SlideShare a Scribd company logo
BROADCAST
SIGNAL
INTRUSION
Hacking radio stations
(ɔ) 2023
Gjoko Krstic
• Founder of Zero Science Lab2
• Offensive security research lead at ING
• Member of g00g00tka group
• Cybernetics student ☺
2
AGENDA
• Introduction
• Radio Station Components
• Broadcast Signal Intrusion
• ZSL Method
• Conclusion
• End of Transmission
3
4
Guglielmo Marconi, an Italian inventor and
electrical engineer, is credited with the invention
of the radio in 1894 and demonstrated in 1895.
He continued to develop and improve his system,
and in 1901 he successfully transmitted the first
transatlantic radio signal.
Alexander Graham Bell, an American inventor,
scientist, and teacher of the deaf, is also
considered one of the pioneers of radio
technology. He developed an early version of the
radio, which he called the "photophone," that
used light waves to transmit sound.
BRIEF HISTORY
5
BROADCAST TYPES
STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB
Internet radio, which allows
listeners to stream audio
over the internet.
AM (Amplitude Modulation)
radio, which is the traditional
type of radio broadcasting and
uses variations in the amplitude
(or strength) of a radio wave to
transmit sound.
FM (Frequency Modulation)
radio, which uses variations in
the frequency of a radio wave
to transmit sound. FM radio
generally provides better sound
quality than AM radio.
Satellite radio, which is a
subscription-based service
that uses a network of
satellites to transmit radio
signals.
HD Radio, which is a digital
technology that allows FM
and AM stations to
broadcast additional
channels and data
alongside their traditional
analog signals.
1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT
COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE.
2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO
SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION.
3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS
ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM.
4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT
VIA AN ANTENNA.
5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR.
6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S
THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO
RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE.
7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND
PLAYS THE SOUND VIA SPEAKERS.
6
TYPICAL RADIO COMPONENTS
7
8
9
10
ANALOG DIGITAL
FM TRANSMITTERS
11
12
13
14
15
BROADCAST SIGNAL INTRUSION
Broadcast signal intrusion is the unauthorized alteration
or takeover of a broadcast signal. This can occur on
television or radio broadcasts and can take many forms.
Digital intrusion is more sophisticated and can include
hacking into a station's computer systems to gain
control of the signal, or intercepting and modifying the
signal as it is being transmitted.
16
17
PUBLIC INCIDENTS
18
PUBLIC INCIDENTS
19
PUBLIC INCIDENTS
20
PUBLIC INCIDENTS
21
PUBLIC INCIDENTS
22
PUBLIC INCIDENTS
23
PUBLIC INCIDENTS
24
PUBLIC INCIDENTS
25
PUBLIC INCIDENTS
26
PUBLIC INCIDENTS
27
WHAT IS DAB?
WHAT IS RDS?
DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different
modulation method compared to FM and AM. DAB uses a technique called
COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the
audio signals onto a carrier frequency. DAB also can transmit additional data,
such as station information, song titles and traffic reports, but it uses a different
method to transmit this data, it uses the DAB EPG (Electronic Program Guide)
that allows for the transmission of more advanced information than RDS.
RDS (Radio Data System) is a technology that is primarily used for FM radio, it
allows for the transmission of additional data, such as song titles, station
information, and traffic reports, over FM radio waves.
Case #13 – Adtec Digital
Digital Video Broadcasting (DVB)
Flexible and powerful, it ensures perfect sound
quality and full compatibility with radio
broadcasting standards and can be used
simultaneously for FM and HD, DAB, DRM or
streaming.
29
RADIO PROCESSING
30
INPUT/OUTPUT
Many audio processors and other IoT
devices come with built-in web
interfaces or APIs that allow for
remote management and control, and
software such as "Remote Control"
can be used to access these
interfaces. This can be useful for
adjusting settings, monitoring the
performance of the equipment, and
troubleshooting problems remotely.
VECTORS [BLACKBOX]
• The network-connected device
- Web interface (PHP, CGI, Shell scripts), HTTP
- Telnet: Link&Share terminal server
- ELF32 binaries (Linux/ARM)
- Firmware?
• The software (thick client), Windows 10
- SOUND4 Server.exe (64bit)
- SOUND4 Remote Control.exe (32bit)
- LinkAndShare Transmitter.exe (32bit)
32
INVESTIGATION
• DuckDuckGo, Documentation, OpenAI, YouTube
• Penetration test
-> Manual analysis + scan/map
• Coverage-guided fuzzing
• Source code review
• OSINT + exposure
-> Shodan, BinaryEdge
33
RESULTS
34
RESULTS
• 25 0-days and counting 
• 107 radio stations affected
• No response from the vendor(s) 
• Collab with national CERTs and VINCE (CISA)
• CVEs pending… but we don’t care about that
35
36
FORMAT STRING IN USERNAME ENV
(LinkAndShareTransmitter.exe)
37
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
38
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
39
40
JACKALOPE + WINAFL
SOUND4 Remote Control.exe (vc_s4client.dll)
41
MAIN INTERFACE
SOUND4 Remote Control.exe
42
MAIN INTERFACE
SOUND4 Remote Control.exe
43
44
ADDING USERS
45
COMMUNICATION
46
RDS ENCODER
47
OUTPUTS
48
TELNET
49
TELNET
50
INTERNET
STREAMING
IP CONNECT
NEWS FLASH FROM THE AI
WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E
HACKER TAKE OVER A BROADCAST SIGNAL ?
“If an audio processor is hacked, it is possible that the hacker could
take over the broadcast signal. Depending on the specific device and
the level of access gained by the hacker, they could potentially modify
the audio content, disrupt the transmission, or even gain control over
the entire broadcast system.
However, it's important to note that these kind of hacks are not easy to
carry out and would require a high level of technical knowledge and
skill. Additionally, most IoT devices have some form of security
measures in place to prevent unauthorized access, such as firewalls,
encryption and authentication.”
51
…
if (isset($_POST['username']) && isset($_POST['password'])) {
$ret = -1;
exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server
_check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret);
…
52
FIRMWARE GLIMPSE: WEB GI
(login.php)
VULNERABILITIES!
Privilege Escalation
Cross-Site Request Forgery
Authorization Bypass
Denial of Service
Authentication Bypass
ICMP Flood Attack
Information Disclosure
Command Injection
SQL Injection
Cross-Site Scripting
Directory Traversal
Pre-auth Factory Reset
Stack-based Buffer Overflow
Default Credentials
Hard-coded Credentials
Cleartext Storage and Communication
Vulnerable Libraries/Binaries
Broadcast Signal Hijacking
54
DEMO::RCE
55
JUST ANOTHER SHOUTOUT
• Radio and broadcast signal intrusion is a serious security
concern that can disrupt communications and cause
confusion and panic among the public.
• Security is often overlooked in the radio and
broadcast industry, leaving exposed devices and
components online and vulnerable to attack.
• IoT vendors need to have more awareness about
security and include security in their software
development life cycle (SDLC) pipeline to
prevent vulnerabilities from being introduced in
their products.
THANK YOU
HEK.SI - 2023
@zeroscience
www.zeroscience.mk
56
57

