All your Bluetooth is belong to us - the rest too.

Thierry Zoller
Thierry ZollerInformation Security and Privacy Risk Manager
+
Bluetooh – Please just turn it off
! "! "! "! "
"
Yeah
Who we are ? – Hippies
Kevin Finistere
Former Head of Research of SNOSoft
Found Vulnerabilities in Apple, IBM, SAP,
Oracle, Symantec…
Has contributed a lot to this talk
Not here today
Thierry Zoller
Welcome home
Security Consultant @ N.runs
Found vulnerabilities in Checkpoint, Symantec,
Citrix, F-Secure, MySQL4, MacAfee, Nod32…
Don‘t like to talk about me, see for yourself.
Batteries not inlcuded.
Mad Hax0r
The Goal of this Talk ?
The Goal of this talk is not to:
Build myths
Show off – and not show how
The Goal of this talk is to :
Raise awareness
Make risks transparent
Paradigm Shift – Bluetooth is not only for toys
Clear the air about InqTana
What are we talking about today ?
[ 0x00 ] – Introduction : What is Bluetooth ?
How does it work and hold together ?
Security Modes, Paring modes
Scatternets, Piconets..
What‘s the difference to WiFi (802.11a/b/g) ?
Common Implementations of the Protocol
[ 0x01 ] – Get ready to rumble : Extending the Range
Extending the range of Bluetooth devices
Building automated reconnaissance and attack devices
Bluetooth War driving (GPS, 360°Camera)
More..
[ 0x02 ] – Attack! : Getting dirty with it
Attacking Mobile Phones / Handhelds / PDAs
Attacking Cars / Headsets / Free Hands kits
Attacking Internal Networks (0day)
Attacking the Protocol, braking the encryption (0day)
Tracking the un-trakeable and more..
[ 0x00 ] Introduction
What is Bluetooth ?
Invented 1995 by Ericsson, SIG formed 1998 (Bluetooth Special
Interest Group )
Bluetooth 1.0 - 1.7.1999, first devices sold in mid 2000
Named after “Harald Blauzahn”
Goal was, low-cost “cable replacement”
Personal Area Networks
Tech Specs
2.400-2.4835 GHz (WiFi, Cameras, etc..)
Frequency Hopping, up to 3200 times
per second ! (1600 in connection state)
[ 0x00 ] Introduction
The difference and similarities with WiFi :
Operate on the same ISM band : 2,4Ghz
WiFi 11 Channels, Bluetooth 79 Channels
Both do frequency hopping (WiFi 600 times slower)
WiFi broadcasts it’s presence every x ms
Bluetooth is a complete Framework with
Profiles and layers of protocols
Obvious: Range
[ 0x00 ] Introduction
What does it do for me ?
Cable Replacement
Data/Voice
Personal Area Networks
[ 0x00 ] Introduction
The foundation – Protocol Stack
Hardware
Software
[ 0x00 ] Introduction
The Bluetooth Profiles
Represent a group and defines mandatory options
Prevent compatibility issues, modular approach to BT extensions
Vertical representation of BT layer usage, handled through SDP
Object Push Profile
[ 0x00 ] Introduction
Typical Bluetooth Scenario (1)
Simplistic Model (ignoring security for now)
1 - User goes into a lobby and wants to read email
2 - Clicks on the PDA Email application
3 - Sends and receives Email
[ 0x00 ] Introduction
Typical Bluetooth Scenario (2)
Inquiry
Inquiry response
Paging (FHS)
Link establishment
Discovers
Profiles
Bluetooth
Access Point
[ 0x00 ] Introduction
Piconets / Scatternets
A Piconet can hold 7 active (and 255 parked) slaves and 1 master,
PTP and PTMP
Master
Slaves
Piconet 1 Piconet 3
Piconet 2
[ 0x00 ] Introduction
Frequency Hopping
Slaves always sync to the Master
Hop up-to 3200 times a second over 79
channels using 625 s length
Piconet agrees to a Sequence based on the
BD_ADDR and Clockoffset of the master.
(Now THIS is a unique fingerprint)
This procedure called “Paging” in Bluetoohesque
FH is the reason you can not easily sniff these BT connections.
You have to sync to the Master (or use a Spectral Analyzer and
reconstruct afterwards – Good luck)
[ 0x00 ] Introduction
Discoverable modes :
Discoverable :
Sends inquiry responses to all inquiries.
Limited discoverable:
Visible for a certain period of time (Implementation bugs..)
Non-Discoverable:
Never answers an inquiry scan (in theory)
Pairing modes :
Non-pairable mode :
Rejects every pairing request (LMP_not_accepted) (Plantronics)
Pairable mode :
Will pair up-on request
[ 0x01 ] Get ready to rumble
Extending the Range
