Top Banner
Device inspection To remote root Uncovering the sekritz of proprietary software on a fixed wireless terminal and weap0nizing them into a remote exploit Where What Who Ruxmon Melbourne Device Inspection to remote root Tim Noise
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Device inspection to remote root

Device inspection To remote root

Uncovering the sekritz of proprietary software on a fixed wireless terminal and weap0nizing them into a remote exploit

Where What Who

Ruxmon Melbourne Device Inspection to remote root

Tim Noise

Page 2: Device inspection to remote root

tIM NOISE

• twitter/dnoiz1 • github/dnoiz1 • mIRC/dnz • streetz/notorious D N Z • [email protected]

Internet subscriber and pirate impersonator

Page 3: Device inspection to remote root

Fixed Wireless Terminals

• Linux Based • System on Chip • Provide PoTS and ADSL • 3G/LTE Backhaul • Battery and Solar • Remote Managed • Deployed in Clusters

For people without copper or fiber

Page 4: Device inspection to remote root

External Connectors

• Ether over USB

(DHCP) • Aerial socket • SIM Card slot • 2 RJ11 ports for

ADSL CPE and PoTS

Things we can probe

Page 5: Device inspection to remote root

External Connectors

• SIM Card slot • 2 Management Ethernet Ports (NO DHCP)

• 2 RJ11 power management ports

Things we can probe

Page 6: Device inspection to remote root

Whats Inside?Rub the torx and the genie comes out

CPU

NAND0

NAND1

UART

Removable CF Card for /

Page 7: Device inspection to remote root

Whats Inside?Rub the torx and the genie comes out

Mini PCMCIA3G Modem

Page 8: Device inspection to remote root

Boot ProcessRedboot the buspirate, yarr

GND

RX

TX

VCC / NC

Page 9: Device inspection to remote root

Gaining ROOTalways want that uid 0 - the usual tricks

• Removable root Media • hashcat / jtr

• kernel paramaters • init=/bin/sh • single user mode

• Lucky for us, the root password is

printed on the PCB (not even joking)

Page 10: Device inspection to remote root

MANAGEMENT InTERFACEthe dububdub

Page 11: Device inspection to remote root

MANAGEMENT InTERFACEthe dububdub

Page 12: Device inspection to remote root

Logging INConnecting using the management USB interface

Page 13: Device inspection to remote root

PortsANDProcessessWhats running on this thing?

Page 14: Device inspection to remote root

PortsANDProcessessWhats running on this thing?

Page 15: Device inspection to remote root

PortsANDProcessessWhats running on this thing?

Page 16: Device inspection to remote root

Back to the SourceWhere is this process stored and launched from

Page 17: Device inspection to remote root

DECOMPYLEUsing multiline strings as comments is great!

Page 18: Device inspection to remote root

Vulnerability 1: UNPICKLESerializing objects its so convenient for passing them over a udp socket

Page 19: Device inspection to remote root

Vulnerability 1: UNPICKLESerializing objects its so convenient for passing them over a udp socket

Page 20: Device inspection to remote root

Putting it all Togethermaking use of our discovered vulnerabilities

Page 21: Device inspection to remote root

Putting it all Togethermaking use of our discovered vulnerabilities

Page 22: Device inspection to remote root

Putting it all Togethermaking use of our discovered vulnerabilities

Page 23: Device inspection to remote root

Putting it all Togethermaking use of our discovered vulnerabilities

Page 24: Device inspection to remote root

DEMO

Page 25: Device inspection to remote root
Page 26: Device inspection to remote root

One Step FURTHER

• Connect back payloads • Dial 1900 numbers for profit • UDP broadcast the attack • Intercept data and telephony • Insta-botnet / onion network • Other bad things

For internet bad men

Page 27: Device inspection to remote root

QUESTIONS?

Page 28: Device inspection to remote root

tIM NOISE

• twitter/dnoiz1 • github/dnoiz1 • mIRC/dnz • streetz/notorious D N Z • [email protected]

Internet subscriber and pirate impersonator