More Related Content

What's hot (20)

20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02
Computer Science Club
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Ramadhi Irawan
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptography
NithyasriA2
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
Neha Agarwal
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Samy Shehata
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
How to process Flat Files documents (TXT, CSV …) in BizTalk Server
How to process Flat Files documents (TXT, CSV …) in BizTalk ServerHow to process Flat Files documents (TXT, CSV …) in BizTalk Server
How to process Flat Files documents (TXT, CSV …) in BizTalk Server
Sandro Pereira
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...
CGAP
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
diaa46
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
Marlabs
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
Cyber law
Cyber lawCyber law
Cyber law
Arnab Roy Chowdhury
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Financial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard CharteredFinancial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard Chartered
TEDxMongKok
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02
Computer Science Club
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptography
NithyasriA2
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
Neha Agarwal
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Samy Shehata
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
How to process Flat Files documents (TXT, CSV …) in BizTalk Server
How to process Flat Files documents (TXT, CSV …) in BizTalk ServerHow to process Flat Files documents (TXT, CSV …) in BizTalk Server
How to process Flat Files documents (TXT, CSV …) in BizTalk Server
Sandro Pereira
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...
CGAP
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
diaa46
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
Marlabs
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Financial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard CharteredFinancial Crime Compliance at Standard Chartered
Financial Crime Compliance at Standard Chartered
TEDxMongKok
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 

Similar to Broadcast Signal Intrusion - Hacking Radio Stations (20)

Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
Vikas Mehta
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
Aniket Bhor
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Dr. Edwin Hernandez
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine Telecom
Andrew Trickett
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
Dr. Edwin Hernandez
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)
Craig Bayliss
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
kp12 buniel
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan
Himanshu Gupta
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
Nilgiri publicity
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET Journal
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentation
apral
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
Hi Tech Criminal Justice
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
samudra28th
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Luca Bongiorni
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
Carl Ford
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building Controls
Wayne Caswell
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)
Rahul Phulwariya
 
VHF Communication Basics Part 3
VHF Communication  Basics Part 3VHF Communication  Basics Part 3
VHF Communication Basics Part 3
Afghanistan civil aviation institute
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
Tanvir Taj
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
AJAL A J
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
Vikas Mehta
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
Aniket Bhor
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Dr. Edwin Hernandez
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine Telecom
Andrew Trickett
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
Dr. Edwin Hernandez
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)
Craig Bayliss
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
kp12 buniel
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan
Himanshu Gupta
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
Nilgiri publicity
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET Journal
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentation
apral
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
samudra28th
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Luca Bongiorni
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
Carl Ford
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building Controls
Wayne Caswell
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)
Rahul Phulwariya
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
Tanvir Taj
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
AJAL A J
 

More from Zero Science Lab (20)

Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Zero Science Lab
 
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Zero Science Lab
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
Zero Science Lab
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
Zero Science Lab
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернел
Zero Science Lab
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Zero Science Lab
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
Zero Science Lab
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2
Zero Science Lab
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијата
Zero Science Lab
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)
Zero Science Lab
 
M3t4splo1t
M3t4splo1tM3t4splo1t
M3t4splo1t
Zero Science Lab
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)
Zero Science Lab
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)
Zero Science Lab
 
OWASP Bulgaria
OWASP BulgariaOWASP Bulgaria
OWASP Bulgaria
Zero Science Lab
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)
Zero Science Lab
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical Application
Zero Science Lab
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
Zero Science Lab
 
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Zero Science Lab
 
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Zero Science Lab
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
Zero Science Lab
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
Zero Science Lab
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернел
Zero Science Lab
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Zero Science Lab
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
Zero Science Lab
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2
Zero Science Lab
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијата
Zero Science Lab
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)
Zero Science Lab
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)
Zero Science Lab
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)
Zero Science Lab
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)
Zero Science Lab
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical Application
Zero Science Lab
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
Zero Science Lab
 

Recently uploaded (20)

Bone Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
Bone   Tubeoudgkaitaurauraurarhafhau4rculosis.pptxBone   Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
Bone Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
gaisga4er
 
Oxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine EquipmentOxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine Equipment
blueredblue74
 
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtrBiology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
abayamargaug
 
hufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppthufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppt
alvishi254
 
materi semi konduktor untuk belajar elektronika daya
materi semi konduktor untuk belajar elektronika dayamateri semi konduktor untuk belajar elektronika daya
materi semi konduktor untuk belajar elektronika daya
RaidahAuliaMursyid
 
CCTV Camera Installation guide of .pdf
CCTV Camera Installation guide   of .pdfCCTV Camera Installation guide   of .pdf
CCTV Camera Installation guide of .pdf
Ebba6
 
Computer Hardware using mostly in daily.
Computer Hardware using mostly in daily.Computer Hardware using mostly in daily.
Computer Hardware using mostly in daily.
manshajunaid205
 
Mischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptxMischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptx
YashitaAhuja
 
Multilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion systemMultilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion system
Himabindu905359
 
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu  hionsbb 9hniosParsing.pptxNeed of t the thw stuf iobyu  hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
ParitoshShukla11
 
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKINGOSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
ritikghw
 
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptxchapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
vvghgjgf
 
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPTDownload Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
yousfhashmi786
 
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
hkrishna9495
 
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
hkrishna9495
 
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
Taqyea
 
Fonepaw Data Recovery Crack 2025 with key free Download
Fonepaw Data Recovery Crack 2025 with key free DownloadFonepaw Data Recovery Crack 2025 with key free Download
Fonepaw Data Recovery Crack 2025 with key free Download
mampisoren09
 
Spectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptxSpectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptx
muthulakshmitc
 
the-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.pptthe-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.ppt
LipicaJasujaWadhwa
 