[ 0x01 ] Get ready to rumble
Extending the Range
Class 3
Class 2
Class 1
Home Grown
10 M
25 M
100 M
788 M
Specification defines 3 classes :
- Class 1 - 100 mW (20 dBm)
- Class 2 - 2.5 mW (4 dBm)
- Class 3 - 1 mW (0 dBm)
Up to 2,6km are possible
Home Grown
[ 0x01 ] Get ready to rumble
HOW-TO
Modify class 1 dongle to accept
an aftermarket antenna.
Basic soldering skills required
Provides much more flexibility when
testing
Connects to an Laptop that
supports USB
Instant Ownage
[ 0x01 ] Get ready to rumble
Long Distance - Datasets
Antrum Lake, water reflection
guarantees longer ranges.
788 Meter !
An old Man stole my phone
during this test! I tracked
him with the yagi.
[ 0x01 ] Get ready to rumble
Long Distance - Datasets
Strassen, Luxembourg
550 Meter
Thanks Jerome Carrère
[ 0x01 ] Get ready to rumble
Long Distance - More More
New World record attempt
by Kevin
Use of high precision Trimble
GPS receivers will be used.
DGPS data correction for
centimeter accuracy
2,6 km !
Needs narrow antenna beam
[ 0x01 ] Get ready to rumble
Optimizing for Penetration (1)
Integrated Linksys Dongle
Integrated USB Cable
Metal Parabola
10 * Zoom
Laser (to be done)
[ 0x01 ] Get ready to rumble
Optimizing for Penetration (2)
Bundling (Parabola)
Higher penetration through walls
Glass is your friend
On board embedded device. (NSLU2)
Auto scan and attack toolkit
Experiment : Went through a building
found the device on the other side IN
another building.
[ 0x01 ] Get ready to rumble
PerimeterWatch – Bluetooth Wardriving
Perl Script by KF
Searches Bluetooth Devices
Takes 360°pictures
GPS coordinates
[ 0x02 ] Attack !
Attacking Bluetooth Devices – Bypassing security
[ 0x02 ] Attack !
Menu du Jour :
Bluebug (AT over RFCOMM)
Bluesnarf (Obex)
Car Whisperer
Limited time, sorry..
Some 0-day :
Owning internal Networks over Bluetooth
Attacking the Protocol:
Bluecrack - BT Pin and Link key cracker
Widcomm Overflow (Broadcom merger leaves lots of vuln users that
can not patch) BTW 3.0.1.905 (../ attacks) and up to BTW 1.4.2.10
has (overflows)
[ 0x01 ] Get ready to rumble
Luxembourg – 1 hour Bluetooth Scan
Boulevard Royal
295 unique discoverable
Bluetooth devices
Lots of vulnerable ones
[ 0x01 ] Get ready to rumble
Luxembourg – 1 hour Bluetooth Scan
00:0E:9F - Audi UHV – Pin 1234
Nokia 6310 - Disaster
[ 0x02 ] Attack !
Implementation - Issues Galore
Pairing always enabled
Rare – few devices
Headsets (Plantronix) – Pairing Button is useless
Default Pins (0000, 1111 …)
Discovery enabled
Lots of Devices
Siemens T60 – stays in discover mode if you ping it, might be attacked
forever.
Hidden (non advertised) Services
ObexIRDA, etc Nokia, others..
[ 0x02 ] Attack !
Bluebug Attack – Trifinite Group
The Service that shouldn’t be there
Read phonebook
Read / Send SMS
Dial Number
Redirect Calls
Etc…
Vulnerable devices :
Nokia 6310, Nokia 6310i, Nokia 8910i, Nokia 8910, T68, Sony Ericsson
T68i, T610, T68, T68i, R520m, T610, Z1010, Z600, Motorola V80, V5xx,
V6xx and E398 and others…
[ 0x02 ] Attack !
Bluesnarf Attack – Trifinite Group
Basically a “get” request over OBEX Push
Obex Push usually not authenticated
Request for known files, telecom/pb.vcf
Vulnerable devices :
Nokia 6310, Nokia 6310i, Nokia 6650, Ericsson T610, Ericsson
T68, Ericsson T68i, Ericsson T630, Ericsson Z600 others…
Give me your phonebook
Ok
[ 0x02 ] Attack !
CarWhisperer – Martin Herfurt
Listen and Record Conversations
Eavesdrop on Headsets, Hands-Free kits
Works against Widcomm < BTW 4.0.1.1500
with no pincode required!
Root Cause :
Paring mode, discoverable, hard coded Pin.
[ 0x02 ] Attack !
Wireless Keyboards
If HID server (PC) accepts connections, you
might remotely control the PC. (Collin R. Mulliner)
If you have the link key :
- decryption of packets i.e. capture the keystrokes.
- connect to the PC and remotely control it
[ 0x02 ] Attack !
The PIN is not really that useful
The link key is !
Here’s why :
Protocol 1.2 Authentication :
[ 0x02 ] Attack ! – 0day
InqTana - Setting the Record straight
Kevin created a cribbled PoC Worm
named InqTana
It’s real, it’s here and it’s not an invention
of the AV industry, KF handed it over in order
for them to protect you against these types of
attacks.
ObexFTP server directory traversal exploit,malicious InputManager
and a local root exploit = remote login tty over rfcomm
NO user interaction required
Media completely missed the point and invented an obscure
conspiracy theory
Points were :
- Macs are NOT invulnerable (the flaw is patched now)
- You can own internal networks over Bluetooth
[ 0x02 ] Attack ! – 0day
Obex ../../../ - Owning internal networks
Apple
OSX 10.3 Tiger
OSX 10.4 Jaguar
Vanilla, delayed release
Windows
Widcomm, Toshiba,
Bluesoil, others ?
Pocket PC
Kevin: Apple asked me to not tell 10.4 was shipping vulnerable
OSX 10.3.9 patched, OSX 10.4 shipped vulnerable patched a month
after OSX 10.3.9
[ 0x02 ] Attack ! – 0day
MAC OS 10.3 & 10.4 Vanilla
Multi-Staged attack :
Step 1 – ObexFTP ../../../ Attack
Step 2 – Using Input Manager launches Root exploit
(then binds getty to the pda sync port)
Step 3 – Connecting to Port 3 over Rfcomm
Step 4 – Harvesting Keys
Step 5 – Owning the network,
scanning for other BT devices,
compromising them.
[ 0x02 ] Attack ! – 0day
MAC OS 10.3 & 10.4 Vanilla
Multi-Staged attack :
Spoofing the BD_Address of the Apple and
authenticating through stolen link key.
[ 0x02 ] Attack ! – 0day
Transposed to a Company
Server Room
Workstations
[ 0x02 ] Attack ! – 0day
Get the Code
For Hack.lu, Inqtana code release :
http://www.digitalmunition.com
Presented also in the upcoming Hacking Exposed : Wireless
[ 0x02 ] Attack !
BUT – The misconception vault
we have an USB policy
BT is only 10 meters
we have automatic patches
we have preset policies disabling all Wireless devices
Your internal networks are at risk.
Implement Mitigation / Monitoring
RFProtect and similar Products
[ 0x02 ] Attack ! – 0day
Introducing BTCrack
Hack.lu release
Cracks PIN and Linkkey
Requires values from a Pairing sniff
We can force repairing by using
various Methods
Based on the research
of Shaked and Wool
4 digits pin – 0,25 seconds
[ 0x02 ] Attack ! – 0day
Introducing BTCrack
[ 0x02 ] Attack ! – 0day
BT Crack – Behind the scenes (1)
Pairing
Step1
Generates (RAND)
K = E22(RAND, PIN, PIN_LEN)
Device A Device B
Step1
K = E22(RAND, PIN, PIN_LEN)
Rand
Step2
Generates (RANDA)
CA = RANDA xor K
Step2
Generates (RANDB)
CB = RANDB xor K
CA
CB
Step3
RANDB=CA xor K
LKA=E21(RANDA, ADDRA)
LKB=E21(RANDB,ADDRB)
LKAB=LKA xor LKB
Step3
RANDB=CA xor K
LKA=E21(RANDA, ADDRA)
LKB=E21(RANDB,ADDRB)
LKAB=LKA xor LKB
Step4
SRESA =
E1(CH_RANDA,ADDRB,LKAB)
Step4
SRESB =
E1(CH_RANDA,ADDRB,LKAB)
CH_RANDA
SRESB
Step5
SRESA = SRESB
E22 = Connection key
E21 = Device key
[ 0x02 ] Attack ! – 0day
BT Crack – Behind the scenes
Right : Shaked and Wool logic
Bottom: Pseudo code by Tomasz Rybicki
Pin =-1;
Do
{
PIN++;
CR_K=E22(RAND, PIN, length(PIN));
CR_RANDA = CA xor CR_K;
CR_RANDB = CB xor CR_K;
CR_LKA = E21 (CR_RANDA, ADDRA);
CR_LKB = E21 (CR_RANDB, ADDRB);
CR_LKAB = CR_LKA xor CR_LKB;
CR_SRES = (CH_RAND, ADDRB, CR_LKAB);
}
while (CR_SRES == SRES)
Hackin9 04/2005 - Tomasz Rybicki
[ 0x02 ] Attack ! – 0day
BT Crack – Demo
[ 0x02 ] Attack ! – 0day
BT Crack – Download
Give me a bit of time to fix the bugs
Will be available at http://www.nruns.com
[ 0x02 ] Attack !
Windows Widcomm - Buffer overflows
Video
http://www.digitalmunition.com/Widcomm.avi
File
Vulnerable versions
Widcomm Stack up to 3.x is vuln
Widcomm BTStackServer 1.4.2 .10
Widcomm BTStackServer 1.3.2 .7
Widcomm Bluetooth Communication Software 1.4.1 .03
HP IPAQ 2215
HP IPAQ 5450
[ 0x02 ] Attack !
Windows Widcomm - Buffer overflows
[ 0x02 ] Attack ! – 0day
Owning the Secret Service ? ;)
MicroEarpiece – worlds smallest
Goes into the ear Tunnel
Jabra Headset - Pin Code : 0000
Seriously: You can get it at MicroEarPiece.com
Not discoverable, not in Pairing mode, got it yesterday evening, no time
[ 0x02 ] Attack !
Things to Remember :
Bluetooth might be a risk for your Company
Don’t accept every file you are being send, just click NO.
Disable Bluetooth if not required
Pair in “secure” places (SIG Recommendations)
Hold your Bluetooth vendor accountable for vulnerabilities!
1 of 51

Recommended

23c3 Bluetooth hacking revisited by
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisitedThierry Zoller
823 views41 slides
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015 by
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
2.3K views57 slides
Wireless security by
Wireless securityWireless security
Wireless securityAurobindo Nayak
711 views52 slides
Wifi hacking by
Wifi hackingWifi hacking
Wifi hackingHarshit Varshney
2.5K views12 slides
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf by
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfFelipe Prado
26 views35 slides
Dror-Crazy_toaster by
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
1.1K views28 slides

More Related Content

What's hot

IoT security is a nightmare. But what is the real risk? by
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
7.9K views58 slides
How to hack wireless internet connections using aircrack-ng by
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
3.9K views19 slides
Hacking wireless networks by
Hacking wireless networksHacking wireless networks
Hacking wireless networksSahil Rai
4.3K views16 slides
A tutorial showing you how to crack wifi passwords using kali linux! by
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!edwardo
4.3K views6 slides
Ce hv6 module 60 firewall technologies by
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
639 views63 slides
Hacking RF based IoT devices by
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devicesErez Metula
364 views39 slides

What's hot(20)

IoT security is a nightmare. But what is the real risk? by Zoltan Balazs
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs7.9K views
How to hack wireless internet connections using aircrack-ng by Open Knowledge Nepal
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Hacking wireless networks by Sahil Rai
Hacking wireless networksHacking wireless networks
Hacking wireless networks
Sahil Rai4.3K views
A tutorial showing you how to crack wifi passwords using kali linux! by edwardo
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
edwardo4.3K views
Hacking RF based IoT devices by Erez Metula
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
Erez Metula364 views
SNMP : Simple Network Mediated (Cisco) Pwnage by SensePost
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
SensePost1.3K views
wifi-y3dips-stmik_mdp_slides by guest1c1a9a
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
guest1c1a9a351 views
Anton Chuvakin on Honeypots by Anton Chuvakin
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin1.8K views
Attack presentation by Frikha Nour
Attack presentationAttack presentation
Attack presentation
Frikha Nour267 views
Brst – Border Router Security Tool by tleroy0928
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tool
tleroy0928562 views
Mozilla chirimen firefox os dwika v5 by Dwika Sudrajat
Mozilla chirimen firefox os dwika v5Mozilla chirimen firefox os dwika v5
Mozilla chirimen firefox os dwika v5
Dwika Sudrajat421 views
How To Hack Wireless Internet Connections by guest85e156e
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e62.2K views
Brute forcing Wi-Fi Protected Setup by Scientia Groups
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
Scientia Groups11.3K views
2018 all lens bag of tricks v1.2 by Len Noe
2018 all lens bag of tricks v1.22018 all lens bag of tricks v1.2
2018 all lens bag of tricks v1.2
Len Noe236 views
DevLink - WiFu: You think your wireless is secure? by Rob Gillen
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
Rob Gillen1.7K views
Sergio González - WiFiSlax 4.0 [RootedCON 2010] by RootedCON
Sergio González - WiFiSlax 4.0 [RootedCON 2010]Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
RootedCON1.9K views

Similar to All your Bluetooth is belong to us - the rest too.

Hacking Backtrak Mobile by
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak MobileNovizul Evendi
1.4K views16 slides
Bluetooth by
BluetoothBluetooth
BluetoothFahim Faysal
4.8K views37 slides
IoThings you don't even need to hack by
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
1.9K views109 slides
Lukas Apa - Hacking Robots Before SkyNet by
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet NoNameCon
222 views56 slides
Deauthentication Attack with Node MCU & Esp8266 by
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Akash Thakur
3.6K views10 slides
Node home automation with Node.js and MQTT by
Node home automation with Node.js and MQTTNode home automation with Node.js and MQTT
Node home automation with Node.js and MQTTMichael Dawson
1.9K views15 slides

Similar to All your Bluetooth is belong to us - the rest too.(20)

IoThings you don't even need to hack by Slawomir Jasek
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
Slawomir Jasek1.9K views
Lukas Apa - Hacking Robots Before SkyNet by NoNameCon
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
NoNameCon222 views
Deauthentication Attack with Node MCU & Esp8266 by Akash Thakur
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
Akash Thakur3.6K views
Node home automation with Node.js and MQTT by Michael Dawson
Node home automation with Node.js and MQTTNode home automation with Node.js and MQTT
Node home automation with Node.js and MQTT
Michael Dawson1.9K views
Bluetooth network-security-seminar-report by ROHIT SAGAR
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR8.6K views
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES by Faelix Ltd
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICESL2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
L2TP 101 ON-RAMP TO CONSUMING WHOLESALE BROADBAND SERVICES
Faelix Ltd204 views
The (Io)Things you don't even need to hack. Should we worry? by SecuRing
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
SecuRing1.6K views
Enterprise Developer Journey to the IoT by Burr Sutter
Enterprise Developer Journey to the IoTEnterprise Developer Journey to the IoT
Enterprise Developer Journey to the IoT
Burr Sutter1.2K views
Fundamentals of network hacking by Pranshu Pareek
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
Pranshu Pareek91 views
BLUETOOTH TECHNOLOGY by AJAL A J
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J2.2K views
Introduction to Home Automation by Ruslan Ulanov
Introduction to Home AutomationIntroduction to Home Automation
Introduction to Home Automation
Ruslan Ulanov1K views
Videoconferencing Technology Workshop by Videoguy
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
Videoguy1K views

