SlideShare a Scribd company logo
HARDWARE HACKING CHRONICLES
IOT HACKING FOR OFFENCE AND DEFENCE
Fatih Ozavci
Managing Consultant – Context Information Security
2
Fatih Ozavci, Managing Consultant
VoIP & phreaking
Mobile applications and devices
Network infrastructure
CPE, hardware and IoT hacking
Author of Viproy and VoIP Wars
Public speaker and trainer
 Blackhat, Defcon, HITB, AusCert, Troopers
May'16
3
Subscriber services and IoT
Hardware hacking chronicles
Hacking broadband devices
Hacking office devices
Improving defense and offense
May'16
May'16
Everything is connected
Broadband services
Smart modems
IPTV equipment
Office devices
3g/4g modems
IP phones
Keyboards & mouse
Why should we evolve?
4
5May'16
6May'16
Broadband & 3G/4G
IPTV/Satellite Broadcasting & VoD
Home & Office Equipment
7
Combining testing skills
Design reviews do not show business
logic issues
Tech must be tested for various
perspectives
Traditional tests do not cover
Devices’ firmware and hardware
Management in a protected network
Very limited days for testing
May'16
8
Testing methodology must be flexible
Various devices – ARM vs MIPS, Phone vs Modem
Various OSes – Android vs Linux vs VxWorks
Testing must always focus on the device’s roles
May'16
HARDWARE HACKING
CHRONICLES
Configuration
Edit & Re-Upload
May'16
Secret Handshake
to Enable Telnet
Physical
Interfaces
10
May'16 11
12
Weaknesses are already known
Configuration dump for credentials
Editing the conf to enable a feature
Vulnerabilities are public and easy
Telnet authentication bypass
Sagem: https://www.exploit-db.com/exploits/17670
Netgear:
https://wiki.openwrt.org/toh/netgear/telnet.console
E.g. admin password leak
wget http://1.1.1.1/password.html -t 1 -q -O - | grep pwd
May'16
Console Debugging
TX, RX, GND, V
May'16
Debugging On-Chip
Debug TDI, TDO,
TCK…
Access to Flash
Read/Write Data
SCK, MOSI, MISO...
13
May'16
Bus Pirate
Bus Blaster
Shikra
HydraBus
Jtagulator
GoodFet/GreatFet
Logic Analyser
SOIC8/16 Clips
14
May'16 15
May'16 16
May'16 17
May'16 18
19
Usually 4 PINs
TX, RX, GND, Voltage
Provides device access
Bootloader, console access
Real-time debugging
Access without a password
May'16
Find the ground
Find the voltage
Set the target voltage
Try to send/receive
TX vs RX
Various baud rates
Analyse the output
Jtagulator
May'16 20
May'16 21
Debugging and logging
Intercepting boot
sequence
Boot parameters
CFE access
Getting console access
E.g. Netgear CG3100D
May'16 22
May'16 23
May'16
Stop the boot process
UART/Serial connection
Possibilities
Re-flash for OpenWRT
Get information
 Credentials?
Dump the firmware
Eg. Sagemcom 3864v2
ADSL & NBN
24
May'16 25
26
Debugging standard
Everything depends on the vendor
Device or system testing
Daisy-chained JTAG
TDI (Test Data In)
TDO (Test Data Out)
TCK (Test Clock)
TMS (Test Mode Select)
TRST (Test Reset)
May'16
May'16 27
28
Internal communication interface
Direct connection to the flashes
Logic signals
SCLK : Serial Clock
MOSI : Master Output, Slave Input
MISO : Master Input, Slave Output
SS : Slave Select
May'16
Image: https://en.wikipedia.org/wiki/Serial_Peripheral_Interface_Bus
CUSTOMER PREMISES
EQUIPMENT
30
Broadband, IPTV, Satellite…
Devices are
connected to the infrastructure
managing by service provider
in the consumer promises
Relying on vendors for security