Linepro - Product Profile- Capacitive Panels
Linepro - Product Profile- Capacitive PanelsLinepro - Product Profile- Capacitive Panels
Linepro - Product Profile- Capacitive Panels
PaulMalpan1
 
Bone Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
Bone   Tubeoudgkaitaurauraurarhafhau4rculosis.pptxBone   Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
Bone Tubeoudgkaitaurauraurarhafhau4rculosis.pptx
gaisga4er
 
Oxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine EquipmentOxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine Equipment
blueredblue74
 
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtrBiology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
Biology SBK10.pdffgguhjjjjghjtrdrettdryttrdtr
abayamargaug
 
hufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppthufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppt
alvishi254
 
materi semi konduktor untuk belajar elektronika daya
materi semi konduktor untuk belajar elektronika dayamateri semi konduktor untuk belajar elektronika daya
materi semi konduktor untuk belajar elektronika daya
RaidahAuliaMursyid
 
CCTV Camera Installation guide of .pdf
CCTV Camera Installation guide   of .pdfCCTV Camera Installation guide   of .pdf
CCTV Camera Installation guide of .pdf
Ebba6
 
Computer Hardware using mostly in daily.
Computer Hardware using mostly in daily.Computer Hardware using mostly in daily.
Computer Hardware using mostly in daily.
manshajunaid205
 
Mischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptxMischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptx
YashitaAhuja
 
Multilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion systemMultilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion system
Himabindu905359
 
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu  hionsbb 9hniosParsing.pptxNeed of t the thw stuf iobyu  hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
ParitoshShukla11
 
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKINGOSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
ritikghw
 
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptxchapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
vvghgjgf
 
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPTDownload Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
yousfhashmi786
 
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
00804.pptvjlvpuvupvpyvupv6v07upv60v7vupv0v6p
hkrishna9495
 
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
hkrishna9495
 
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
荷兰代尔夫特理工大学毕业证书文凭定制TUDelft成绩单定制
Taqyea
 
Fonepaw Data Recovery Crack 2025 with key free Download
Fonepaw Data Recovery Crack 2025 with key free DownloadFonepaw Data Recovery Crack 2025 with key free Download
Fonepaw Data Recovery Crack 2025 with key free Download
mampisoren09
 
Spectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptxSpectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptx
muthulakshmitc
 
the-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.pptthe-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.ppt
LipicaJasujaWadhwa
 
Linepro - Product Profile- Capacitive Panels
Linepro - Product Profile- Capacitive PanelsLinepro - Product Profile- Capacitive Panels
Linepro - Product Profile- Capacitive Panels
PaulMalpan1
 

Broadcast Signal Intrusion - Hacking Radio Stations

  • 2. Gjoko Krstic • Founder of Zero Science Lab2 • Offensive security research lead at ING • Member of g00g00tka group • Cybernetics student ☺ 2
  • 3. AGENDA • Introduction • Radio Station Components • Broadcast Signal Intrusion • ZSL Method • Conclusion • End of Transmission 3
  • 4. 4 Guglielmo Marconi, an Italian inventor and electrical engineer, is credited with the invention of the radio in 1894 and demonstrated in 1895. He continued to develop and improve his system, and in 1901 he successfully transmitted the first transatlantic radio signal. Alexander Graham Bell, an American inventor, scientist, and teacher of the deaf, is also considered one of the pioneers of radio technology. He developed an early version of the radio, which he called the "photophone," that used light waves to transmit sound. BRIEF HISTORY
  • 5. 5 BROADCAST TYPES STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB Internet radio, which allows listeners to stream audio over the internet. AM (Amplitude Modulation) radio, which is the traditional type of radio broadcasting and uses variations in the amplitude (or strength) of a radio wave to transmit sound. FM (Frequency Modulation) radio, which uses variations in the frequency of a radio wave to transmit sound. FM radio generally provides better sound quality than AM radio. Satellite radio, which is a subscription-based service that uses a network of satellites to transmit radio signals. HD Radio, which is a digital technology that allows FM and AM stations to broadcast additional channels and data alongside their traditional analog signals.
  • 6. 1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE. 2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION. 3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM. 4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT VIA AN ANTENNA. 5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR. 6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE. 7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND PLAYS THE SOUND VIA SPEAKERS. 6 TYPICAL RADIO COMPONENTS
  • 7. 7
  • 8. 8
  • 9. 9
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. BROADCAST SIGNAL INTRUSION Broadcast signal intrusion is the unauthorized alteration or takeover of a broadcast signal. This can occur on television or radio broadcasts and can take many forms. Digital intrusion is more sophisticated and can include hacking into a station's computer systems to gain control of the signal, or intercepting and modifying the signal as it is being transmitted. 16
  • 27. 27 WHAT IS DAB? WHAT IS RDS? DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different modulation method compared to FM and AM. DAB uses a technique called COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the audio signals onto a carrier frequency. DAB also can transmit additional data, such as station information, song titles and traffic reports, but it uses a different method to transmit this data, it uses the DAB EPG (Electronic Program Guide) that allows for the transmission of more advanced information than RDS. RDS (Radio Data System) is a technology that is primarily used for FM radio, it allows for the transmission of additional data, such as song titles, station information, and traffic reports, over FM radio waves.
  • 28. Case #13 – Adtec Digital Digital Video Broadcasting (DVB)
  • 29. Flexible and powerful, it ensures perfect sound quality and full compatibility with radio broadcasting standards and can be used simultaneously for FM and HD, DAB, DRM or streaming. 29 RADIO PROCESSING
  • 31. Many audio processors and other IoT devices come with built-in web interfaces or APIs that allow for remote management and control, and software such as "Remote Control" can be used to access these interfaces. This can be useful for adjusting settings, monitoring the performance of the equipment, and troubleshooting problems remotely.
  • 32. VECTORS [BLACKBOX] • The network-connected device - Web interface (PHP, CGI, Shell scripts), HTTP - Telnet: Link&Share terminal server - ELF32 binaries (Linux/ARM) - Firmware? • The software (thick client), Windows 10 - SOUND4 Server.exe (64bit) - SOUND4 Remote Control.exe (32bit) - LinkAndShare Transmitter.exe (32bit) 32
  • 33. INVESTIGATION • DuckDuckGo, Documentation, OpenAI, YouTube • Penetration test -> Manual analysis + scan/map • Coverage-guided fuzzing • Source code review • OSINT + exposure -> Shodan, BinaryEdge 33
  • 35. RESULTS • 25 0-days and counting  • 107 radio stations affected • No response from the vendor(s)  • Collab with national CERTs and VINCE (CISA) • CVEs pending… but we don’t care about that 35
  • 36. 36 FORMAT STRING IN USERNAME ENV (LinkAndShareTransmitter.exe)
  • 37. 37 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 38. 38 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 39. 39
  • 40. 40 JACKALOPE + WINAFL SOUND4 Remote Control.exe (vc_s4client.dll)
  • 43. 43
  • 51. NEWS FLASH FROM THE AI WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E HACKER TAKE OVER A BROADCAST SIGNAL ? “If an audio processor is hacked, it is possible that the hacker could take over the broadcast signal. Depending on the specific device and the level of access gained by the hacker, they could potentially modify the audio content, disrupt the transmission, or even gain control over the entire broadcast system. However, it's important to note that these kind of hacks are not easy to carry out and would require a high level of technical knowledge and skill. Additionally, most IoT devices have some form of security measures in place to prevent unauthorized access, such as firewalls, encryption and authentication.” 51
  • 52. … if (isset($_POST['username']) && isset($_POST['password'])) { $ret = -1; exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server _check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret); … 52 FIRMWARE GLIMPSE: WEB GI (login.php)
  • 53. VULNERABILITIES! Privilege Escalation Cross-Site Request Forgery Authorization Bypass Denial of Service Authentication Bypass ICMP Flood Attack Information Disclosure Command Injection SQL Injection Cross-Site Scripting Directory Traversal Pre-auth Factory Reset Stack-based Buffer Overflow Default Credentials Hard-coded Credentials Cleartext Storage and Communication Vulnerable Libraries/Binaries Broadcast Signal Hijacking
  • 55. 55 JUST ANOTHER SHOUTOUT • Radio and broadcast signal intrusion is a serious security concern that can disrupt communications and cause confusion and panic among the public. • Security is often overlooked in the radio and broadcast industry, leaving exposed devices and components online and vulnerable to attack. • IoT vendors need to have more awareness about security and include security in their software development life cycle (SDLC) pipeline to prevent vulnerabilities from being introduced in their products.
  • 56. THANK YOU HEK.SI - 2023 @zeroscience www.zeroscience.mk 56
  • 57. 57