HARDSPLOIT	
Framework	for	Hardware	Security	Audit	
a	bridge	between	hardware	&	a	so0ware	pentester
Who am I ?
•  Julien Moinard
-  Electronic engineer @opale-security (French company)
-  Security consultant, Hardware & SoDware pentester
-  Team project leader of Hardsploit
-  DIY enthusiast
16/03/2016	 2
Opale Security in 1 slide
16/03/2016	 3
Internet of Things & Privacy concern ?
•  Any	IoT	object	could	reveal	informa@on	about	
individuals	
•  Wearable	Technology:	clothes,	watches,	contact	
lenses	with	sensors,	microphones	with	cameras	
embedded	and	so	on	
•  Quan@fied	Self:	pedometers,	sleep	monitors,	and	so	
on	
•  Home	Automa@on:	connected	households	using	smart	
fridges,	smart	ligh<ng	and	smart	security	systems,	and	
so	on	
•  …	
16/03/2016	 4
Internet of Things & Privacy concern ?
•  Last	news	:		(you	can	update	this	slide	every	week	L)	
	
Firmware	can	be	read	without	
any	problem	(SPI	memory)	
VTech	was	hacked	in	November,	exposing	
millions	of	accounts.	
	
In	response,	the	firm	took	some	essen<al	
services	offline,	meaning	products	could	
not	be	registered	on	Christmas	Day.	
	
16/03/2016	 5
Iot Eco-system (20000 feet view)
•  Privacy	Risk	level	:	Where?	
	
	
HF	communica<on	(ISM	
Band)	+	Wifi	+	3G-5G	,	
Bluetooth,	Sigfox,	Lora	etc..	
	
Classical	wired	connec<ons	
	
Central	servers,	User	
Interface,	API,	Backoffice	etc.	
	
IoT	devices	
	
16/03/2016	 6
SOFTWARE		
To	secure	it:	
•  Security	products	(Firewall,	An<virus,	IDS,…)	
•  Security	services	(Pentest,	Audit,	…)	
•  Tools	(Uncountable	number	of	them)	
HARDWARE	
To	secure	it:	
•  Few	or	unimplemented	solu<ons	(Encryp<on	
with	key	in	a	secure	area,	an<-replay	
mechanisms,	readout	protec<on,	…)		
Security speaking,
hardware is the new soDware ?
16/03/2016	 7
•  1/	Open	it	
•  2/	Fingerprint	all	the	component	if	you	can	else	automa@c	brute	forcing	
•  3/	Use	those	that	may	contain	data	(Online	/	Offline	analysis	?)	
•  4/	Perform	read	|	write	opera@on	on	them	
•  5/	Reverse	engineering,	find	vulnerabili<es	and	exploit	them	
Hardsploit & hardware hacking
basic procedure 
16/03/2016	 8
Global Purpose
16/03/2016	 9
Why ?
•  Because	chips	contain	interes<ng	/	private	data	
•  Passwords	
•  File	systems	
•  Firmware	
•  …	
16/03/2016	 10
How ?
•  A	hardware	pentester	need	to	know	electronic	buses	and	he	need	to	be	
able	to	interact	with	them	
1-Wire	
JTAG	/	SWD	UART	
CAN	
PARALLEL	
Custom	
16/03/2016	 11
Hardsploit framework
Same	hardware	but	a	sofware	update	is	needed	to	add	a	new	protocols	
Hardsploit	
IoT	target	
Input	/	Output	
database	 Module	(SWD,	SMBus,	I2C,	SPI,	etc..)	
16/03/2016	 12
Hardsploit bus indenSficaSon & scanner
(in progress, not published yet)
Hardsploit	
IoT	target	
Input	/	Output	
Database	of	pagerns	
Database	of	components	 Module	(I2C,	SPI,	etc..)	
IO	hardware	mixer		
Scanner	
16/03/2016	 13
Tool of trade 
FUNCTIONALITIES	 BUSPIRATE	 JTAGULATOR	 GOODFET	 HARDSPLOIT	
UART	 Bus	iden<fica<on	
SPI	
PARALLEL	
I2C	
JTAG	/	SWD	 Bus	iden<fica<on	
MODULARITY	 Microcontroller	 Microcontroller	 Microcontroller	 uC	/	FPGA	
EASE	OF	USE	 Cmd	line	+	datasheet	 Command	line	 Command	line	 Official	GUI	/	API	/	DB	
I/O	NUMBER	 <	10	 24	 <	14	 64	(plus	power)	
WIRING	 TEXT	(but	MOSI	=	SDA	J)	 TEXT	/	AUTOMATIC	
iden<fica<on	
TEXT	 LED	/	TEXT/	
AUTOMATIC	
iden<fica<on	
16/03/2016	 14
Hardsploit: CommunicaSon
16/03/2016	 15
Prototype making
•  Applying	soldering	paste	(low	budget	style)	
16/03/2016	 16
Prototype making
•  Manual	reflow	oven	(DIY	style)	
16/03/2016	 17
Prototype V0.1 aka The Green Goblin J
16/03/2016	 18
Prototype making (with a budget)
•  The	rebirth	
16/03/2016	 19
The board – Final version
•  64	I/O	channels	
•  ESD	Protec<on	
•  Target	voltage:	3.3	&	5V	
•  Use	a	Cyclone	II	FPGA	
•  USB	2.0	
•  20cm	x	9cm	
16/03/2016	 20
Hardsploit organizaSon
16/03/2016	 21
Chip management
•  Search	
•  Create	
•  Modify	
•  Interact	
16/03/2016	 22
Wiring helper
Datasheet	
representa<on	
Hardsploit	Wiring	module		
representa<on	
GUI	<–>	Board	interac<on	
16/03/2016	 23
Se[ngs
16/03/2016	 24
Command editor
16/03/2016	 25
What are available on github (Open) ?
•  Microcontroller	(c)	
•  API	(ruby)	
•  GUI	(ruby)	
•  Create	your	own	Hardsploit	module	:	VHDL	&	API	(ruby)	
16/03/2016	 26
Already available (github)
Parallel	non	mul<plexed	memory	dump	
•  32	bits	for	address	
•  8/16	bits	for	data	
Helping	wiring	
I2C	100Khz	400Khz	and	1	Mhz	
•  Addresses	scan	
•  Read,	write,	automa<c	full	and	par<al	dump	
SPI	mode	0,1,2,3	up	to	25	Mhz	
•  Read,	write,	automa<c	full	and	par<al	dump	
SWD	interface	(like	JTAG	but	for	ARM	core)	
•  Dump	and	write	firmware	of	most	ARM	CPU		
GPIO	interact	/	bitbanging	(API	only	for	the	moment)		
•  Low	speed	<	500Hz		read	&	write	opera<ons	on	64	bits	
16/03/2016	 27
More to come (see online roadmap)…
•  Automa<c	bus	inden<fica<on	&	Scanner	(@30%)	
•  Component	&	commands	sharing	platorm	(@90%)	
•  TTL	UART	Module	with	automa<c	detec<on	speed	(@80%)	
•  Parallel	communica<on	with	mul<plexed	memory		
•  I2C	sniffing	(shot	of	4000	bytes	up	to	1	Mhz)		
•  SPI	sniffing	(shot	of	8000	/	4000	byte	half	/	full	up	to	25Mhz)		
•  RF	Wireless	transmission	training	plateform	(Nordic	NRF24,	433Mhz,	868Mhz	transcievers)		
•  Metasploit	integra<on	(module)	??	
•  JTAG	
•  1	Wire	
•  CanBUS	(with	hardware	level	adapter)	
•  …	
16/03/2016	 28
Concrete case
•  An	electronic	lock	system	
•  4	characters	pin	code	A	–	B	–	C	–	D	
•  Good	combinaison	–	Door	opens,	green	L.E.D	turn	on	
•  Wrong	combinaison	–	Door	closes,	red	L.E.D	turn	on	
16/03/2016	 29
Concrete case: Open it
16/03/2016	 30
Concrete case: Fingerprint
I2C	MEMORIES	24LC64	
STM32F103RBT6	
SPI	MEMORY	25LC08	
16/03/2016	 31
Concrete case: Online / Offline analysis ?
16/03/2016	 32
Concrete case: hardsploit scenario
1.  Open	Hardsploit	to	create	the	component	(if	not	exist)	
2.  Connect	the	component	to	Hardsploit	(wiring	helping)	
3.  Enter	and	save	the	component	seungs	(if	not	exist)	
4.  Dump	the	content	of	the	memories	(1	click)	
5.  Change	the	door	password	by	using	commands	(few	clicks)	
6.  Try	the	new	password	on	the	lock	system	(enjoy)	
16/03/2016	 33
Concrete case:
Read | Write operaSon, I2C, SPI, SWD …
•  Time	for	a	live	demo	?	
16/03/2016	 34
Parallel bus memory
16/03/2016	 35
Concrete case: Fingerprint
16/03/2016	 36
Concrete case: Offline analysis
16/03/2016	 37
Concrete case: Ready to dump the content
16/03/2016	 38
Conclusion
•  IoT	Device	are	(also)	prone	to	vulnerabili<es	help	you	to	find	them	
•  Security	policy	need	to	be	adpated,	nowadays,	it	is	not	so	difficult	to	
extract	data	on	IoT	
•  Designers	need	to	design	with	security	in	mind	
•  Skills	related	to	pentest	a	hardware	device	is	mandatory	for	Security	
Experts	(but	training	exist)	
•  Industry	need	to	take	care	about	device	security	
16/03/2016	 39
Thank you !
Hardsploit	board	is	available	at	shop-hardsploit.com	(250	€	/	277	USD	/	370	CAD	excluding	VAT)	
To	learn	more	about	Hardsploit	and	follow	the	development	
Hardsploit.io	&	Opale-Security.com		
•  Yann	ALLAIN	(CEO)	
•  yann.allain@opale-security.com	
•  +33	6	45	45	33	81	
	 Hardware	&	Sofware,	Pentest,	Audit,	Training	
•  Julien	MOINARD	(Project	leader	of	Hardsploit)	
•  julien.moinard@opale-security.com	
•  +33	9	72	43	87	07	
16/03/2016	 40

More Related Content

PDF
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
PDF
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
PDF
Recon2016 shooting the_osx_el_capitan_kernel_like_a_sniper_chen_he
PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
PDF
Csw2016 d antoine_automatic_exploitgeneration
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
PDF
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
PDF
Reverse Engineering the TomTom Runner pt. 2
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
Recon2016 shooting the_osx_el_capitan_kernel_like_a_sniper_chen_he
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2016 d antoine_automatic_exploitgeneration
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
Reverse Engineering the TomTom Runner pt. 2

What's hot (20)

PPTX
Practical Windows Kernel Exploitation
PDF
Solnik secure enclaveprocessor-pacsec
PDF
Is That A Penguin In My Windows?
PPTX
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
PPTX
ShinoBOT Suite
PPTX
[Wroclaw #3] Trusted Computing
PPTX
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
PPTX
Fun With Dr Brown
PDF
LCA14: LCA14-502: The way to a generic TrustZone® solution
PPTX
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
PDF
Alessio Lama - Development and testing of a safety network protocol
PPTX
Injection on Steroids: Codeless code injection and 0-day techniques
PDF
⭐⭐⭐⭐⭐ CHARLA #PUCESE Arduino Week: Hardware de Código Abierto TSC-LAB
PDF
Mirko Damiani - An Embedded soft real time distributed system in Go
PPT
Hack In Paris 2011 - Practical Sandboxing
PDF
OffensiveCon2022: Case Studies of Fuzzing with Xen
PDF
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
PDF
Demystifying Secure enclave processor
PDF
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
PPTX
The Silence of the Canaries
Practical Windows Kernel Exploitation
Solnik secure enclaveprocessor-pacsec
Is That A Penguin In My Windows?
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
ShinoBOT Suite
[Wroclaw #3] Trusted Computing
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Fun With Dr Brown
LCA14: LCA14-502: The way to a generic TrustZone® solution
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
Alessio Lama - Development and testing of a safety network protocol
Injection on Steroids: Codeless code injection and 0-day techniques
⭐⭐⭐⭐⭐ CHARLA #PUCESE Arduino Week: Hardware de Código Abierto TSC-LAB
Mirko Damiani - An Embedded soft real time distributed system in Go
Hack In Paris 2011 - Practical Sandboxing
OffensiveCon2022: Case Studies of Fuzzing with Xen
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Demystifying Secure enclave processor
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
The Silence of the Canaries
Ad

Viewers also liked (20)

PDF
Csw2016 evron sysman_apt_reports_and_opsec_evolution
PDF
Csw2016 wang docker_escapetechnology
PDF
Csw2016 economou nissim-getting_physical
PDF
Csw2016 gawlik bypassing_differentdefenseschemes
PDF
Csw2016 macaulay eh_trace-rop_hooks
PDF
Csw2016 chen grassi-he-apple_graphics_is_compromised
PDF
Csw2016 song li-smart_wars
PDF
CSW2017 Harri hursti csw17 final
PDF
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
PDF
Csw2016 tang virtualization_device emulator testing technology
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
PDF
CSW2017 Scott kelly secureboot-csw2017-v1
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PDF
Csw2016 freingruber bypassing_application_whitelisting
PDF
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
PDF
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
PDF
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
PDF
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
PDF
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
Csw2016 evron sysman_apt_reports_and_opsec_evolution
Csw2016 wang docker_escapetechnology
Csw2016 economou nissim-getting_physical
Csw2016 gawlik bypassing_differentdefenseschemes
Csw2016 macaulay eh_trace-rop_hooks
Csw2016 chen grassi-he-apple_graphics_is_compromised
Csw2016 song li-smart_wars
CSW2017 Harri hursti csw17 final
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 tang virtualization_device emulator testing technology
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
Csw2016 freingruber bypassing_application_whitelisting
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
Ad

Similar to Csw2016 julien moinard-hardsploit (20)

PDF
PPTX
IoT Security Risks and Challenges
PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
PDF
From printed circuit boards to exploits
PPTX
Advanced SOHO Router Exploitation XCON
PDF
Beginners guide on how to start exploring IoT 2nd session
PDF
[CB19] I KNOW WHAT YOU DID LAST NIGHT : Pwning The State-Of-The-Art the IoT H...
PPTX
Making and breaking security in embedded devices
PDF
Finding the needle in the hardware haystack - HRES (1)
PDF
Internet of Things & Open Hardware (LeanCamp Madrid 2012)
PDF
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
PPT
PPTX
Securing Internet of Things
PDF
DEF CON 27 - PHILIPPE LAULHERET - introduction to hardware hacking extended v...
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
Reverse engineering
PDF
Building Droids with JavaScript
PDF
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
PPTX
IoT and embedded systems.pptx
PPTX
Arduino and c programming
IoT Security Risks and Challenges
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
From printed circuit boards to exploits
Advanced SOHO Router Exploitation XCON
Beginners guide on how to start exploring IoT 2nd session
[CB19] I KNOW WHAT YOU DID LAST NIGHT : Pwning The State-Of-The-Art the IoT H...
Making and breaking security in embedded devices
Finding the needle in the hardware haystack - HRES (1)
Internet of Things & Open Hardware (LeanCamp Madrid 2012)
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Securing Internet of Things
DEF CON 27 - PHILIPPE LAULHERET - introduction to hardware hacking extended v...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Reverse engineering
Building Droids with JavaScript
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
IoT and embedded systems.pptx
Arduino and c programming

More from CanSecWest (9)

PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PDF
CSW2017 jun li_car anomaly detection
PDF
CSW2017 chuanda ding_state of windows application security
PDF
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
PDF
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
PDF
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
PDF
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
PDF
CSW2017 Qidan he+Gengming liu_cansecwest2017
PDF
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 jun li_car anomaly detection
CSW2017 chuanda ding_state of windows application security
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell

Recently uploaded (20)

PDF
Course Overview and Agenda cloud security
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
Database Information System - Management Information System
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Course Overview and Agenda cloud security
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
The-Importance-of-School-Sanitation.pptx
Exploring The Internet Of Things(IOT).ppt
Introduction to cybersecurity and digital nettiquette
Layers_of_the_Earth_Grade7.pptx class by
Database Information System - Management Information System
Mathew Digital SEO Checklist Guidlines 2025
AI_Cyberattack_Solutions AI AI AI AI .pptx
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Alethe Consulting Corporate Profile and Solution Aproach
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Containerization lab dddddddddddddddmanual.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
t_and_OpenAI_Combined_two_pressentations
Cyber Hygine IN organizations in MSME or
Alethe Consulting Corporate Profile and Solution Aproach
Uptota Investor Deck - Where Africa Meets Blockchain
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf

Csw2016 julien moinard-hardsploit