SlideShare a Scribd company logo
1 of 48
Download to read offline
Hacking challenge: steal a car!
Your "local partner in crime"
Sławomir Jasek
• IT security expert
• since 2005, and still loves this job
Agenda
• BLE vs security
• How to hack the car
• New tool
• Vulnerabilities examples
• Smart lock
• Anti-theft device
• Mobile PoS
• Other gadgets
• What can we do better
Bluetooth Smart? (aka Low Energy, 4.0...)
• Probably most thriving IoT technology
• Wearables, sensors, home automation,
household goods, medical devices, door
locks, alarms, banking tokens, smart
every-things...
• Completely different than previous
Bluetooth
BLE (v4.0) security: encryption
• Pairing (once, in a secure environment)
• JustWorks (R) – most common, devices without display cannot implement
other
• 6-digit PIN – if the device has a display
• Out of band – not yet spotted in the wild
• Establish Long Term Key, and store it to secure future communication
("bonding")
• "Just Works and Passkey Entry do not provide any passive
eavesdropping protection"
Mike Ryan, https://www.lacklustre.net/bluetooth/
BLE (v4.0) security in practice
• 8 of 10 tested devices do not implement BLE-layer encryption
• The pairing is in OS level, mobile application does not have full control over it
• It is troublesome to manage with requirements for:
• Multiple users/application instances per device
• Access sharing
• Cloud backup
• Usage scenario does not allow for secure bonding (e.g. public cash register, "fleet"
of beacons, car rental)
• Other hardware/software/UX problems with pairing
• "Forget" to do it, or do not consider clear-text transmission a problem
BLE (v4.0) security in practice
• Security in "application" layer (GATT)
• Various authentication schemes
• Static password/key
• Challenge-response (most common)
• PKI
• Requests/responses encryption
• No single standard, library, protocol
• Own crypto, based usually on AES
Controller (firmware)
Link layer
Physical layer
Host (OS)
Host Card Interface
L2CAP
SMP ATT
GATT
UNENCRYPTED
Satisfies regular users, but how about you?
So, how to hack the BLE car lock?
• Remote relay?
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
http://eprint.iacr.org/2010/332.pdf
So, how to hack the BLE car lock?
• Remote relay?
• Jamming?
• Brute force?
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
http://eprint.iacr.org/2010/332.pdf
So, how to hack the BLE car lock?
• Remote relay?
• Jamming?
• Brute force?
• BLE sniffing?
• Mobile app
analysis?
• ...
• MITM? http://greatscottgadgets.com/ubertoothone/
Man in the Middle?
Alice
Bob
Mallory
How to MITM: isolate the signal?
How to MITM?
Stronger signal?
• Class 1 adapter? +8dBm, 100m range
"little difference in range whether the other
end of the link is a Class 1 or Class 2 device
as the lower powered device tends to set
the range limit"
https://en.wikipedia.org/wiki/Bluetooth
More signals?
And how to handle them in a single system?
Typical connection flow
Advertise
Connect the advertising device (MAC)
Start scanning for advertisements
Specific advertisement received,
stop scanning
Further communication
MITM
Start scanning for advertisements
Advertise more
frequently
MITM?
Keep connection to
original device. It
does not advertise
while connected ;)
Specific advertisement received,
stop scanning
Connect the advertising device (MAC)
Further communication
New tool - architecture
Gather
advertisement
and services
data for
cloning
Keep
connection to
original device
forward
req/resp
Advertise
Get serv
servicesData
interception
and
manipulation
Advertise
(high freq)
Offer exact
services
Forward
req/resp
Get serv
services
websockets
New BLE MITM Tool – a must have for IoT tester!
• Open source
• Node.js
• Websockets
• Modular design
• Json
• .io website
• And a cool logo!
Car hacking challenge: authentication
Get "Challenge"
Commands (Open, Close...)
Random challenge
AES("LOGIN",AES(Challenge,key))
AES("LOGIN",
AES
(Challenge,
key
NOT ENCRYPTED: Open, Close...
Authentication: attack?
Open
AES("LOGIN",
AES
(Challenge,
key
Other cmdMITM
Get "Challenge"
Random challenge
AES("LOGIN",AES(Challenge,key))
Other commands (based on mobile app):
• setEngineBlockadeSetting – turn on/off
• setBlinker – blinker sequence unlocking engine
• initConfigMode – initiate the configuration – overwrite the
passwords
• initiateDataTransfer – dump the whole configuration (including all
passwords)
PRNG?
- Is there any function which allows to generate a random number?
- There is no function to do this. However, there is a reasonably good
alternative (...), which reads the module's serial number and uses the two
least significant bytes, then triggers a channel 14 (temperature) ADC read
and combines the two with some very basic math* to generate a sort of
"multiplier seed" which can be used for randomness.
* (multiplication of the values by themselves)
https://bluegiga.zendesk.com/entries/59399217-Random-function
Smart lock
• Challenge-response, session key
• Commands encrypted by session key
• Challenge looks random
• Ranging: GPS-enabled, you have to leave the area and return
• What could possibly go wrong?
• Let's take a look at the details...
Smart lock - protocol
Get "Challenge"
Challenge
SESSION KEY =
AES(Challenge,
KEY
Commands AES-encrypted by session key
Smart lock - protocol
Get "Challenge"
Challenge
SESSION KEY =
AES(Challenge,
KEY
Close lock
OK, closed
MITM
(intercept,
record,
pass
through)
Smart lock – attack
Get "Challenge"
Challenge (previously intercepted)
SESSION KEY =
AES(Challenge,
KEY
Close lock
OK, closed (repeat the encrypted)
MITM
(replay)
The same as
recorded session
Smart lock – attack v2
Get "Challenge" MITM
Do not forward
req to device.
Advertise status
"Closed"
STALL
CLOSED
Smart lock – DEMO
Smart lock: AT commands
• BLE module AT interface exposed
AT commands
AT commands
AT commands
Fallback to analog key may be unavailable...
DEMO: AT commands
DEMO: Anti-thief
DEMO: interception – static password
DEMO: Mobile PoS
But what about BLE encryption?
Bond – encrypted communication
"Just Works"
Bond – encrypted
communication
MITM
Bond – encrypted
communication
?
Remove pairing, new connection with MITM
Bond – encrypted
communication
MITM
Bond – encrypted
communication
New connection
PIN entry – trick into pairing again, sniff, crack
Bond – encrypted
communication
MITM
Passive
interception of
pairing process
Crack the PIN
using crackle
PIN entry – trick into pairing again, sniff, crack
Bond – encrypted communication
Some attacks
• Denial of Service
• Interception
• Replay
• Authentication bypass
• Proximity actions
• Misconfiguration/excessive
services abuse
• Logic flaws
• Badly designed crypto
• Brute force
• Fuzzing
• ...
Risk? It depends...
• Your pulse indication will not have any significance for
by-passing people
• But an adversary may be extremely interested in it
during negotiations
• Or, if it is used for biometric authentication in banking
application
http://www.ibtimes.co.uk/fears-barack-obamas-new-fitbit-fitness-
tracker-represent-national-security-risk-1492705
https://www.theguardian.com/technology/2015/mar/13/halifax-trials-
heartbeat-id-technology-for-online-banking
How to fix the problem?
• Use the BLE encryption, bonding, random MACs properly
• Do not implement static passwords
• Design own security layers with active interception
possibility in mind
• Beware excessive services, misconfiguration
• Prepare fallback for Denial of Service
• ...
• More details in whitepaper
Q&A?
More information, these slides, whitepaper, videos, tool source code:
slawomir.jasek@securing.pl

More Related Content

More from Priyanka Aash

EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber rangePriyanka Aash
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 

More from Priyanka Aash (20)

EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Attacking bluetooth smart devices: introducing a new BLE proxy tool

  • 1.
  • 3. Your "local partner in crime" Sławomir Jasek • IT security expert • since 2005, and still loves this job Agenda • BLE vs security • How to hack the car • New tool • Vulnerabilities examples • Smart lock • Anti-theft device • Mobile PoS • Other gadgets • What can we do better
  • 4. Bluetooth Smart? (aka Low Energy, 4.0...) • Probably most thriving IoT technology • Wearables, sensors, home automation, household goods, medical devices, door locks, alarms, banking tokens, smart every-things... • Completely different than previous Bluetooth
  • 5. BLE (v4.0) security: encryption • Pairing (once, in a secure environment) • JustWorks (R) – most common, devices without display cannot implement other • 6-digit PIN – if the device has a display • Out of band – not yet spotted in the wild • Establish Long Term Key, and store it to secure future communication ("bonding") • "Just Works and Passkey Entry do not provide any passive eavesdropping protection" Mike Ryan, https://www.lacklustre.net/bluetooth/
  • 6. BLE (v4.0) security in practice • 8 of 10 tested devices do not implement BLE-layer encryption • The pairing is in OS level, mobile application does not have full control over it • It is troublesome to manage with requirements for: • Multiple users/application instances per device • Access sharing • Cloud backup • Usage scenario does not allow for secure bonding (e.g. public cash register, "fleet" of beacons, car rental) • Other hardware/software/UX problems with pairing • "Forget" to do it, or do not consider clear-text transmission a problem
  • 7. BLE (v4.0) security in practice • Security in "application" layer (GATT) • Various authentication schemes • Static password/key • Challenge-response (most common) • PKI • Requests/responses encryption • No single standard, library, protocol • Own crypto, based usually on AES Controller (firmware) Link layer Physical layer Host (OS) Host Card Interface L2CAP SMP ATT GATT UNENCRYPTED
  • 8.
  • 9. Satisfies regular users, but how about you?
  • 10. So, how to hack the BLE car lock? • Remote relay? Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars http://eprint.iacr.org/2010/332.pdf
  • 11. So, how to hack the BLE car lock? • Remote relay? • Jamming? • Brute force? Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars http://eprint.iacr.org/2010/332.pdf
  • 12. So, how to hack the BLE car lock? • Remote relay? • Jamming? • Brute force? • BLE sniffing? • Mobile app analysis? • ... • MITM? http://greatscottgadgets.com/ubertoothone/
  • 13. Man in the Middle? Alice Bob Mallory
  • 14. How to MITM: isolate the signal?
  • 15. How to MITM? Stronger signal? • Class 1 adapter? +8dBm, 100m range "little difference in range whether the other end of the link is a Class 1 or Class 2 device as the lower powered device tends to set the range limit" https://en.wikipedia.org/wiki/Bluetooth More signals? And how to handle them in a single system?
  • 16. Typical connection flow Advertise Connect the advertising device (MAC) Start scanning for advertisements Specific advertisement received, stop scanning Further communication
  • 17. MITM Start scanning for advertisements Advertise more frequently MITM? Keep connection to original device. It does not advertise while connected ;) Specific advertisement received, stop scanning Connect the advertising device (MAC) Further communication
  • 18. New tool - architecture Gather advertisement and services data for cloning Keep connection to original device forward req/resp Advertise Get serv servicesData interception and manipulation Advertise (high freq) Offer exact services Forward req/resp Get serv services websockets
  • 19. New BLE MITM Tool – a must have for IoT tester! • Open source • Node.js • Websockets • Modular design • Json • .io website • And a cool logo!
  • 20. Car hacking challenge: authentication Get "Challenge" Commands (Open, Close...) Random challenge AES("LOGIN",AES(Challenge,key)) AES("LOGIN", AES (Challenge, key NOT ENCRYPTED: Open, Close...
  • 21. Authentication: attack? Open AES("LOGIN", AES (Challenge, key Other cmdMITM Get "Challenge" Random challenge AES("LOGIN",AES(Challenge,key))
  • 22. Other commands (based on mobile app): • setEngineBlockadeSetting – turn on/off • setBlinker – blinker sequence unlocking engine • initConfigMode – initiate the configuration – overwrite the passwords • initiateDataTransfer – dump the whole configuration (including all passwords)
  • 23. PRNG? - Is there any function which allows to generate a random number? - There is no function to do this. However, there is a reasonably good alternative (...), which reads the module's serial number and uses the two least significant bytes, then triggers a channel 14 (temperature) ADC read and combines the two with some very basic math* to generate a sort of "multiplier seed" which can be used for randomness. * (multiplication of the values by themselves) https://bluegiga.zendesk.com/entries/59399217-Random-function
  • 24. Smart lock • Challenge-response, session key • Commands encrypted by session key • Challenge looks random • Ranging: GPS-enabled, you have to leave the area and return • What could possibly go wrong? • Let's take a look at the details...
  • 25. Smart lock - protocol Get "Challenge" Challenge SESSION KEY = AES(Challenge, KEY Commands AES-encrypted by session key
  • 26. Smart lock - protocol Get "Challenge" Challenge SESSION KEY = AES(Challenge, KEY Close lock OK, closed MITM (intercept, record, pass through)
  • 27. Smart lock – attack Get "Challenge" Challenge (previously intercepted) SESSION KEY = AES(Challenge, KEY Close lock OK, closed (repeat the encrypted) MITM (replay) The same as recorded session
  • 28. Smart lock – attack v2 Get "Challenge" MITM Do not forward req to device. Advertise status "Closed" STALL CLOSED
  • 30. Smart lock: AT commands • BLE module AT interface exposed
  • 34. Fallback to analog key may be unavailable...
  • 37. DEMO: interception – static password
  • 39. But what about BLE encryption? Bond – encrypted communication
  • 40. "Just Works" Bond – encrypted communication MITM Bond – encrypted communication ?
  • 41.
  • 42. Remove pairing, new connection with MITM Bond – encrypted communication MITM Bond – encrypted communication New connection
  • 43. PIN entry – trick into pairing again, sniff, crack Bond – encrypted communication MITM
  • 44. Passive interception of pairing process Crack the PIN using crackle PIN entry – trick into pairing again, sniff, crack Bond – encrypted communication
  • 45. Some attacks • Denial of Service • Interception • Replay • Authentication bypass • Proximity actions • Misconfiguration/excessive services abuse • Logic flaws • Badly designed crypto • Brute force • Fuzzing • ...
  • 46. Risk? It depends... • Your pulse indication will not have any significance for by-passing people • But an adversary may be extremely interested in it during negotiations • Or, if it is used for biometric authentication in banking application http://www.ibtimes.co.uk/fears-barack-obamas-new-fitbit-fitness- tracker-represent-national-security-risk-1492705 https://www.theguardian.com/technology/2015/mar/13/halifax-trials- heartbeat-id-technology-for-online-banking
  • 47. How to fix the problem? • Use the BLE encryption, bonding, random MACs properly • Do not implement static passwords • Design own security layers with active interception possibility in mind • Beware excessive services, misconfiguration • Prepare fallback for Denial of Service • ... • More details in whitepaper
  • 48. Q&A? More information, these slides, whitepaper, videos, tool source code: slawomir.jasek@securing.pl