SlideShare a Scribd company logo
1 of 87
Download to read offline
1
Breaking WingOS
Josep Pi Rodriguez
Senior Security Consultant
Josep.rodriguez@ioactive.com
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Agenda
•  Intro to WingOS
•  Scenarios & Attack surface
•  Vulnerabilities
•  Exploitation & Demo
•  Conclusions
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Embedded Linux OS with proprietary modifications in Kernel
•  Created by Motorola. Now property of Extreme networks
•  Architecture Mips N32
•  Used mainly in Wireless AP and Controllers
•  No public information or previous research about its internals
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Web interface.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  CLI.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Devices using WingOS (Extreme networks):
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Devices using WingOS:
•  Motorola devices and Zebra devices
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Devices using WingOS:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Devices using WingOS (Kontron for aircrafts):
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
•  Where you can find these devices?
- Widely used in aircrafts by many airlines around the world
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
https://techworld.idg.se/2.2524/1.644569/wifi-flygplan/sida/2/sida-2
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
EN website and case studies you can see that these devices are used in:
- Smart buildings and Smart cities
-  Healthcare
-  Government
-  Small and big enterprise networks
-  Education
-  Retail, Stadiums
-  …
IOActive, Inc. Copyright ©2018. All Rights Reserved.
https://transitwireless.com/wp-content/uploads/2016/04/Motorola-Case-Study-New-York-City-Transit.pdf
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Attack Surface & Scenarios
1.  Aircraft Scenario:
Focused in the remote pre-auth vulnerabilities found
•  Ethernet cable:
- Less likely in an Aircraft
- UDP Services/ Mint Services
•  Wi-Fi ( open Wi-Fi or password protected Wi-Fi)
•  Pivoting from Sat modem to AP (From the ground!)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Attack Surface & Scenarios
Ruben Santamarta
Last call for satcom security
https://www.blackhat.com/us-18/briefings.html#last-call-for-satcom-security
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Attack Surface & Scenarios
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Attack Surface & Scenarios
2. Other scenarios:
Focused in the remote pre-auth vulnerabilities found
•  Connect Ethernet cable directly:
-  More likely with outdoor Access Points but also
possible inside buildings
•  Wi-Fi ( open Wi-Fi or password protected Wi-Fi)
•  Internal network (you are inside the network)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Vulnerabilities
Hidden root shell backdoor
•  From restricted CLI to hidden root shell
•  Attacker perspective. CLI access: Good, Root shell: completely compromised
•  Not critical vuln but very important for the research process
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
Default value in every WingOS
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
The content of the file is passed to the
Following loop
Let’s emulate this loop with Unicorn
Unicorn uses Qemu in the background and allows
You to emulate assembly code for several archs
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
Basically, the content of the file are hex bytes (in ascii)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
Decrypts (RC4) the contents of the file (as hex bytes) with the key
“Hi Sabeena? How’re you doin’? Bye!!”
In this case, the decryption result of the file is the string “password”
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
Get the MAC addr of the device
And does the following operation with MAC:
XX:XX+1:XX+2:XX+3:XX+4:XX+5
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
RC4 decrypt “password” with the key XX:XX+1:XX+2:XX+3:XX+4:XX+5
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
This last block will make sure that
the valid password calculated, will contain only
lower-case letters.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
Different password next time you try to get shell
If password granted:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Hidden root shell backdoor
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth stack overflow
UDP service listening on 0.0.0.0
by default
RIM process (Radio Interface Module)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth stack overflow
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth stack overflow
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth stack overflow
•  Only some old versions vulnerable to this stack
overflow(Let’s see why in a minute).
•  Kontron devices (aircrafts) firmware should be
vulnerable based on info in their website.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth “global” denial of
service
Newest firmware version, stack overflow fixed. But…
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth “global” denial of
service
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote pre-auth “global” denial of
service
Execute the same POC 2 o 3 times killing the RIM process several times and the
whole OS will be rebooted
Watchdog checks if RIM process is running, if not, the whole OS is rebooted.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint Vulnerabilities
Domain 0x32?
Local_mint_addr?
Lots of recvfrom in binaries
IOActive, Inc. Copyright ©2018. All Rights Reserved.
What is Mint?
No much info on the internet
L2/L3 proprietary protocol
Level 1 VLAN
Level 2 IP
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint
L2/L3 proprietary protocol
Proprietary socket address family (AF_MINT) (sys/socket.c sys/socket.h)
Datagram socket
1.  Reverse engineer their kernel to mimic this L2/L3 protocol and build a client
2.  Try to emulate the whole OS/Kernel (Probable, but might be painful)
3.  Find a way to build a client using their OS kernel
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint
Attack scenarios using Mint:
•  Attacker connects its device
to the network or directly to the target
Device (Wireless or Cable)
•  Attacker remotely compromises
a device connected to the network
•  Attack services/AP/Controllers over
Mint services
•  Controllers == Windows DC
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Creating Mint Client:
Mint client:
Inspecting their library usr/lib/python2.7/lib-dynload/_socket.so :
We should be able to import socket and create Mint sockets.
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint
Default config of controller
Standalone AP can also be configured as Controller
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint
Attacker’s device. I want to connect over mint to the Controller(victim)
Now, Controller (victim) sees attacker over mint
And attacker can also connecter over mint to Controller (victim)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Mint Vulnerabilities
Services listening on several ports over L2/L3 protocol
Example of function parsing messages over 1 specific port (HSD process):
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
Memcpy’s src and len user-controlled, dst is heap. Totally controllable:
HSD process, Mint port 14
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
To reach that memcpy in the switch case statement we have to:
First go to case0 of switch statement and we got a restriction
Get_session_by_mac check if the MAC sent in our payload is authenticated
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
To reach that memcpy in the switch case statement we have to:
Luckily we can add a fake MAC to the authenticated list
Another case for the switch case statement allow us that:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
To reach that memcpy in the switch case statement we have to send this:
First, session alloc for our Fake MAC addr
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
To reach that memcpy in the switch case statement we have to send this:
And now we can reach the vulnerable memcpy
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow (mint)
Crash:
/root # gdb
(gdb) attach 1765
Attaching to process 1765
Reading symbols from /usr/sbin/hsd...(no debugging symbols found)...done.
(gdb) c
Continuing.
Program received signal SIGABRT, Aborted.
0x2af26624 in raise () from /lib/libc.so.6
(gdb) bt
#0 0x2af26624 in raise () from /lib/libc.so.6
#1 0x2af28108 in abort () from /lib/libc.so.6
#2 0x2af645b0 in __fsetlocking () from /lib/libc.so.6
#3 0x2af6b620 in malloc_usable_size () from /lib/libc.so.6
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow 2 (mint)
Another Memcpy’s src and len user-controlled, dst is heap. Totally controllable:
HSD process, Mint port 14
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth heap overflow 2 (mint)
Another Memcpy’s src and len user-controlled, dst is heap. Totally controllable:
HSD process, Mint port 14
/root # gdb
(gdb) attach 4820
Attaching to process 4820
Reading symbols from /usr/sbin/hsd...(no debugging symbols found)...done.
(gdb) c
Continuing.
Program received signal SIGABRT, Aborted.
0x2af26624 in raise () from /lib/libc.so.6
(gdb) bt
#0 0x2af26624 in raise () from /lib/libc.so.6
#1 0x2af28108 in abort () from /lib/libc.so.6
#2 0x2af645b0 in __fsetlocking () from /lib/libc.so.6
#3 0x2af6b620 in malloc_usable_size () from /lib/libc.so.6
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth stack overflow (mint)
Stack overflow where user data comes from the previous memcpy vuln.
To overflow the Stack the Heap buffer has to be overflowed as well:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth stack overflow (mint)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth stack overflow (mint)
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Remote Pre-auth stack overflow (mint)
LIBC sanity checks can make it crash before the stack overflow happens
In this case is not a problem as it won’t crash if we trigger the stack overflow “quickly”
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
•  NO ASLR, NO NX, NO STACK CANARIES..
•  Just jump to our shellcode? Nope
•  Cache incoherence problem (well known):
•  MIPS CPU I-Cache D-Cache Instructions, Data
•  Our payload likely will be stored in the D-Cache
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
•  FILL THE D-CACHE TO FLUSH IT (Depends on how big it is)
•  Call a blocking function such as Sleep( ) using ROP
•  The cache will be flushed
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
ROP:
From the epilogue we know the registers that we control at the crash time
IOActive, Inc. Copyright ©2018. All Rights Reserved.
LIBC GADGETS
IOActive, Inc. Copyright ©2018. All Rights Reserved.
SHELLCODE
IOActive, Inc. Copyright ©2018. All Rights Reserved.
SHELLCODE
IOActive, Inc. Copyright ©2018. All Rights Reserved.
SHELLCODE
MIPS N32:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
SHELLCODE
MIPS N32:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
SHELLCODE
MIPS N32 Shellcode:
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
IOActive, Inc. Copyright ©2018. All Rights Reserved.
DEMO
IOActive, Inc. Copyright ©2018. All Rights Reserved.
EXPLOIT
1.  Use your own device (or use compromised one).
2.  Add our Fake MAC addr to the auth list
3.  Overflow the heap with our ROP Gadgets and Shellcode
4.  Stack overflow with the Heap data.
5.  BANG!
IOActive, Inc. Copyright ©2018. All Rights Reserved.
AEROSCOUT VULNERABILITY
IOActive, Inc. Copyright ©2018. All Rights Reserved.
AEROSCOUT VULNERABILITY
IOActive, Inc. Copyright ©2018. All Rights Reserved.
AEROSCOUT VULNERABILITY
UDP 1144
IOActive, Inc. Copyright ©2018. All Rights Reserved.
AEROSCOUT VULNERABILITY
•  No Authentication at all
•  Once reverse engineered the protocol, you can mess with locations
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Conclusion
•  Patches provided by extreme networks:
https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Conclusions
•  Lot of room for improvement in WingOS
•  There are more vulnerabilities in the OS
•  Hopefully, with this lessons learned, most of them will be fixed proactively?
87
Any questions?
Thank You!
josep.rodriguez@ioactive.com
info@ioactive.com

More Related Content

What's hot

Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking ReportSynack
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsSlawomir Jasek
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCONAdvanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCONLyon Yang
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...CODE BLUE
 
44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan NovikovOWASP Russia
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksPriyanka Aash
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a HouseSynack
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via smsqqlan
 

What's hot (20)

Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking Report
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCONAdvanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCON
 
Introduction to VoIP Security
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Security
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
 
44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a House
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 

Similar to Breaking into WingOS with Remote Vulnerabilities

The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT SecurityHannes Tschofenig
 
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...Ivan Kravets
 
Meeting rooms are talking. Are you listening
Meeting rooms are talking. Are you listeningMeeting rooms are talking. Are you listening
Meeting rooms are talking. Are you listeningCisco DevNet
 
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...CODE BLUE
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Priyanka Aash
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoCodemotion
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...Codemotion
 
Meeting rooms are talking! are you listening?
Meeting rooms are talking! are you listening?Meeting rooms are talking! are you listening?
Meeting rooms are talking! are you listening?Cisco DevNet
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Codemotion
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Codemotion
 
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...Codemotion
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Anne Nicolas
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network conceptsSsendiSamuel
 
Hacking intranet websites
Hacking intranet websitesHacking intranet websites
Hacking intranet websitesshehab najjar
 
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationHiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationMargarethaErber
 
Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingTom Keetch
 
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis Phil Tully
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@nightjtimberman
 

Similar to Breaking into WingOS with Remote Vulnerabilities (20)

The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...
swampUP: Over-The-Air (OTA) firmware upgrades for Internet of Things devices ...
 
OpUtils webinar
OpUtils webinarOpUtils webinar
OpUtils webinar
 
Meeting rooms are talking. Are you listening
Meeting rooms are talking. Are you listeningMeeting rooms are talking. Are you listening
Meeting rooms are talking. Are you listening
 
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...
[CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction Sy...
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco Romano
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
 
Meeting rooms are talking! are you listening?
Meeting rooms are talking! are you listening?Meeting rooms are talking! are you listening?
Meeting rooms are talking! are you listening?
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
 
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
Stève Sfartz - Meeting rooms are talking! Are you listening? - Codemotion Ber...
 
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...
Fernando Arnaboldi - Exposing Hidden Exploitable Behaviors Using Extended Dif...
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network concepts
 
Hacking intranet websites
Hacking intranet websitesHacking intranet websites
Hacking intranet websites
 
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationHiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
 
Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical Sandboxing
 
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@night
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Breaking into WingOS with Remote Vulnerabilities

  • 1. 1 Breaking WingOS Josep Pi Rodriguez Senior Security Consultant Josep.rodriguez@ioactive.com
  • 2. IOActive, Inc. Copyright ©2018. All Rights Reserved. Agenda •  Intro to WingOS •  Scenarios & Attack surface •  Vulnerabilities •  Exploitation & Demo •  Conclusions
  • 3. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Embedded Linux OS with proprietary modifications in Kernel •  Created by Motorola. Now property of Extreme networks •  Architecture Mips N32 •  Used mainly in Wireless AP and Controllers •  No public information or previous research about its internals
  • 4. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS
  • 5. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Web interface.
  • 6. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  CLI.
  • 7. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Devices using WingOS (Extreme networks):
  • 8. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Devices using WingOS: •  Motorola devices and Zebra devices
  • 9. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Devices using WingOS:
  • 10. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Devices using WingOS (Kontron for aircrafts):
  • 11. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Where you can find these devices? - Widely used in aircrafts by many airlines around the world
  • 12. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS https://techworld.idg.se/2.2524/1.644569/wifi-flygplan/sida/2/sida-2
  • 13. IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS EN website and case studies you can see that these devices are used in: - Smart buildings and Smart cities -  Healthcare -  Government -  Small and big enterprise networks -  Education -  Retail, Stadiums -  …
  • 14. IOActive, Inc. Copyright ©2018. All Rights Reserved. https://transitwireless.com/wp-content/uploads/2016/04/Motorola-Case-Study-New-York-City-Transit.pdf
  • 15. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 16. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 17. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 18. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 19. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 20. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 21. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 22. IOActive, Inc. Copyright ©2018. All Rights Reserved.
  • 23. IOActive, Inc. Copyright ©2018. All Rights Reserved. Attack Surface & Scenarios 1.  Aircraft Scenario: Focused in the remote pre-auth vulnerabilities found •  Ethernet cable: - Less likely in an Aircraft - UDP Services/ Mint Services •  Wi-Fi ( open Wi-Fi or password protected Wi-Fi) •  Pivoting from Sat modem to AP (From the ground!)
  • 24. IOActive, Inc. Copyright ©2018. All Rights Reserved. Attack Surface & Scenarios Ruben Santamarta Last call for satcom security https://www.blackhat.com/us-18/briefings.html#last-call-for-satcom-security
  • 25. IOActive, Inc. Copyright ©2018. All Rights Reserved. Attack Surface & Scenarios
  • 26. IOActive, Inc. Copyright ©2018. All Rights Reserved. Attack Surface & Scenarios 2. Other scenarios: Focused in the remote pre-auth vulnerabilities found •  Connect Ethernet cable directly: -  More likely with outdoor Access Points but also possible inside buildings •  Wi-Fi ( open Wi-Fi or password protected Wi-Fi) •  Internal network (you are inside the network)
  • 27. IOActive, Inc. Copyright ©2018. All Rights Reserved. Vulnerabilities Hidden root shell backdoor •  From restricted CLI to hidden root shell •  Attacker perspective. CLI access: Good, Root shell: completely compromised •  Not critical vuln but very important for the research process
  • 28. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor
  • 29. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor
  • 30. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor Default value in every WingOS
  • 31. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor The content of the file is passed to the Following loop Let’s emulate this loop with Unicorn Unicorn uses Qemu in the background and allows You to emulate assembly code for several archs
  • 32. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor
  • 33. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor Basically, the content of the file are hex bytes (in ascii)
  • 34. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor Decrypts (RC4) the contents of the file (as hex bytes) with the key “Hi Sabeena? How’re you doin’? Bye!!” In this case, the decryption result of the file is the string “password”
  • 35. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor Get the MAC addr of the device And does the following operation with MAC: XX:XX+1:XX+2:XX+3:XX+4:XX+5
  • 36. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor RC4 decrypt “password” with the key XX:XX+1:XX+2:XX+3:XX+4:XX+5
  • 37. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor This last block will make sure that the valid password calculated, will contain only lower-case letters.
  • 38. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor Different password next time you try to get shell If password granted:
  • 39. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor
  • 40. IOActive, Inc. Copyright ©2018. All Rights Reserved. Hidden root shell backdoor
  • 41. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth stack overflow UDP service listening on 0.0.0.0 by default RIM process (Radio Interface Module)
  • 42. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth stack overflow
  • 43. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth stack overflow
  • 44. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth stack overflow •  Only some old versions vulnerable to this stack overflow(Let’s see why in a minute). •  Kontron devices (aircrafts) firmware should be vulnerable based on info in their website.
  • 45. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth “global” denial of service Newest firmware version, stack overflow fixed. But…
  • 46. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth “global” denial of service
  • 47. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote pre-auth “global” denial of service Execute the same POC 2 o 3 times killing the RIM process several times and the whole OS will be rebooted Watchdog checks if RIM process is running, if not, the whole OS is rebooted.
  • 48. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint Vulnerabilities Domain 0x32? Local_mint_addr? Lots of recvfrom in binaries
  • 49. IOActive, Inc. Copyright ©2018. All Rights Reserved. What is Mint? No much info on the internet L2/L3 proprietary protocol Level 1 VLAN Level 2 IP
  • 50. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint L2/L3 proprietary protocol Proprietary socket address family (AF_MINT) (sys/socket.c sys/socket.h) Datagram socket 1.  Reverse engineer their kernel to mimic this L2/L3 protocol and build a client 2.  Try to emulate the whole OS/Kernel (Probable, but might be painful) 3.  Find a way to build a client using their OS kernel
  • 51. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint Attack scenarios using Mint: •  Attacker connects its device to the network or directly to the target Device (Wireless or Cable) •  Attacker remotely compromises a device connected to the network •  Attack services/AP/Controllers over Mint services •  Controllers == Windows DC
  • 52. IOActive, Inc. Copyright ©2018. All Rights Reserved. Creating Mint Client: Mint client: Inspecting their library usr/lib/python2.7/lib-dynload/_socket.so : We should be able to import socket and create Mint sockets.
  • 53. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint Default config of controller Standalone AP can also be configured as Controller
  • 54. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint Attacker’s device. I want to connect over mint to the Controller(victim) Now, Controller (victim) sees attacker over mint And attacker can also connecter over mint to Controller (victim)
  • 55. IOActive, Inc. Copyright ©2018. All Rights Reserved. Mint Vulnerabilities Services listening on several ports over L2/L3 protocol Example of function parsing messages over 1 specific port (HSD process):
  • 56. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) Memcpy’s src and len user-controlled, dst is heap. Totally controllable: HSD process, Mint port 14
  • 57. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) To reach that memcpy in the switch case statement we have to: First go to case0 of switch statement and we got a restriction Get_session_by_mac check if the MAC sent in our payload is authenticated
  • 58. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) To reach that memcpy in the switch case statement we have to: Luckily we can add a fake MAC to the authenticated list Another case for the switch case statement allow us that:
  • 59. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) To reach that memcpy in the switch case statement we have to send this: First, session alloc for our Fake MAC addr
  • 60. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) To reach that memcpy in the switch case statement we have to send this: And now we can reach the vulnerable memcpy
  • 61. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow (mint) Crash: /root # gdb (gdb) attach 1765 Attaching to process 1765 Reading symbols from /usr/sbin/hsd...(no debugging symbols found)...done. (gdb) c Continuing. Program received signal SIGABRT, Aborted. 0x2af26624 in raise () from /lib/libc.so.6 (gdb) bt #0 0x2af26624 in raise () from /lib/libc.so.6 #1 0x2af28108 in abort () from /lib/libc.so.6 #2 0x2af645b0 in __fsetlocking () from /lib/libc.so.6 #3 0x2af6b620 in malloc_usable_size () from /lib/libc.so.6
  • 62. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow 2 (mint) Another Memcpy’s src and len user-controlled, dst is heap. Totally controllable: HSD process, Mint port 14
  • 63. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth heap overflow 2 (mint) Another Memcpy’s src and len user-controlled, dst is heap. Totally controllable: HSD process, Mint port 14 /root # gdb (gdb) attach 4820 Attaching to process 4820 Reading symbols from /usr/sbin/hsd...(no debugging symbols found)...done. (gdb) c Continuing. Program received signal SIGABRT, Aborted. 0x2af26624 in raise () from /lib/libc.so.6 (gdb) bt #0 0x2af26624 in raise () from /lib/libc.so.6 #1 0x2af28108 in abort () from /lib/libc.so.6 #2 0x2af645b0 in __fsetlocking () from /lib/libc.so.6 #3 0x2af6b620 in malloc_usable_size () from /lib/libc.so.6
  • 64. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth stack overflow (mint) Stack overflow where user data comes from the previous memcpy vuln. To overflow the Stack the Heap buffer has to be overflowed as well:
  • 65. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth stack overflow (mint)
  • 66. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth stack overflow (mint)
  • 67. IOActive, Inc. Copyright ©2018. All Rights Reserved. Remote Pre-auth stack overflow (mint) LIBC sanity checks can make it crash before the stack overflow happens In this case is not a problem as it won’t crash if we trigger the stack overflow “quickly”
  • 68. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT •  NO ASLR, NO NX, NO STACK CANARIES.. •  Just jump to our shellcode? Nope •  Cache incoherence problem (well known): •  MIPS CPU I-Cache D-Cache Instructions, Data •  Our payload likely will be stored in the D-Cache
  • 69. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT
  • 70. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT •  FILL THE D-CACHE TO FLUSH IT (Depends on how big it is) •  Call a blocking function such as Sleep( ) using ROP •  The cache will be flushed
  • 71. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT ROP: From the epilogue we know the registers that we control at the crash time
  • 72. IOActive, Inc. Copyright ©2018. All Rights Reserved. LIBC GADGETS
  • 73. IOActive, Inc. Copyright ©2018. All Rights Reserved. SHELLCODE
  • 74. IOActive, Inc. Copyright ©2018. All Rights Reserved. SHELLCODE
  • 75. IOActive, Inc. Copyright ©2018. All Rights Reserved. SHELLCODE MIPS N32:
  • 76. IOActive, Inc. Copyright ©2018. All Rights Reserved. SHELLCODE MIPS N32:
  • 77. IOActive, Inc. Copyright ©2018. All Rights Reserved. SHELLCODE MIPS N32 Shellcode:
  • 78. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT
  • 79. IOActive, Inc. Copyright ©2018. All Rights Reserved. DEMO
  • 80. IOActive, Inc. Copyright ©2018. All Rights Reserved. EXPLOIT 1.  Use your own device (or use compromised one). 2.  Add our Fake MAC addr to the auth list 3.  Overflow the heap with our ROP Gadgets and Shellcode 4.  Stack overflow with the Heap data. 5.  BANG!
  • 81. IOActive, Inc. Copyright ©2018. All Rights Reserved. AEROSCOUT VULNERABILITY
  • 82. IOActive, Inc. Copyright ©2018. All Rights Reserved. AEROSCOUT VULNERABILITY
  • 83. IOActive, Inc. Copyright ©2018. All Rights Reserved. AEROSCOUT VULNERABILITY UDP 1144
  • 84. IOActive, Inc. Copyright ©2018. All Rights Reserved. AEROSCOUT VULNERABILITY •  No Authentication at all •  Once reverse engineered the protocol, you can mess with locations
  • 85. IOActive, Inc. Copyright ©2018. All Rights Reserved. Conclusion •  Patches provided by extreme networks: https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003
  • 86. IOActive, Inc. Copyright ©2018. All Rights Reserved. Conclusions •  Lot of room for improvement in WingOS •  There are more vulnerabilities in the OS •  Hopefully, with this lessons learned, most of them will be fixed proactively?