SlideShare a Scribd company logo
BROADCAST
SIGNAL
INTRUSION
Hacking radio stations
(ɔ) 2023
Gjoko Krstic
• Founder of Zero Science Lab2
• Offensive security research lead at ING
• Member of g00g00tka group
• Cybernetics student ☺
2
AGENDA
• Introduction
• Radio Station Components
• Broadcast Signal Intrusion
• ZSL Method
• Conclusion
• End of Transmission
3
4
Guglielmo Marconi, an Italian inventor and
electrical engineer, is credited with the invention
of the radio in 1894 and demonstrated in 1895.
He continued to develop and improve his system,
and in 1901 he successfully transmitted the first
transatlantic radio signal.
Alexander Graham Bell, an American inventor,
scientist, and teacher of the deaf, is also
considered one of the pioneers of radio
technology. He developed an early version of the
radio, which he called the "photophone," that
used light waves to transmit sound.
BRIEF HISTORY
5
BROADCAST TYPES
STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB
Internet radio, which allows
listeners to stream audio
over the internet.
AM (Amplitude Modulation)
radio, which is the traditional
type of radio broadcasting and
uses variations in the amplitude
(or strength) of a radio wave to
transmit sound.
FM (Frequency Modulation)
radio, which uses variations in
the frequency of a radio wave
to transmit sound. FM radio
generally provides better sound
quality than AM radio.
Satellite radio, which is a
subscription-based service
that uses a network of
satellites to transmit radio
signals.
HD Radio, which is a digital
technology that allows FM
and AM stations to
broadcast additional
channels and data
alongside their traditional
analog signals.
1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT
COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE.
2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO
SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION.
3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS
ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM.
4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT
VIA AN ANTENNA.
5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR.
6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S
THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO
RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE.
7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND
PLAYS THE SOUND VIA SPEAKERS.
6
TYPICAL RADIO COMPONENTS
7
8
9
10
ANALOG DIGITAL
FM TRANSMITTERS
11
12
13
14
15
BROADCAST SIGNAL INTRUSION
Broadcast signal intrusion is the unauthorized alteration
or takeover of a broadcast signal. This can occur on
television or radio broadcasts and can take many forms.
Digital intrusion is more sophisticated and can include
hacking into a station's computer systems to gain
control of the signal, or intercepting and modifying the
signal as it is being transmitted.
16
17
PUBLIC INCIDENTS
18
PUBLIC INCIDENTS
19
PUBLIC INCIDENTS
20
PUBLIC INCIDENTS
21
PUBLIC INCIDENTS
22
PUBLIC INCIDENTS
23
PUBLIC INCIDENTS
24
PUBLIC INCIDENTS
25
PUBLIC INCIDENTS
26
PUBLIC INCIDENTS
27
WHAT IS DAB?
WHAT IS RDS?
DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different
modulation method compared to FM and AM. DAB uses a technique called
COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the
audio signals onto a carrier frequency. DAB also can transmit additional data,
such as station information, song titles and traffic reports, but it uses a different
method to transmit this data, it uses the DAB EPG (Electronic Program Guide)
that allows for the transmission of more advanced information than RDS.
RDS (Radio Data System) is a technology that is primarily used for FM radio, it
allows for the transmission of additional data, such as song titles, station
information, and traffic reports, over FM radio waves.
Case #13 – Adtec Digital
Digital Video Broadcasting (DVB)
Flexible and powerful, it ensures perfect sound
quality and full compatibility with radio
broadcasting standards and can be used
simultaneously for FM and HD, DAB, DRM or
streaming.
29
RADIO PROCESSING
30
INPUT/OUTPUT
Many audio processors and other IoT
devices come with built-in web
interfaces or APIs that allow for
remote management and control, and
software such as "Remote Control"
can be used to access these
interfaces. This can be useful for
adjusting settings, monitoring the
performance of the equipment, and
troubleshooting problems remotely.
VECTORS [BLACKBOX]
• The network-connected device
- Web interface (PHP, CGI, Shell scripts), HTTP
- Telnet: Link&Share terminal server
- ELF32 binaries (Linux/ARM)
- Firmware?
• The software (thick client), Windows 10
- SOUND4 Server.exe (64bit)
- SOUND4 Remote Control.exe (32bit)
- LinkAndShare Transmitter.exe (32bit)
32
INVESTIGATION
• DuckDuckGo, Documentation, OpenAI, YouTube
• Penetration test
-> Manual analysis + scan/map
• Coverage-guided fuzzing
• Source code review
• OSINT + exposure
-> Shodan, BinaryEdge
33
RESULTS
34
RESULTS
• 25 0-days and counting 
• 107 radio stations affected
• No response from the vendor(s) 
• Collab with national CERTs and VINCE (CISA)
• CVEs pending… but we don’t care about that
35
36
FORMAT STRING IN USERNAME ENV
(LinkAndShareTransmitter.exe)
37
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
38
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
39
40
JACKALOPE + WINAFL
SOUND4 Remote Control.exe (vc_s4client.dll)
41
MAIN INTERFACE
SOUND4 Remote Control.exe
42
MAIN INTERFACE
SOUND4 Remote Control.exe
43
44
ADDING USERS
45
COMMUNICATION
46
RDS ENCODER
47
OUTPUTS
48
TELNET
49
TELNET
50
INTERNET
STREAMING
IP CONNECT
NEWS FLASH FROM THE AI
WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E
HACKER TAKE OVER A BROADCAST SIGNAL ?
“If an audio processor is hacked, it is possible that the hacker could
take over the broadcast signal. Depending on the specific device and
the level of access gained by the hacker, they could potentially modify
the audio content, disrupt the transmission, or even gain control over
the entire broadcast system.
However, it's important to note that these kind of hacks are not easy to
carry out and would require a high level of technical knowledge and
skill. Additionally, most IoT devices have some form of security
measures in place to prevent unauthorized access, such as firewalls,
encryption and authentication.”
51
…
if (isset($_POST['username']) && isset($_POST['password'])) {
$ret = -1;
exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server
_check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret);
…
52
FIRMWARE GLIMPSE: WEB GI
(login.php)
VULNERABILITIES!
Privilege Escalation
Cross-Site Request Forgery
Authorization Bypass
Denial of Service
Authentication Bypass
ICMP Flood Attack
Information Disclosure
Command Injection
SQL Injection
Cross-Site Scripting
Directory Traversal
Pre-auth Factory Reset
Stack-based Buffer Overflow
Default Credentials
Hard-coded Credentials
Cleartext Storage and Communication
Vulnerable Libraries/Binaries
Broadcast Signal Hijacking
54
DEMO::RCE
55
JUST ANOTHER SHOUTOUT
• Radio and broadcast signal intrusion is a serious security
concern that can disrupt communications and cause
confusion and panic among the public.
• Security is often overlooked in the radio and
broadcast industry, leaving exposed devices and
components online and vulnerable to attack.
• IoT vendors need to have more awareness about
security and include security in their software
development life cycle (SDLC) pipeline to
prevent vulnerabilities from being introduced in
their products.
THANK YOU
HEK.SI - 2023
@zeroscience
www.zeroscience.mk
56
57