Default configuration
Legacy or unpatched software
Management interfaces
May'16
31
Various vendors in a pool
Device provisioning
Software & configuration
management
Call centre connections
Generic information in the wild
Custom software (e.g OpenWRT)
Bypassing controls is common
BYOD on subscriber services
May'16
Call Centre
May'16 32
Service Provider
ACS SIP
Provisioning Pool
BYOD
TR-069
DOCSIS RADIUS
May'16 33
IPTV STB
DVB STB
VOD
Streaming
DRM WEB
Services
VOD, Licenses, Keys, Billing
VOD, Licenses, Keys, Billing
CLOUD
SERVICE PROVIDER
ACS
BROADCAST
RADIUS
TR-069
May'16 34
Service Provider
ACS SIP
TR-069 / DOCSIS
RADIUSVOIP (SIP + RTP)
PSTN
PSTN
Service Provider
MSAN/MGW
Distributor
VOIP (SIP + RTP)
MANAGEMENT
May'16 35
3G Telecom Network
3G SIP
IPSEC VPN RADIUS
3G
3G
3G
Femtocell Pool
Base Station
TR-069
May'16 36
Debugging
Gathering
Information
Attacking
Server
Service network
Clients connected
ACS
TR-069
Modem
ACS on Modem TCP/7676
ACS on Server TCP/443
ACS Connection Intercepted
Modified Attacking ContentOriginal Content
37
Dumping device memory
X.509 certificates for IPSEC Auth
PINs, passwords and config data
Broadcasting and DRM keys
Dump device firmware
Reverse engineering, exploit dev
Driving a consumer device
Fake base station, billing bypass
Altering VoD content, security bypass
May'16
OFFICE DEVICES
39
Backdoors on devices are common
Open source, distribution, vendors…
Expensive to replicate the attack
Red teaming engagements
Putting a Raspberry Pi in everything
Collecting keyboard & mouse input
Human factor pen-testing
Sending backdoored devices
May'16
40
3G/4G Modems
 WiFi models with services and features
 USB models require drivers
 Internal storage and card reader
Unauthorised access via services
Firmware operations
 Dumping and reversing the firmware
 Backdooring the firmware
Using their shelves for USB duckies
May'16
41
Keysweeper by SamyKamkar
Arduino/Teensy based sniffer
Sniffing Microsoft Wireless Keyboard
Mousejack by Bastille Security
RF keyboard & mouse receivers
Force pairing vulnerability
Force pairing a remote keyboard
May'16
42
Efficient for persistent access
Raspberry Pi, Arduino
Can fit in many devices
Find a suitable device to backdoor
Find a power source
Find a network connection
Solder and connect the pieces
Broadcast the network connected
Advanced implants take time
May'16
May'16 43
RJ45 Connection Pins
May'16 44
Speaker Power
Patch the Cat5 cable
DEFENSE AND OFFENSE
46
Enforcing vendors to
Disable physical interfaces
Use encryption and access keys
Follow a security standard
Network isolation for subscribers
Tailored research for
Vendor product vulnerabilities
CPE management services
Backdoor analysis
May'16
47
Devices are IN SCOPE
Think different and combine skills
Everything is a target
Home automation, CCTV, phones…
Testing service operator networks
Test services through devices
Extract information from devices
Access and fuzz tests through
devices
May'16
48
Focuses on all components
Devices, infrastructure, software…
Focuses on exploitable issues
Combines various disciplines
Embedded systems, mobile, network…
Closes the gap between offense
and defense
May'16
49
Context Information Security
http://www.contextis.com
AusCERT
https://www.auscert.org.au
IoT Security Wiki
https://iotsecuritywiki.com
May'16
QUESTIONS?
THANKS!