More from Thierry Zoller

BLtouch marlin configuration by
BLtouch marlin configurationBLtouch marlin configuration
BLtouch marlin configurationThierry Zoller
896 views5 slides
Neo coolcam - smart-plug user guide v2 - Zwave by
Neo coolcam  - smart-plug user guide v2 - ZwaveNeo coolcam  - smart-plug user guide v2 - Zwave
Neo coolcam - smart-plug user guide v2 - ZwaveThierry Zoller
10.2K views10 slides
Cansecwest - The Death of AV defence in depth by
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthThierry Zoller
860 views47 slides
Heise Security - Scheunentor Bluetooth by
Heise Security - Scheunentor BluetoothHeise Security - Scheunentor Bluetooth
Heise Security - Scheunentor BluetoothThierry Zoller
529 views44 slides
Hack.lu 2006 - All your Bluetooth is belong to us by
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to usThierry Zoller
314 views51 slides
Managing Application Security Risk in Enterprises - Thoughts and recommendations by
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsThierry Zoller
200 views30 slides

More from Thierry Zoller(10)

BLtouch marlin configuration by Thierry Zoller
BLtouch marlin configurationBLtouch marlin configuration
BLtouch marlin configuration
Thierry Zoller896 views
Neo coolcam - smart-plug user guide v2 - Zwave by Thierry Zoller
Neo coolcam  - smart-plug user guide v2 - ZwaveNeo coolcam  - smart-plug user guide v2 - Zwave
Neo coolcam - smart-plug user guide v2 - Zwave
Thierry Zoller10.2K views
Cansecwest - The Death of AV defence in depth by Thierry Zoller
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
Thierry Zoller860 views
Heise Security - Scheunentor Bluetooth by Thierry Zoller
Heise Security - Scheunentor BluetoothHeise Security - Scheunentor Bluetooth
Heise Security - Scheunentor Bluetooth
Thierry Zoller529 views
Hack.lu 2006 - All your Bluetooth is belong to us by Thierry Zoller
Hack.lu 2006 - All your Bluetooth is belong to usHack.lu 2006 - All your Bluetooth is belong to us
Hack.lu 2006 - All your Bluetooth is belong to us
Thierry Zoller314 views
Managing Application Security Risk in Enterprises - Thoughts and recommendations by Thierry Zoller
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Thierry Zoller200 views
IPV6 - Threats and Countermeasures / Crash Course by Thierry Zoller
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
Thierry Zoller1.1K views
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier... by Thierry Zoller
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
Thierry Zoller272 views
SSL Audit - The SSL / TLS Scanner by Thierry Zoller
SSL Audit -  The SSL / TLS ScannerSSL Audit -  The SSL / TLS Scanner
SSL Audit - The SSL / TLS Scanner
Thierry Zoller1.6K views
The TLS/SSLv3 renegotiation vulnerability explained by Thierry Zoller
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explained
Thierry Zoller71.4K views

Recently uploaded

HITCON CISO Summit 2023 - Closing by
HITCON CISO Summit 2023 - ClosingHITCON CISO Summit 2023 - Closing
HITCON CISO Summit 2023 - ClosingHacks in Taiwan (HITCON)
195 views33 slides
falsettos by
falsettosfalsettos
falsettosRenzoCalandra
14 views48 slides
Competition and Innovation - The Role of Innovation in Enforcement Cases – OE... by
Competition and Innovation - The Role of Innovation in Enforcement Cases – OE...Competition and Innovation - The Role of Innovation in Enforcement Cases – OE...
Competition and Innovation - The Role of Innovation in Enforcement Cases – OE...OECD Directorate for Financial and Enterprise Affairs
72 views4 slides
CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh... by
CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...
CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...tmmling
10 views16 slides
oral presentation .pdf by
oral presentation .pdforal presentation .pdf
oral presentation .pdfHindAlmesmary
6 views9 slides
Yin Sun - Shell by
Yin Sun - ShellYin Sun - Shell
Yin Sun - ShellDutch Power
111 views17 slides

Recently uploaded(20)

CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh... by tmmling
CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...
CIS1- Final-Project- COPY-Presentation-JinHuan Chen, Tammy Ling, JingCheng Zh...
tmmling10 views
Roozbeh Torkzadeh - TU Eindhoven by Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power111 views
تنزيل (1).pdf DVT by taalali1
تنزيل (1).pdf  DVT تنزيل (1).pdf  DVT
تنزيل (1).pdf DVT
taalali16 views
Managing Github via Terrafom.pdf by micharaeck
Managing Github via Terrafom.pdfManaging Github via Terrafom.pdf
Managing Github via Terrafom.pdf
micharaeck5 views
Christan van Dorst - Hyteps by Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power119 views
ERGONOMIC RISK ASSESSMENT (ERA).pptx by j967z4hcnp
ERGONOMIC RISK ASSESSMENT (ERA).pptxERGONOMIC RISK ASSESSMENT (ERA).pptx
ERGONOMIC RISK ASSESSMENT (ERA).pptx
j967z4hcnp8 views
a timeline of the history of linguistics- BAUTISTA- BELGERA.pdf by FordBryantSadio
a timeline of the history of linguistics- BAUTISTA- BELGERA.pdfa timeline of the history of linguistics- BAUTISTA- BELGERA.pdf
a timeline of the history of linguistics- BAUTISTA- BELGERA.pdf
FordBryantSadio6 views
I use my tools to help people by mywampa
I use my tools to help peopleI use my tools to help people
I use my tools to help people
mywampa9 views

All your Bluetooth is belong to us - the rest too.

  • 1. +
  • 2. Bluetooh – Please just turn it off ! "! "! "! " " Yeah
  • 3. Who we are ? – Hippies Kevin Finistere Former Head of Research of SNOSoft Found Vulnerabilities in Apple, IBM, SAP, Oracle, Symantec… Has contributed a lot to this talk Not here today Thierry Zoller Welcome home Security Consultant @ N.runs Found vulnerabilities in Checkpoint, Symantec, Citrix, F-Secure, MySQL4, MacAfee, Nod32… Don‘t like to talk about me, see for yourself. Batteries not inlcuded. Mad Hax0r
  • 4. The Goal of this Talk ? The Goal of this talk is not to: Build myths Show off – and not show how The Goal of this talk is to : Raise awareness Make risks transparent Paradigm Shift – Bluetooth is not only for toys Clear the air about InqTana
  • 5. What are we talking about today ? [ 0x00 ] – Introduction : What is Bluetooth ? How does it work and hold together ? Security Modes, Paring modes Scatternets, Piconets.. What‘s the difference to WiFi (802.11a/b/g) ? Common Implementations of the Protocol [ 0x01 ] – Get ready to rumble : Extending the Range Extending the range of Bluetooth devices Building automated reconnaissance and attack devices Bluetooth War driving (GPS, 360°Camera) More.. [ 0x02 ] – Attack! : Getting dirty with it Attacking Mobile Phones / Handhelds / PDAs Attacking Cars / Headsets / Free Hands kits Attacking Internal Networks (0day) Attacking the Protocol, braking the encryption (0day) Tracking the un-trakeable and more..
  • 6. [ 0x00 ] Introduction What is Bluetooth ? Invented 1995 by Ericsson, SIG formed 1998 (Bluetooth Special Interest Group ) Bluetooth 1.0 - 1.7.1999, first devices sold in mid 2000 Named after “Harald Blauzahn” Goal was, low-cost “cable replacement” Personal Area Networks Tech Specs 2.400-2.4835 GHz (WiFi, Cameras, etc..) Frequency Hopping, up to 3200 times per second ! (1600 in connection state)
  • 7. [ 0x00 ] Introduction The difference and similarities with WiFi : Operate on the same ISM band : 2,4Ghz WiFi 11 Channels, Bluetooth 79 Channels Both do frequency hopping (WiFi 600 times slower) WiFi broadcasts it’s presence every x ms Bluetooth is a complete Framework with Profiles and layers of protocols Obvious: Range
  • 8. [ 0x00 ] Introduction What does it do for me ? Cable Replacement Data/Voice Personal Area Networks
  • 9. [ 0x00 ] Introduction The foundation – Protocol Stack Hardware Software
  • 10. [ 0x00 ] Introduction The Bluetooth Profiles Represent a group and defines mandatory options Prevent compatibility issues, modular approach to BT extensions Vertical representation of BT layer usage, handled through SDP Object Push Profile
  • 11. [ 0x00 ] Introduction Typical Bluetooth Scenario (1) Simplistic Model (ignoring security for now) 1 - User goes into a lobby and wants to read email 2 - Clicks on the PDA Email application 3 - Sends and receives Email
  • 12. [ 0x00 ] Introduction Typical Bluetooth Scenario (2) Inquiry Inquiry response Paging (FHS) Link establishment Discovers Profiles Bluetooth Access Point
  • 13. [ 0x00 ] Introduction Piconets / Scatternets A Piconet can hold 7 active (and 255 parked) slaves and 1 master, PTP and PTMP Master Slaves Piconet 1 Piconet 3 Piconet 2
  • 14. [ 0x00 ] Introduction Frequency Hopping Slaves always sync to the Master Hop up-to 3200 times a second over 79 channels using 625 s length Piconet agrees to a Sequence based on the BD_ADDR and Clockoffset of the master. (Now THIS is a unique fingerprint) This procedure called “Paging” in Bluetoohesque FH is the reason you can not easily sniff these BT connections. You have to sync to the Master (or use a Spectral Analyzer and reconstruct afterwards – Good luck)
  • 15. [ 0x00 ] Introduction Discoverable modes : Discoverable : Sends inquiry responses to all inquiries. Limited discoverable: Visible for a certain period of time (Implementation bugs..) Non-Discoverable: Never answers an inquiry scan (in theory) Pairing modes : Non-pairable mode : Rejects every pairing request (LMP_not_accepted) (Plantronics) Pairable mode : Will pair up-on request
  • 16. [ 0x01 ] Get ready to rumble Extending the Range
  • 17. [ 0x01 ] Get ready to rumble Extending the Range Class 3 Class 2 Class 1 Home Grown 10 M 25 M 100 M 788 M Specification defines 3 classes : - Class 1 - 100 mW (20 dBm) - Class 2 - 2.5 mW (4 dBm) - Class 3 - 1 mW (0 dBm) Up to 2,6km are possible Home Grown
  • 18. [ 0x01 ] Get ready to rumble HOW-TO Modify class 1 dongle to accept an aftermarket antenna. Basic soldering skills required Provides much more flexibility when testing Connects to an Laptop that supports USB Instant Ownage
  • 19. [ 0x01 ] Get ready to rumble Long Distance - Datasets Antrum Lake, water reflection guarantees longer ranges. 788 Meter ! An old Man stole my phone during this test! I tracked him with the yagi.
  • 20. [ 0x01 ] Get ready to rumble Long Distance - Datasets Strassen, Luxembourg 550 Meter Thanks Jerome Carrère
  • 21. [ 0x01 ] Get ready to rumble Long Distance - More More New World record attempt by Kevin Use of high precision Trimble GPS receivers will be used. DGPS data correction for centimeter accuracy 2,6 km ! Needs narrow antenna beam
  • 22. [ 0x01 ] Get ready to rumble Optimizing for Penetration (1) Integrated Linksys Dongle Integrated USB Cable Metal Parabola 10 * Zoom Laser (to be done)
  • 23. [ 0x01 ] Get ready to rumble Optimizing for Penetration (2) Bundling (Parabola) Higher penetration through walls Glass is your friend On board embedded device. (NSLU2) Auto scan and attack toolkit Experiment : Went through a building found the device on the other side IN another building.
  • 24. [ 0x01 ] Get ready to rumble PerimeterWatch – Bluetooth Wardriving Perl Script by KF Searches Bluetooth Devices Takes 360°pictures GPS coordinates
  • 25. [ 0x02 ] Attack ! Attacking Bluetooth Devices – Bypassing security
  • 26. [ 0x02 ] Attack ! Menu du Jour : Bluebug (AT over RFCOMM) Bluesnarf (Obex) Car Whisperer Limited time, sorry.. Some 0-day : Owning internal Networks over Bluetooth Attacking the Protocol: Bluecrack - BT Pin and Link key cracker Widcomm Overflow (Broadcom merger leaves lots of vuln users that can not patch) BTW 3.0.1.905 (../ attacks) and up to BTW 1.4.2.10 has (overflows)
  • 27. [ 0x01 ] Get ready to rumble Luxembourg – 1 hour Bluetooth Scan Boulevard Royal 295 unique discoverable Bluetooth devices Lots of vulnerable ones
  • 28. [ 0x01 ] Get ready to rumble Luxembourg – 1 hour Bluetooth Scan 00:0E:9F - Audi UHV – Pin 1234 Nokia 6310 - Disaster
  • 29. [ 0x02 ] Attack ! Implementation - Issues Galore Pairing always enabled Rare – few devices Headsets (Plantronix) – Pairing Button is useless Default Pins (0000, 1111 …) Discovery enabled Lots of Devices Siemens T60 – stays in discover mode if you ping it, might be attacked forever. Hidden (non advertised) Services ObexIRDA, etc Nokia, others..
  • 30. [ 0x02 ] Attack ! Bluebug Attack – Trifinite Group The Service that shouldn’t be there Read phonebook Read / Send SMS Dial Number Redirect Calls Etc… Vulnerable devices : Nokia 6310, Nokia 6310i, Nokia 8910i, Nokia 8910, T68, Sony Ericsson T68i, T610, T68, T68i, R520m, T610, Z1010, Z600, Motorola V80, V5xx, V6xx and E398 and others…
  • 31. [ 0x02 ] Attack ! Bluesnarf Attack – Trifinite Group Basically a “get” request over OBEX Push Obex Push usually not authenticated Request for known files, telecom/pb.vcf Vulnerable devices : Nokia 6310, Nokia 6310i, Nokia 6650, Ericsson T610, Ericsson T68, Ericsson T68i, Ericsson T630, Ericsson Z600 others… Give me your phonebook Ok
  • 32. [ 0x02 ] Attack ! CarWhisperer – Martin Herfurt Listen and Record Conversations Eavesdrop on Headsets, Hands-Free kits Works against Widcomm < BTW 4.0.1.1500 with no pincode required! Root Cause : Paring mode, discoverable, hard coded Pin.
  • 33. [ 0x02 ] Attack ! Wireless Keyboards If HID server (PC) accepts connections, you might remotely control the PC. (Collin R. Mulliner) If you have the link key : - decryption of packets i.e. capture the keystrokes. - connect to the PC and remotely control it
  • 34. [ 0x02 ] Attack ! The PIN is not really that useful The link key is ! Here’s why : Protocol 1.2 Authentication :
  • 35. [ 0x02 ] Attack ! – 0day InqTana - Setting the Record straight Kevin created a cribbled PoC Worm named InqTana It’s real, it’s here and it’s not an invention of the AV industry, KF handed it over in order for them to protect you against these types of attacks. ObexFTP server directory traversal exploit,malicious InputManager and a local root exploit = remote login tty over rfcomm NO user interaction required Media completely missed the point and invented an obscure conspiracy theory Points were : - Macs are NOT invulnerable (the flaw is patched now) - You can own internal networks over Bluetooth
  • 36. [ 0x02 ] Attack ! – 0day Obex ../../../ - Owning internal networks Apple OSX 10.3 Tiger OSX 10.4 Jaguar Vanilla, delayed release Windows Widcomm, Toshiba, Bluesoil, others ? Pocket PC Kevin: Apple asked me to not tell 10.4 was shipping vulnerable OSX 10.3.9 patched, OSX 10.4 shipped vulnerable patched a month after OSX 10.3.9
  • 37. [ 0x02 ] Attack ! – 0day MAC OS 10.3 & 10.4 Vanilla Multi-Staged attack : Step 1 – ObexFTP ../../../ Attack Step 2 – Using Input Manager launches Root exploit (then binds getty to the pda sync port) Step 3 – Connecting to Port 3 over Rfcomm Step 4 – Harvesting Keys Step 5 – Owning the network, scanning for other BT devices, compromising them.
  • 38. [ 0x02 ] Attack ! – 0day MAC OS 10.3 & 10.4 Vanilla Multi-Staged attack : Spoofing the BD_Address of the Apple and authenticating through stolen link key.
  • 39. [ 0x02 ] Attack ! – 0day Transposed to a Company Server Room Workstations
  • 40. [ 0x02 ] Attack ! – 0day Get the Code For Hack.lu, Inqtana code release : http://www.digitalmunition.com Presented also in the upcoming Hacking Exposed : Wireless
  • 41. [ 0x02 ] Attack ! BUT – The misconception vault we have an USB policy BT is only 10 meters we have automatic patches we have preset policies disabling all Wireless devices Your internal networks are at risk. Implement Mitigation / Monitoring RFProtect and similar Products
  • 42. [ 0x02 ] Attack ! – 0day Introducing BTCrack Hack.lu release Cracks PIN and Linkkey Requires values from a Pairing sniff We can force repairing by using various Methods Based on the research of Shaked and Wool 4 digits pin – 0,25 seconds
  • 43. [ 0x02 ] Attack ! – 0day Introducing BTCrack
  • 44. [ 0x02 ] Attack ! – 0day BT Crack – Behind the scenes (1) Pairing Step1 Generates (RAND) K = E22(RAND, PIN, PIN_LEN) Device A Device B Step1 K = E22(RAND, PIN, PIN_LEN) Rand Step2 Generates (RANDA) CA = RANDA xor K Step2 Generates (RANDB) CB = RANDB xor K CA CB Step3 RANDB=CA xor K LKA=E21(RANDA, ADDRA) LKB=E21(RANDB,ADDRB) LKAB=LKA xor LKB Step3 RANDB=CA xor K LKA=E21(RANDA, ADDRA) LKB=E21(RANDB,ADDRB) LKAB=LKA xor LKB Step4 SRESA = E1(CH_RANDA,ADDRB,LKAB) Step4 SRESB = E1(CH_RANDA,ADDRB,LKAB) CH_RANDA SRESB Step5 SRESA = SRESB E22 = Connection key E21 = Device key
  • 45. [ 0x02 ] Attack ! – 0day BT Crack – Behind the scenes Right : Shaked and Wool logic Bottom: Pseudo code by Tomasz Rybicki Pin =-1; Do { PIN++; CR_K=E22(RAND, PIN, length(PIN)); CR_RANDA = CA xor CR_K; CR_RANDB = CB xor CR_K; CR_LKA = E21 (CR_RANDA, ADDRA); CR_LKB = E21 (CR_RANDB, ADDRB); CR_LKAB = CR_LKA xor CR_LKB; CR_SRES = (CH_RAND, ADDRB, CR_LKAB); } while (CR_SRES == SRES) Hackin9 04/2005 - Tomasz Rybicki
  • 46. [ 0x02 ] Attack ! – 0day BT Crack – Demo
  • 47. [ 0x02 ] Attack ! – 0day BT Crack – Download Give me a bit of time to fix the bugs Will be available at http://www.nruns.com
  • 48. [ 0x02 ] Attack ! Windows Widcomm - Buffer overflows Video http://www.digitalmunition.com/Widcomm.avi File Vulnerable versions Widcomm Stack up to 3.x is vuln Widcomm BTStackServer 1.4.2 .10 Widcomm BTStackServer 1.3.2 .7 Widcomm Bluetooth Communication Software 1.4.1 .03 HP IPAQ 2215 HP IPAQ 5450
  • 49. [ 0x02 ] Attack ! Windows Widcomm - Buffer overflows
  • 50. [ 0x02 ] Attack ! – 0day Owning the Secret Service ? ;) MicroEarpiece – worlds smallest Goes into the ear Tunnel Jabra Headset - Pin Code : 0000 Seriously: You can get it at MicroEarPiece.com Not discoverable, not in Pairing mode, got it yesterday evening, no time
  • 51. [ 0x02 ] Attack ! Things to Remember : Bluetooth might be a risk for your Company Don’t accept every file you are being send, just click NO. Disable Bluetooth if not required Pair in “secure” places (SIG Recommendations) Hold your Bluetooth vendor accountable for vulnerabilities!