all wireless communication stacks are equally broken
play

All wireless communication stacks are equally broken Jiska Classen - PowerPoint PPT Presentation

All wireless communication stacks are equally broken Jiska Classen Secure Mobile Networking Lab - SEEMOO Technische Universitt Darmstadt, Germany A foundation talk??? Wireless communication is fun damentally broken focus: everything in


  1. All wireless communication stacks are equally broken Jiska Classen Secure Mobile Networking Lab - SEEMOO Technische Universität Darmstadt, Germany

  2. A foundation talk??? Wireless communication is fun damentally broken… …focus: everything in a smartphone . Communication range Specification length Wi-Fi LTE Bluetooth NFC Lines of code Higher complexity rises chance of issues with the specification and implementation! 2

  3. Complexity LTE Vendor-specific additions 3

  4. WIRELESS EXPLOITATION NEW Fuzzing Techniques NEW Escalation Targets 4

  5. Layers and Privileges Execution within a component means ● security measures like encryption Up to $1.5m User become ineffective . Messenger Applications Space Zero Click Less interaction / more distance / ● RCE+LPE harder to find / privileged component / higher market demand Daemons / Subsystem Up to $200k → more expensive Privileged Stuff Baseband Attackers hate physical proximity! ● RCE+LPE Driver Up to $100k Hardware Firmware Wi-Fi RCE F�E� ��N�� RCE: Remote Code Execution, LPE: Local Privilege Escalation. 5 Zerodium price list in December 2019, actual prices on the black market might vary.

  6. Advanced Wireless Tooling @ SEEMOO NFCGate Nexmon Qualcomm LTE Project lead: Project lead: Matthias Schulz Project lead: ● ● ● Max Maass Binary patching framework for Arash Asadi ● Broadcom Wi-Fi 2.4 GHz software-defined radio ● InternalBlue Project lead: Jiska ● Broadcom Bluetooth ● OWL / OpenDrop Project lead: Milan Stute ● Open source Apple AirDrop ● implementation Most of our projects are available online! https://github.com/seemoo-lab 6 Hackers gonna hack… Google Project Zero ● InternalBlue was used to ● Honeypots @ Black Hat ● (April 2017, Gal Beniamini) demonstrate the KNOB attack AirDos ● Broadpwn ● on Bluetooth key negotiation (December 2019, Kishan Bagaria) (July 2017, Nitay Artenstein) (August 2019, Daniele Antonioli Quarkslab ● et. al.) (April 2019, Hugues Anguelkov)

  7. Hackers gonna hack... Google Project Zero (April 2017, Gal Beniamini) ● Broadpwn (July 2017, Nitay Artenstein) ● Quarkslab (April 2019, Hugues Anguelkov) ● GREETINGS IF EVERYONE USES OUR TOOLS FOR EXPLOITATION Demonstration of the KNOB attack on ● Bluetooth key negotiation (August 2019, Daniele Antonioli et. al.) Honeypots @ Black Hat WHY NOT DO IT ● AirDos ● OURSELVES? (December 2019, Kishan Bagaria) 7

  8. NEAR FIELD COMMUNICATION 8

  9. NFCGate Wireless signals travel with speed of light, distance bounding is possible. ● NFC applications usually do not check any time constraints. ● Lab project: ● Forward communication of an NFC-based payment system. ○ Vulnerable to relays and even modification of messages in some cases. ○ Solution: ● 3rd parties asked our students to stop testing :) ○ https://github.com/nfcgate/nfcgate (also by SEEMOO) 9

  10. Near Field Communication VISA … … specification compliant fraud \o/ Other 3rd parties continued analyzing NFC security. First Contact - Vulnerabilities in Contactless Payments: https://www.blackhat.com/eu-19/briefings/schedule/index.html#first-contact---vulnerabilities-in-contactless-payments-17454 10

  11. BLUETOOTH CHIP REMOTE CODE EXECUTION Applications Daemons / Subsystem Driver Firmware 11

  12. Code Execution on a Bluetooth Chip Request the encryption keys for any MAC address. ● Specification compliant request: HCI_Link_Key_Request . ○ Impersonate devices, overhear encrypted ○ communication, … → Break Android Smart Lock and similar features! LAST TIME I UPDATED BLUETOOTH IN MY CAR? More possibilities to escalate into other components. ● 12

  13. Exploit Persistence Broadcom/Cypress chips only ● flush queues, connections, etc. upon reset. No full hardware reset. Many operating systems will only ● issue a HCI_Reset command. Flight mode might hard reset ● the chip. Reboot might hard reset the ● chip. (Coexistence behavior sometimes persists…) Turning off your smartphone ● will hard reset the chip. 13

  14. Frankenstein NEW Fuzzing Techniques Emulate Bluetooth firmware with Linux Host the same speed as in hardware for realistic full-stack fuzzing . Pseudo UART Terminal The Linux host can run a full Bluetooth ● stack on a desktop setup. Add an xmit_state hook to the ● Bluetooth firmware function of interest, Snapshot e.g., device scanning, active connection, … Reattach emulated snapshot with Fake IO ● Modem Registers btattach , enter a similar state on the desktop, and start fuzzing. Air Fuzzed Input DEMO! Jan Ruge fuzzed the unfuzzable! 14

  15. Fuzzinating! Jan: Fuzzes early connection states , finds heap overflows in basic packet types. iPhone 11: Can you hear me? I come with Bluetooth 5.1! Me: The connection state can be paired and encrypted, any user or app interaction is valid input, as long as I can get code execution on that chip. … enters a more complicated state for fuzzing … Me: Oh noes, they misconfigured the heap on this one specific evaluation board. Fixing the heap hard-bricked one evaluation board. … porting ~200 handwritten hooks to another evaluation board with correct heap … 15

  16. Fuzz next? Android Linux macOS Fake IO Software- Registers defined radio Fuzzed Input Air Just a roadmap, we didn’t build this yet! Opens way more possibilities than just fuzzing. 16

  17. CHIP LEVEL ESCALATION Applications Daemons / Subsystem Driver Firmware Firmware 17

  18. Coexistence: Escalation within the Chip Bluetooth / Wi-Fi Combo Chip Bluetooth Wi-Fi Coexistence Francesco Gringoli and me worked on this. 18

  19. Coexistence??? Francesco: I guess it’s just a marketing feature. Me: Aww it must be an exploitation feature! … traveling to Italy for eating some gelato … Reality: Hard-coded blacklisting and traffic classes for Bluetooth and Wi-Fi. Tons of patents. NEW Proprietary deluxe! Escalation Targets 19

  20. Almost a Demo :) You can disable Wi-Fi via Bluetooth and Bluetooth via Wi-Fi. ● Sometimes requires manual reboot to get wireless stuff working again. ● Buggy driver panics some older Androids and all up-to-date iPhones . ● Broadcom says six months might be sufficient to fix firmware . ● … but exploitation requires code execution on the Bluetooth or Wi-Fi chip. ● iOS 13 Release Notes panic-full Tested iOS 12.4 (reported end of August), still not fixed in 13.3... 20

  21. ESCALATE ALL THE STACKS Applications Daemons / Subsystem Driver Firmware 21

  22. Attacking Bluetooth Hosts BlueBorne: Various attacks on Android, Windows, Linux, iOS. ● … okay but that was 2017? ● If someone looked into it, it must be secure now! Vulnerability with a logo! IoT gadgets, wireless headphones, fitness trackers, … ● Apple ecosystem: Bluetooth is almost everywhere and always enabled. ● Web Bluetooth : BLE support within various browsers. ● 2020 might bring a couple of BlueBorne like attacks. BlueBorne by Armis https://www.armis.com/blueborne/ 22

  23. The Linux Bluetooth Stack Number of commits in BlueZ: 23% Committer #1 ● 17% Committer #2 ● 15% Committer #3 ● 5% Committer #4 ● The BlueZ Man Group Tim Walter did some fuzzing in the Linux Bluetooth Stack :) 23

  24. The Apple Bluetooth Stack(s) NOT SURE IF HARD TO REVERSE ENGINEER OR JUST REALLY BAD CODE WHY NOT BOTH? Dennis Heinze (@ttdennis) ported InternalBlue to iOS, Davide Toldo (@unixb0y) ported it to macOS. They enjoyed it a lot! 24 Alexander Heinrich (@Sn0wfreeze) supervised by Milan Stute looked into Handoff.

  25. The Android Bluetooth Stack ??? !!! OK?? Because all our chip reversing projects start on Android. 25

  26. Bluetooth for Bluescreens??? :( Sadly I couldn’t find any student who wants to work on this yet. 0% complete But if you are really into pain, consider this as a job offer for a student thesis @ SEEMOO :D 26

  27. LTE* * LONG TERM EXPLOITATION 27

  28. All Assembly is Beautiful! ! P S D n o g a x e H m m o c l a u Q , u o y t o N 28

  29. Simjacker and WIBAttack Purpose of a SIM card: Protect sensitive key material . (??!!) ● SIM cards can be configured remotely by your ● telecommunication provider. … SIM cards including eSIMs … ● Vulnerability Receiving a victim’s location, ○ with a logo! SIM card technology fraud by dialing premium numbers, ○ from A-Z … launch browser. ○ LaF0rge I’m a Telekom business customer, making a call to the ● support hotline takes less than 3 minutes. Phone: 13.9. 2x, 19.9., 21.9., 27.9., 1.10., 17.10. ● Mails: 3x … ● LAUNCH BROWSER Still no answer what is running on my SIM cards. ● https://simjacker.com/ 29

  30. LTEFuzz Highly complex LTE state ● machines. Implementation failures in ● backends and mobile devices. SigOver + alpha CheolJun Park, Mincheol Son https://sites.google.com/view/ltefuzz 30

  31. RESPONSIBLE DISCLOSURE 31

Recommend


More recommend