More Related Content

What's hot (20)

PPTX
IOT Based Home Automation using Raspberry Pi-3
Mohammad Qasim Malik
 
PPTX
Internet of things using Raspberry Pi
Yash Gajera
 
PDF
Modbus over RS485
艾鍗科技
 
PDF
Departed Communications: Learn the ways to smash them!
Fatih Ozavci
 
PDF
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
PDF
Embedded systems
Mohanad Yehia
 
PDF
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
PPTX
Home automation using IOT
Maneesh Devanaboyina
 
PDF
Arduino presentation
Michael Senkow
 
PPTX
Iot architecture
Anam Iqbal
 
ODP
Introduction to Arduino
Richard Rixham
 
PPT
The ARM Architecture: ARM : ARM Architecture
sreea4
 
PDF
IoT - the Next Wave of DDoS Threat Landscape
APNIC
 
PPTX
Internet of Things using Raspberry Pi
Pantech ProLabs India Pvt Ltd
 
PPTX
RISC-V Introduction
RISC-V International
 
PPTX
Honeypot ppt1
samrat saurabh
 
PDF
IoT Networking Part 2
Hitesh Mohapatra
 
PPTX
Internet of things(IoT)
NAGUR SHAREEF SHAIK
 
PDF
IoT ecosystem
Md. Shamsul Haque
 
PDF
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Jayanthi Kannan MK
 
IOT Based Home Automation using Raspberry Pi-3
Mohammad Qasim Malik
 
Internet of things using Raspberry Pi
Yash Gajera
 
Modbus over RS485
艾鍗科技
 
Departed Communications: Learn the ways to smash them!
Fatih Ozavci
 
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
Embedded systems
Mohanad Yehia
 
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
Home automation using IOT
Maneesh Devanaboyina
 
Arduino presentation
Michael Senkow
 
Iot architecture
Anam Iqbal
 
Introduction to Arduino
Richard Rixham
 
The ARM Architecture: ARM : ARM Architecture
sreea4
 
IoT - the Next Wave of DDoS Threat Landscape
APNIC
 
Internet of Things using Raspberry Pi
Pantech ProLabs India Pvt Ltd
 
RISC-V Introduction
RISC-V International
 
Honeypot ppt1
samrat saurabh
 
IoT Networking Part 2
Hitesh Mohapatra
 
Internet of things(IoT)
NAGUR SHAREEF SHAIK
 
IoT ecosystem
Md. Shamsul Haque
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Jayanthi Kannan MK
 

Viewers also liked (18)

PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
PDF
VoIP Wars: The Phreakers Awaken
Fatih Ozavci
 
PDF
VoIP Wars : Return of the SIP
Fatih Ozavci
 
PDF
Mahremiyetinizi Koruyun
Fatih Ozavci
 
PDF
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci
 
PDF
Hacking SIP Like a Boss!
Fatih Ozavci
 
PDF
Metasploit Framework ile Exploit Gelistirme
Fatih Ozavci
 
PDF
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci
 
PDF
Viproy ile VoIP Güvenlik Denetimi
Fatih Ozavci
 
PDF
Mahremiyet Ekseninde Ozgur Yazilimlar
Fatih Ozavci
 
PDF
MBFuzzer : MITM Fuzzing for Mobile Applications
Fatih Ozavci
 
PDF
NGN ve VoIP Ağları Güvenlik Denetimi
Fatih Ozavci
 
PDF
Bilgi Guvenligi Temel Kavramlar
Fatih Ozavci
 
PDF
Ozgur Yazilimlar ile Saldiri Yontemleri
Fatih Ozavci
 
PDF
Metasploit Framework ile Güvenlik Denetimi
Fatih Ozavci
 
PDF
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Fatih Ozavci
 
PDF
Netflix Global Cloud Architecture
Adrian Cockcroft
 
PDF
More Details about TR-069 (CPE WAN Management Protocol)
William Lee
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
VoIP Wars: The Phreakers Awaken
Fatih Ozavci
 
VoIP Wars : Return of the SIP
Fatih Ozavci
 
Mahremiyetinizi Koruyun
Fatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci
 
Hacking SIP Like a Boss!
Fatih Ozavci
 
Metasploit Framework ile Exploit Gelistirme
Fatih Ozavci
 
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci
 
Viproy ile VoIP Güvenlik Denetimi
Fatih Ozavci
 
Mahremiyet Ekseninde Ozgur Yazilimlar
Fatih Ozavci
 
MBFuzzer : MITM Fuzzing for Mobile Applications
Fatih Ozavci
 
NGN ve VoIP Ağları Güvenlik Denetimi
Fatih Ozavci
 
Bilgi Guvenligi Temel Kavramlar
Fatih Ozavci
 
Ozgur Yazilimlar ile Saldiri Yontemleri
Fatih Ozavci
 
Metasploit Framework ile Güvenlik Denetimi
Fatih Ozavci
 
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Fatih Ozavci
 
Netflix Global Cloud Architecture
Adrian Cockcroft
 
More Details about TR-069 (CPE WAN Management Protocol)
William Lee
 

Similar to Hardware Hacking Chronicles: IoT Hacking for Offence and Defence (20)

PPTX
Root via sms. 4G security assessment
Sergey Gordeychik
 
PPT
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
 
PDF
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
Priyanka Aash
 
PDF
OWASP Cambridge Chapter Meeting 13/12/2016
joebursell
 
PPTX
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Yogesh Ojha
 
PDF
Exfiltrating Data through IoT
Priyanka Aash
 
PDF
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
Hans Andersson
 
PDF
IoT security zigbee -- Null Meet bangalore
veerababu penugonda(Mr-IoT)
 
PDF
Taking a closer look at level 0 and level 1 security
Matt Loong
 
PDF
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PawachMetharattanara
 
PPTX
Sagar Kadam, Lead Software Engineer, Open-Silicon
chiportal
 
PDF
The Considerations for Internet of Things @ 2017
Jian-Hong Pan
 
PDF
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM France Lab
 
PPT
Ethernet basics
erick4chitsime
 
PDF
Scada deep inside: protocols and security mechanisms
Aleksandr Timorin
 
PDF
IT Solution through IoT Development
Andri Yadi
 
PDF
iOT - Developing beacons
sandeephegde
 
PDF
Iot ble and_beacons_2015_nov28
Ravikiran HV
 
PDF
A Comprehensive Guide to Acquire Information on 4G Router
E-Lins Technology Co. Ltd.
 
Root via sms. 4G security assessment
Sergey Gordeychik
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
Priyanka Aash
 
OWASP Cambridge Chapter Meeting 13/12/2016
joebursell
 
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Yogesh Ojha
 
Exfiltrating Data through IoT
Priyanka Aash
 
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
Hans Andersson
 
IoT security zigbee -- Null Meet bangalore
veerababu penugonda(Mr-IoT)
 
Taking a closer look at level 0 and level 1 security
Matt Loong
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PawachMetharattanara
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
chiportal
 
The Considerations for Internet of Things @ 2017
Jian-Hong Pan
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM France Lab
 
Ethernet basics
erick4chitsime
 
Scada deep inside: protocols and security mechanisms
Aleksandr Timorin
 
IT Solution through IoT Development
Andri Yadi
 
iOT - Developing beacons
sandeephegde
 
Iot ble and_beacons_2015_nov28
Ravikiran HV
 
A Comprehensive Guide to Acquire Information on 4G Router
E-Lins Technology Co. Ltd.
 

Recently uploaded (20)

PDF
Survival Models: Proper Scoring Rule and Stochastic Optimization with Competi...
Paris Women in Machine Learning and Data Science
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
NASA A Researcher’s Guide to International Space Station : Earth Observations
Dr. PANKAJ DHUSSA
 
PDF
Next Generation AI: Anticipatory Intelligence, Forecasting Inflection Points ...
dleka294658677
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PPTX
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 
PDF
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pdf
ghjghvhjgc
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PDF
“ONNX and Python to C++: State-of-the-art Graph Compilation,” a Presentation ...
Edge AI and Vision Alliance
 
PDF
Software Development Company Keene Systems, Inc (1).pdf
Custom Software Development Company | Keene Systems, Inc.
 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
PDF
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PPTX
Talbott's brief History of Computers for CollabDays Hamburg 2025
Talbott Crowell
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Survival Models: Proper Scoring Rule and Stochastic Optimization with Competi...
Paris Women in Machine Learning and Data Science
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
NASA A Researcher’s Guide to International Space Station : Earth Observations
Dr. PANKAJ DHUSSA
 
Next Generation AI: Anticipatory Intelligence, Forecasting Inflection Points ...
dleka294658677
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pdf
ghjghvhjgc
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
“ONNX and Python to C++: State-of-the-art Graph Compilation,” a Presentation ...
Edge AI and Vision Alliance
 
Software Development Company Keene Systems, Inc (1).pdf
Custom Software Development Company | Keene Systems, Inc.
 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
Talbott's brief History of Computers for CollabDays Hamburg 2025
Talbott Crowell
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence