SlideShare a Scribd company logo
HARDWARE HACKING CHRONICLES
IOT HACKING FOR OFFENCE AND DEFENCE
Fatih Ozavci
Managing Consultant – Context Information Security
2
Fatih Ozavci, Managing Consultant
VoIP & phreaking
Mobile applications and devices
Network infrastructure
CPE, hardware and IoT hacking
Author of Viproy and VoIP Wars
Public speaker and trainer
 Blackhat, Defcon, HITB, AusCert, Troopers
May'16
3
Subscriber services and IoT
Hardware hacking chronicles
Hacking broadband devices
Hacking office devices
Improving defense and offense
May'16
May'16
Everything is connected
Broadband services
Smart modems
IPTV equipment
Office devices
3g/4g modems
IP phones
Keyboards & mouse
Why should we evolve?
4
5May'16
6May'16
Broadband & 3G/4G
IPTV/Satellite Broadcasting & VoD
Home & Office Equipment
7
Combining testing skills
Design reviews do not show business
logic issues
Tech must be tested for various
perspectives
Traditional tests do not cover
Devices’ firmware and hardware
Management in a protected network
Very limited days for testing
May'16
8
Testing methodology must be flexible
Various devices – ARM vs MIPS, Phone vs Modem
Various OSes – Android vs Linux vs VxWorks
Testing must always focus on the device’s roles
May'16
HARDWARE HACKING
CHRONICLES
Configuration
Edit & Re-Upload
May'16
Secret Handshake
to Enable Telnet
Physical
Interfaces
10
May'16 11
12
Weaknesses are already known
Configuration dump for credentials
Editing the conf to enable a feature
Vulnerabilities are public and easy
Telnet authentication bypass
Sagem: https://www.exploit-db.com/exploits/17670
Netgear:
https://wiki.openwrt.org/toh/netgear/telnet.console
E.g. admin password leak
wget http://1.1.1.1/password.html -t 1 -q -O - | grep pwd
May'16
Console Debugging
TX, RX, GND, V
May'16
Debugging On-Chip
Debug TDI, TDO,
TCK…
Access to Flash
Read/Write Data
SCK, MOSI, MISO...
13
May'16
Bus Pirate
Bus Blaster
Shikra
HydraBus
Jtagulator
GoodFet/GreatFet
Logic Analyser
SOIC8/16 Clips
14
May'16 15
May'16 16
May'16 17
May'16 18
19
Usually 4 PINs
TX, RX, GND, Voltage
Provides device access
Bootloader, console access
Real-time debugging
Access without a password
May'16
Find the ground
Find the voltage
Set the target voltage
Try to send/receive
TX vs RX
Various baud rates
Analyse the output
Jtagulator
May'16 20
May'16 21
Debugging and logging
Intercepting boot
sequence
Boot parameters
CFE access
Getting console access
E.g. Netgear CG3100D
May'16 22
May'16 23
May'16
Stop the boot process
UART/Serial connection
Possibilities
Re-flash for OpenWRT
Get information
 Credentials?
Dump the firmware
Eg. Sagemcom 3864v2
ADSL & NBN
24
May'16 25
26
Debugging standard
Everything depends on the vendor
Device or system testing
Daisy-chained JTAG
TDI (Test Data In)
TDO (Test Data Out)
TCK (Test Clock)
TMS (Test Mode Select)
TRST (Test Reset)
May'16
May'16 27
28
Internal communication interface
Direct connection to the flashes
Logic signals
SCLK : Serial Clock
MOSI : Master Output, Slave Input
MISO : Master Input, Slave Output
SS : Slave Select
May'16
Image: https://en.wikipedia.org/wiki/Serial_Peripheral_Interface_Bus
CUSTOMER PREMISES
EQUIPMENT
30
Broadband, IPTV, Satellite…
Devices are
connected to the infrastructure
managing by service provider
in the consumer promises
Relying on vendors for security
Default configuration
Legacy or unpatched software
Management interfaces
May'16
31
Various vendors in a pool
Device provisioning
Software & configuration
management
Call centre connections
Generic information in the wild
Custom software (e.g OpenWRT)
Bypassing controls is common
BYOD on subscriber services
May'16
Call Centre
May'16 32
Service Provider
ACS SIP
Provisioning Pool
BYOD
TR-069
DOCSIS RADIUS
May'16 33
IPTV STB
DVB STB
VOD
Streaming
DRM WEB
Services
VOD, Licenses, Keys, Billing
VOD, Licenses, Keys, Billing
CLOUD
SERVICE PROVIDER
ACS
BROADCAST
RADIUS
TR-069
May'16 34
Service Provider
ACS SIP
TR-069 / DOCSIS
RADIUSVOIP (SIP + RTP)
PSTN
PSTN
Service Provider
MSAN/MGW
Distributor
VOIP (SIP + RTP)
MANAGEMENT
May'16 35
3G Telecom Network
3G SIP
IPSEC VPN RADIUS
3G
3G
3G
Femtocell Pool
Base Station
TR-069
May'16 36
Debugging
Gathering
Information
Attacking
Server
Service network
Clients connected
ACS
TR-069
Modem
ACS on Modem TCP/7676
ACS on Server TCP/443
ACS Connection Intercepted
Modified Attacking ContentOriginal Content
37
Dumping device memory
X.509 certificates for IPSEC Auth
PINs, passwords and config data
Broadcasting and DRM keys
Dump device firmware
Reverse engineering, exploit dev
Driving a consumer device
Fake base station, billing bypass
Altering VoD content, security bypass
May'16
OFFICE DEVICES
39
Backdoors on devices are common
Open source, distribution, vendors…
Expensive to replicate the attack
Red teaming engagements
Putting a Raspberry Pi in everything
Collecting keyboard & mouse input
Human factor pen-testing
Sending backdoored devices
May'16
40
3G/4G Modems
 WiFi models with services and features
 USB models require drivers
 Internal storage and card reader
Unauthorised access via services
Firmware operations
 Dumping and reversing the firmware
 Backdooring the firmware
Using their shelves for USB duckies
May'16
41
Keysweeper by SamyKamkar
Arduino/Teensy based sniffer
Sniffing Microsoft Wireless Keyboard
Mousejack by Bastille Security
RF keyboard & mouse receivers
Force pairing vulnerability
Force pairing a remote keyboard
May'16
42
Efficient for persistent access
Raspberry Pi, Arduino
Can fit in many devices
Find a suitable device to backdoor
Find a power source
Find a network connection
Solder and connect the pieces
Broadcast the network connected
Advanced implants take time
May'16
May'16 43
RJ45 Connection Pins
May'16 44
Speaker Power
Patch the Cat5 cable
DEFENSE AND OFFENSE
46
Enforcing vendors to
Disable physical interfaces
Use encryption and access keys
Follow a security standard
Network isolation for subscribers
Tailored research for
Vendor product vulnerabilities
CPE management services
Backdoor analysis
May'16
47
Devices are IN SCOPE
Think different and combine skills
Everything is a target
Home automation, CCTV, phones…
Testing service operator networks
Test services through devices
Extract information from devices
Access and fuzz tests through
devices
May'16
48
Focuses on all components
Devices, infrastructure, software…
Focuses on exploitable issues
Combines various disciplines
Embedded systems, mobile, network…
Closes the gap between offense
and defense
May'16
49
Context Information Security
http://www.contextis.com
AusCERT
https://www.auscert.org.au
IoT Security Wiki
https://iotsecuritywiki.com
May'16
QUESTIONS?
THANKS!

More Related Content

PPTX
Aruba Netwrok(1).pptx
PPT
FCAPS from an ITIL perspective
PDF
6 understanding aruba rf issues
PPTX
Multiprotocol label switching (mpls) - Networkshop44
PPTX
Roaming behavior and Client Troubleshooting
PPTX
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
PPTX
Airheads Meetups- High density WLAN
PPTX
Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC
Aruba Netwrok(1).pptx
FCAPS from an ITIL perspective
6 understanding aruba rf issues
Multiprotocol label switching (mpls) - Networkshop44
Roaming behavior and Client Troubleshooting
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
Airheads Meetups- High density WLAN
Breakout - Airheads Macau 2013 - Top 10 Tips from Aruba TAC

What's hot (20)

PPT
Wireshark Inroduction Li In
PPTX
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
PDF
PPTX
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
PDF
Network Rightsizing Best Practices Guide
PPTX
Software defined network
PDF
Statistical Analysis of Results in Music Information Retrieval: Why and How
PDF
SOC Design Challenges and Practices
PPTX
Wireless Security null seminar
PPTX
Airheads Meetups: 8400 Presentation
PPTX
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
PPT
Linux networking
PPTX
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
PPTX
Slideshare - PCIe
PPTX
Difference between PCI PCI-X PCIe
PDF
The Basics of Automotive Ethernet Webinar Slidedeck
PPTX
Ignition Edge: Simplifying the Edge of the Network
PPT
Wireshark
PPTX
CompTIA Network+ Training Courses
PPTX
Kubernetes CRI containerd integration by Lantao Liu (Google)
Wireshark Inroduction Li In
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
Network Rightsizing Best Practices Guide
Software defined network
Statistical Analysis of Results in Music Information Retrieval: Why and How
SOC Design Challenges and Practices
Wireless Security null seminar
Airheads Meetups: 8400 Presentation
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
Linux networking
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
Slideshare - PCIe
Difference between PCI PCI-X PCIe
The Basics of Automotive Ethernet Webinar Slidedeck
Ignition Edge: Simplifying the Edge of the Network
Wireshark
CompTIA Network+ Training Courses
Kubernetes CRI containerd integration by Lantao Liu (Google)

Viewers also liked (19)

PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
PDF
The Art of VoIP Hacking - Defcon 23 Workshop
PDF
VoIP Wars: The Phreakers Awaken
PDF
VoIP Wars : Return of the SIP
PDF
Mahremiyetinizi Koruyun
PDF
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
PDF
Hacking SIP Like a Boss!
PDF
Metasploit Framework ile Exploit Gelistirme
PDF
VoIP Wars: Attack of the Cisco Phones
PDF
Viproy ile VoIP Güvenlik Denetimi
PDF
Mahremiyet Ekseninde Ozgur Yazilimlar
PDF
MBFuzzer : MITM Fuzzing for Mobile Applications
PDF
NGN ve VoIP Ağları Güvenlik Denetimi
PDF
Bilgi Guvenligi Temel Kavramlar
PDF
Ozgur Yazilimlar ile Saldiri Yontemleri
PDF
Metasploit Framework ile Güvenlik Denetimi
PDF
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
PDF
Netflix Global Cloud Architecture
PDF
More Details about TR-069 (CPE WAN Management Protocol)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
The Art of VoIP Hacking - Defcon 23 Workshop
VoIP Wars: The Phreakers Awaken
VoIP Wars : Return of the SIP
Mahremiyetinizi Koruyun
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Hacking SIP Like a Boss!
Metasploit Framework ile Exploit Gelistirme
VoIP Wars: Attack of the Cisco Phones
Viproy ile VoIP Güvenlik Denetimi
Mahremiyet Ekseninde Ozgur Yazilimlar
MBFuzzer : MITM Fuzzing for Mobile Applications
NGN ve VoIP Ağları Güvenlik Denetimi
Bilgi Guvenligi Temel Kavramlar
Ozgur Yazilimlar ile Saldiri Yontemleri
Metasploit Framework ile Güvenlik Denetimi
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Netflix Global Cloud Architecture
More Details about TR-069 (CPE WAN Management Protocol)

Similar to Hardware Hacking Chronicles: IoT Hacking for Offence and Defence (20)

PDF
CSI - Poor Mans Guide To Espionage Gear
PDF
Protecting your home and office in the era of IoT
PPT
Csi Netsec 2006 Poor Mans Guide Merdinger
PPTX
Making and breaking security in embedded devices
PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
PDF
side-channel-kevin2600
PDF
Compromising Industrial Facilities From 40 Miles Away
PPT
Attacking Embedded Devices (No Axe Required)
PDF
ANP catalog: the adversarial ninja playset
PDF
OWASP Cambridge Chapter Meeting 13/12/2016
PDF
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
PDF
ITAC 2015 - Hacking Smart Devices - 29 Sept 2015.pdf
PDF
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
PDF
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
PDF
IoT Hardware Teardown, Security Testing & Control Design
PDF
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
PPTX
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
PPTX
Webinar - Go On A Hardware Safari With Idealware - 2017-02-16
PDF
Ryan Wilson - ryanwilson.com - IoT Security
DOCX
Hack gadgets.docxhhhhhhhhhhhhhhhhhhhhhhhh
CSI - Poor Mans Guide To Espionage Gear
Protecting your home and office in the era of IoT
Csi Netsec 2006 Poor Mans Guide Merdinger
Making and breaking security in embedded devices
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
side-channel-kevin2600
Compromising Industrial Facilities From 40 Miles Away
Attacking Embedded Devices (No Axe Required)
ANP catalog: the adversarial ninja playset
OWASP Cambridge Chapter Meeting 13/12/2016
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
ITAC 2015 - Hacking Smart Devices - 29 Sept 2015.pdf
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
IoT Hardware Teardown, Security Testing & Control Design
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Webinar - Go On A Hardware Safari With Idealware - 2017-02-16
Ryan Wilson - ryanwilson.com - IoT Security
Hack gadgets.docxhhhhhhhhhhhhhhhhhhhhhhhh

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence