3 || MsgType == GROUP_MSG_1) { Len controlled by attacker PKDE_HDR *pKDE = find_tlv(pKeyData, KeyDataLen, WPA2GTK); GTK_KDE *pKdeGtk = (GTK_KDE*)pKDE->octet; UCHAR GTKLEN = pKDE->Len – 6; NdisMoveMemory(GTK, pKdeGtk->GTK, GTKLEN); } Destination buffer 32 bytes d APCliInstallSharedKey(GTK, GTKLEN); } 43

  44. Main exploitation steps • Code execution in kernel • Obtain a process context • Inject shellcode in process • Run injected shellcode 44

  45. Main exploitation steps • Code execution in kernel • Obtain a process context • Inject shellcode in process • Run injected shellcode 45

  46. Gaining kernel code execution How to control return address & where to return? › Kernel doesn’t use stack canaries › Kernel stack has no address randomization › And the kernel stack is executable Return to shellcode on stack & done? 46

  47. Gaining kernel code execution How to control return address & where to return? › Kernel doesn’t use stack canaries › Kernel stack has no address randomization › And the kernel stack is executable Return to shellcode on stack & done? Nope… our shellcode crashes 47

  48. Problem: cache incoherency on MIPS Memory … old stack data … Data cache … old stack data … 48

  49. Problem: cache incoherency on MIPS Memory … old stack data … Fetch Data cache Instruction cache … … shellcode <no cached entry> … … 49

  50. Problem: cache incoherency on MIPS Memory … old stack data … Fetch Data cache Instruction cache … … shellcode old stack data … … 50

  51. Solution: flush cache after write Memory … old stack data … Flush Data cache Instruction cache … … shellcode <no cached entry> … … 51

  52. Solution: flush cache after write Memory … shellcode … Flush Fetch Data cache Instruction cache … … shellcode <no cached entry> … … 52

  53. Solution: flush cache after write Memory … shellcode … Flush Fetch Data cache Instruction cache … … shellcode shellcode … … 53

  54. How to flush the cache? Execute kernel function to flush cache › Rely on Return Oriented Programming (ROP) › Use mipsrop tool of Craig Heffner  Building ROP chain is tedious but doable 54

  55. Main exploitation steps • Code execution in kernel • Obtain a process context • Inject shellcode in process • Run injected shellcode 55

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend