SlideShare a Scribd company logo
1 of 24
Download to read offline
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 1
MitM on USB
Introduction of USBProxy
   からぼ(kalab1998{e})
2014年10月31日 第22回「ネットワークパケットを読む会(仮)」
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 2
Self Introduction
● An engineer of a software company in Aizuwakamatsu
(until next Feb., and will not update)
● I'm looking for a next job very hard.
● I will found an independent researcher “KA-LAB”
(It's the second choice if no one employ me).
● I have no released open source software.
● I have two projects on github as follows.
– USBProxy is forked from dominicgs/USBProxy
– kalas is a BLAS on GPGPU for Huge Matrix 
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 3
Is USB a computer network?
YES!
USB is a computer network
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 4
Is USB a computer network?
Hub
Hub
USB is a tree structure
network in physical.
Host
computer
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 5
Is USB a computer network?
USB is one by one
connections from the host
to each device in logical.
Host
computer
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 6
How to communicate on USB?
Case:
Device to Host
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 7
How to communicate on USB?
Case:
Host to Device
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 8
Where is the host computer?
Now a days, increasing
such connections.
Are there
host computers?
※Vector Graphics has copyright of
this navigation icon.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 9
Which devices are the host?
hosthost
host
※Vector Graphics has copyright of
this navigation icon.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 10
We have an important problem.
● Hack devices such cameras, printers,
navigators, smartphones and so on.
It's usually very difficult.⇒
● Electrical tap on the USB cable.
Next slides.⇒
● Develop a USB Man in the Middle device.
Main theme for this presentation.⇒
How do we investigate vulnerabilities
of such devices without any laptop?
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 11
Electrical tapping on USB
http://hackaday.com/2011/03/16/usb-man-in-the-middle-adapter/
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 12
Electrical tapping on USB
● Conflicting signals
● Not enough electric power on signal lines
● Very weak against electrical noises
● Not running on USB2.0 by that specification
It's very easy, but it has some big problems.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 13
dominicgs/USBProxy
● The device must have two USB ports.
– One is for connecting a host.
– Another is for connecting a device.
● Software relaying
● Connectable USB2.0
● Sniffable / Filterable / Injectable
● Very cheap, BeagleBone Black is about $60.0
● https://github.com/dominicgs/USBProxy
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 14
USBProxy Structure
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 15
How to relay?
● USBProxy makes 6 kinds of threads runninng.
– Reader for Input EP,
– Reader for output EP,
– Writer for Input EP,
– Writer for Output EP,
– Injection,
– Filter
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 16
Connection Reader and Writer
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 17
Relay from device to host
● Reader for Input EP always requests data to
the Endpoint on the device.
● Reader for Input EP send data to Writer for
Input EP when it got data.
● Writer for Input EP sends data to the host.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 18
Relay from host to device
● Reader for Output EP always wait a request
and data from the host.
● Reader for Output EP send data to Writer for
Output EP when it got data.
● Writer for Output EP sends data to the Endpoint
on the device.
That's it. Very rough.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 19
Notification!
● USBProxy does not simulate the USB line.
● It just simulates endpoints on only one device.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 20
We have problems yet
● We want to simulate more devices.
● In many cases, it fail to simulate a device.
● It can't handle some complex devices yet.
● Linux lose endpoints on a device sometimes.
● It can't notice reset signal from a device.
● Very slow.
– Original speed is 30.7MB/s,
– USBProxy relay speed is 1,9MB/s.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 21
Other solutions
● If you want to just snif on USB, you can use
USB protocol analizer such the Beagle USB480
Power.
● If you are interesting in deep side, maybe you
will fall in darkness.
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 22
Beagle USB480 Power
● Easy to use
● Very fast, 29.8MB/s
● Cheap, just $2250.0
● Another device is
enable USB3.0,
just $3600.0
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 23
Do you want to fall in darkness?
● Kali Linux NetHunter "Bad USB" MITM Attack
● http://vimeo.com/106065667
2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 24
White page

More Related Content

What's hot

Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.KRIPAPIOUS
 
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...Abdullah al Mamun
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceAkshay Thakur
 
Artificial intelligence .pptx
Artificial intelligence .pptxArtificial intelligence .pptx
Artificial intelligence .pptxGautamMishra79
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial IntelligenceLuca Bianchi
 
Inteligenta artificiaa
Inteligenta artificiaaInteligenta artificiaa
Inteligenta artificiaaAdrianaTanase4
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT ConvergenceOpsRamp
 
Introduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionIntroduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionDarian Frajberg
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of ThingsSofian Hadiwijaya
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsAlexandru Radovici
 
Explainable AI in Industry (FAT* 2020 Tutorial)
Explainable AI in Industry (FAT* 2020 Tutorial)Explainable AI in Industry (FAT* 2020 Tutorial)
Explainable AI in Industry (FAT* 2020 Tutorial)Krishnaram Kenthapadi
 

What's hot (20)

Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
 
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
Artificial Intelligence: Classification, Applications, Opportunities, and Cha...
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial intelligence .pptx
Artificial intelligence .pptxArtificial intelligence .pptx
Artificial intelligence .pptx
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
 
Inteligenta artificiaa
Inteligenta artificiaaInteligenta artificiaa
Inteligenta artificiaa
 
IT and OT Convergence
IT and OT ConvergenceIT and OT Convergence
IT and OT Convergence
 
Introduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionIntroduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolution
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of Things
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Cse ppt 2018
Cse ppt 2018Cse ppt 2018
Cse ppt 2018
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
Explainable AI in Industry (FAT* 2020 Tutorial)
Explainable AI in Industry (FAT* 2020 Tutorial)Explainable AI in Industry (FAT* 2020 Tutorial)
Explainable AI in Industry (FAT* 2020 Tutorial)
 

Similar to MitM on USB -- introduction of USBProxy

MitM on USB -- Introduction of USBProxy --
MitM on USB -- Introduction of USBProxy --MitM on USB -- Introduction of USBProxy --
MitM on USB -- Introduction of USBProxy --Kiyotaka Atsumi
 
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)ariannaschlegel
 
Open-Source Hardware, Tinkering, and Physics Education
Open-Source Hardware, Tinkering, and Physics EducationOpen-Source Hardware, Tinkering, and Physics Education
Open-Source Hardware, Tinkering, and Physics EducationBrian Huang
 
Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 201244CON
 
small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)ariannaschlegel
 
Dragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshowDragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshow96Boards
 
How blink(1) was made – Hackaday 10th anniversary talk
How blink(1) was made –  Hackaday 10th anniversary talkHow blink(1) was made –  Hackaday 10th anniversary talk
How blink(1) was made – Hackaday 10th anniversary talktodbotdotcom
 
Getting started pi with android
Getting started pi with androidGetting started pi with android
Getting started pi with androidMasafumi Ohta
 
arduino
 arduino arduino
arduinojhcid
 
digitaldesign-s20-lecture3b-fpga-afterlecture.pdf
digitaldesign-s20-lecture3b-fpga-afterlecture.pdfdigitaldesign-s20-lecture3b-fpga-afterlecture.pdf
digitaldesign-s20-lecture3b-fpga-afterlecture.pdfDuy-Hieu Bui
 
Advanced Video Production with FOSS
Advanced Video Production with FOSSAdvanced Video Production with FOSS
Advanced Video Production with FOSSKirk Kimmel
 
Embedded Linux primer
Embedded Linux primerEmbedded Linux primer
Embedded Linux primerDrew Fustini
 
Ubiquitous Content Symposium 2009
Ubiquitous Content Symposium 2009Ubiquitous Content Symposium 2009
Ubiquitous Content Symposium 2009Shigeru Kobayashi
 
libreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux DistrolibreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux DistroAll Things Open
 
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...South Tyrol Free Software Conference
 
The RULE project: efficient computing for all GNU/Linux users
The RULE project: efficient computing for all GNU/Linux usersThe RULE project: efficient computing for all GNU/Linux users
The RULE project: efficient computing for all GNU/Linux usersMarco Fioretti
 
Intro to Hardware Programming with the Arduino Uno
Intro to Hardware Programming with the Arduino UnoIntro to Hardware Programming with the Arduino Uno
Intro to Hardware Programming with the Arduino UnoVui Nguyen
 

Similar to MitM on USB -- introduction of USBProxy (20)

MitM on USB -- Introduction of USBProxy --
MitM on USB -- Introduction of USBProxy --MitM on USB -- Introduction of USBProxy --
MitM on USB -- Introduction of USBProxy --
 
Let's begin io t with $10
Let's begin io t with $10Let's begin io t with $10
Let's begin io t with $10
 
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)
Small Electronics for Your Makerspace (CLC Trendspotting - September 2014)
 
Open-Source Hardware, Tinkering, and Physics Education
Open-Source Hardware, Tinkering, and Physics EducationOpen-Source Hardware, Tinkering, and Physics Education
Open-Source Hardware, Tinkering, and Physics Education
 
Polstra 44con2012
Polstra 44con2012Polstra 44con2012
Polstra 44con2012
 
Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012
 
small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)
 
Dragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshowDragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshow
 
How blink(1) was made – Hackaday 10th anniversary talk
How blink(1) was made –  Hackaday 10th anniversary talkHow blink(1) was made –  Hackaday 10th anniversary talk
How blink(1) was made – Hackaday 10th anniversary talk
 
Getting started pi with android
Getting started pi with androidGetting started pi with android
Getting started pi with android
 
arduino
 arduino arduino
arduino
 
digitaldesign-s20-lecture3b-fpga-afterlecture.pdf
digitaldesign-s20-lecture3b-fpga-afterlecture.pdfdigitaldesign-s20-lecture3b-fpga-afterlecture.pdf
digitaldesign-s20-lecture3b-fpga-afterlecture.pdf
 
Advanced Video Production with FOSS
Advanced Video Production with FOSSAdvanced Video Production with FOSS
Advanced Video Production with FOSS
 
Embedded Linux primer
Embedded Linux primerEmbedded Linux primer
Embedded Linux primer
 
Konstruktion omkring en Raspberry Pi
Konstruktion omkring en Raspberry PiKonstruktion omkring en Raspberry Pi
Konstruktion omkring en Raspberry Pi
 
Ubiquitous Content Symposium 2009
Ubiquitous Content Symposium 2009Ubiquitous Content Symposium 2009
Ubiquitous Content Symposium 2009
 
libreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux DistrolibreCMC : The Libre Embedded GNU/Linux Distro
libreCMC : The Libre Embedded GNU/Linux Distro
 
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
 
The RULE project: efficient computing for all GNU/Linux users
The RULE project: efficient computing for all GNU/Linux usersThe RULE project: efficient computing for all GNU/Linux users
The RULE project: efficient computing for all GNU/Linux users
 
Intro to Hardware Programming with the Arduino Uno
Intro to Hardware Programming with the Arduino UnoIntro to Hardware Programming with the Arduino Uno
Intro to Hardware Programming with the Arduino Uno
 

More from Mocke Tech

勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考えるMocke Tech
 
最新ニュースを音読させる
最新ニュースを音読させる最新ニュースを音読させる
最新ニュースを音読させるMocke Tech
 
制御システムのための検知と監視
制御システムのための検知と監視制御システムのための検知と監視
制御システムのための検知と監視Mocke Tech
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Mocke Tech
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2Mocke Tech
 
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)Mocke Tech
 
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムMocke Tech
 
A trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M networkA trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M networkMocke Tech
 
Making Portable Super Computer
Making Portable Super ComputerMaking Portable Super Computer
Making Portable Super ComputerMocke Tech
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringMocke Tech
 
Online programming examination
Online programming examinationOnline programming examination
Online programming examinationMocke Tech
 
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibratorsMocke Tech
 
20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cableMocke Tech
 

More from Mocke Tech (14)

勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える
 
最新ニュースを音読させる
最新ニュースを音読させる最新ニュースを音読させる
最新ニュースを音読させる
 
制御システムのための検知と監視
制御システムのための検知と監視制御システムのための検知と監視
制御システムのための検知と監視
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2
 
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
 
Slide
SlideSlide
Slide
 
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
 
A trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M networkA trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M network
 
Making Portable Super Computer
Making Portable Super ComputerMaking Portable Super Computer
Making Portable Super Computer
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Online programming examination
Online programming examinationOnline programming examination
Online programming examination
 
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
 
20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

MitM on USB -- introduction of USBProxy

  • 1. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 1 MitM on USB Introduction of USBProxy    からぼ(kalab1998{e}) 2014年10月31日 第22回「ネットワークパケットを読む会(仮)」
  • 2. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 2 Self Introduction ● An engineer of a software company in Aizuwakamatsu (until next Feb., and will not update) ● I'm looking for a next job very hard. ● I will found an independent researcher “KA-LAB” (It's the second choice if no one employ me). ● I have no released open source software. ● I have two projects on github as follows. – USBProxy is forked from dominicgs/USBProxy – kalas is a BLAS on GPGPU for Huge Matrix 
  • 3. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 3 Is USB a computer network? YES! USB is a computer network
  • 4. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 4 Is USB a computer network? Hub Hub USB is a tree structure network in physical. Host computer
  • 5. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 5 Is USB a computer network? USB is one by one connections from the host to each device in logical. Host computer
  • 6. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 6 How to communicate on USB? Case: Device to Host
  • 7. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 7 How to communicate on USB? Case: Host to Device
  • 8. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 8 Where is the host computer? Now a days, increasing such connections. Are there host computers? ※Vector Graphics has copyright of this navigation icon.
  • 9. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 9 Which devices are the host? hosthost host ※Vector Graphics has copyright of this navigation icon.
  • 10. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 10 We have an important problem. ● Hack devices such cameras, printers, navigators, smartphones and so on. It's usually very difficult.⇒ ● Electrical tap on the USB cable. Next slides.⇒ ● Develop a USB Man in the Middle device. Main theme for this presentation.⇒ How do we investigate vulnerabilities of such devices without any laptop?
  • 11. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 11 Electrical tapping on USB http://hackaday.com/2011/03/16/usb-man-in-the-middle-adapter/
  • 12. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 12 Electrical tapping on USB ● Conflicting signals ● Not enough electric power on signal lines ● Very weak against electrical noises ● Not running on USB2.0 by that specification It's very easy, but it has some big problems.
  • 13. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 13 dominicgs/USBProxy ● The device must have two USB ports. – One is for connecting a host. – Another is for connecting a device. ● Software relaying ● Connectable USB2.0 ● Sniffable / Filterable / Injectable ● Very cheap, BeagleBone Black is about $60.0 ● https://github.com/dominicgs/USBProxy
  • 14. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 14 USBProxy Structure
  • 15. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 15 How to relay? ● USBProxy makes 6 kinds of threads runninng. – Reader for Input EP, – Reader for output EP, – Writer for Input EP, – Writer for Output EP, – Injection, – Filter
  • 16. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 16 Connection Reader and Writer
  • 17. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 17 Relay from device to host ● Reader for Input EP always requests data to the Endpoint on the device. ● Reader for Input EP send data to Writer for Input EP when it got data. ● Writer for Input EP sends data to the host.
  • 18. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 18 Relay from host to device ● Reader for Output EP always wait a request and data from the host. ● Reader for Output EP send data to Writer for Output EP when it got data. ● Writer for Output EP sends data to the Endpoint on the device. That's it. Very rough.
  • 19. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 19 Notification! ● USBProxy does not simulate the USB line. ● It just simulates endpoints on only one device.
  • 20. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 20 We have problems yet ● We want to simulate more devices. ● In many cases, it fail to simulate a device. ● It can't handle some complex devices yet. ● Linux lose endpoints on a device sometimes. ● It can't notice reset signal from a device. ● Very slow. – Original speed is 30.7MB/s, – USBProxy relay speed is 1,9MB/s.
  • 21. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 21 Other solutions ● If you want to just snif on USB, you can use USB protocol analizer such the Beagle USB480 Power. ● If you are interesting in deep side, maybe you will fall in darkness.
  • 22. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 22 Beagle USB480 Power ● Easy to use ● Very fast, 29.8MB/s ● Cheap, just $2250.0 ● Another device is enable USB3.0, just $3600.0
  • 23. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 23 Do you want to fall in darkness? ● Kali Linux NetHunter "Bad USB" MITM Attack ● http://vimeo.com/106065667
  • 24. 2014/10/31 (c) 2014 kiyotaka@ka-lab.jp 24 White page