More Related Content

What's hot

Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANTCV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
Leonce N'guessan
 
Cours VTP
Cours VTPCours VTP
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOS
Hermann GBILIMAKO
 
Formation - WiFi
Formation - WiFiFormation - WiFi
Formation - WiFi
Patrick Vincent
 
3G V/S 4G
3G V/S 4G3G V/S 4G
3G V/S 4G
UTKARSH NATH
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatils
Mostain Billah
 
Chapitre 3 - Protocole Bus CAN (2020/2021
Chapitre 3 - Protocole Bus CAN (2020/2021Chapitre 3 - Protocole Bus CAN (2020/2021
Chapitre 3 - Protocole Bus CAN (2020/2021
Tarik Zakaria Benmerar
 
Clustering
ClusteringClustering
Clustering
Agung Younghusband
 
Rfc3261
Rfc3261Rfc3261
Rfc3261
Thomas Lee
 
Chapter03
Chapter03Chapter03
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
Jose Gonzalez
 
Etude de la VoIP
Etude de la VoIPEtude de la VoIP
Etude de la VoIP
Chiheb Ouaghlani
 
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何かIIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
techlog (Internet Initiative Japan Inc.)
 
Vodafone KPIs
Vodafone KPIsVodafone KPIs
Vodafone KPIs
Low Carbon Jargon
 
Cambium networks prensent
Cambium networks prensentCambium networks prensent
Cambium networks prensent
jmmypham
 
Toip slide
Toip slideToip slide
Toip slide
Dimitri LEMBOKOLO
 
e-SIM
e-SIMe-SIM

What's hot (20)

Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANTCV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
CV N'GUESSAN KOUADIO LEONCE INGENIEUR INFORMATICIEN - ENSEIGNANT
 
Cours VTP
Cours VTPCours VTP
Cours VTP
 
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOS
 
Formation - WiFi
Formation - WiFiFormation - WiFi
Formation - WiFi
 
3G V/S 4G
3G V/S 4G3G V/S 4G
3G V/S 4G
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatils
 
Chapitre 3 - Protocole Bus CAN (2020/2021
Chapitre 3 - Protocole Bus CAN (2020/2021Chapitre 3 - Protocole Bus CAN (2020/2021
Chapitre 3 - Protocole Bus CAN (2020/2021
 
Clustering
ClusteringClustering
Clustering
 
Rfc3261
Rfc3261Rfc3261
Rfc3261
 
Vlan-spanning tree
Vlan-spanning treeVlan-spanning tree
Vlan-spanning tree
 
Chapter03
Chapter03Chapter03
Chapter03
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 
Etude de la VoIP
Etude de la VoIPEtude de la VoIP
Etude de la VoIP
 
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何かIIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
IIJmio meeting 28 MVNOの音声通話料金が安くなるって本当?指定設備卸の適正性検証とは何か
 
Trixbox
TrixboxTrixbox
Trixbox
 
Vodafone KPIs
Vodafone KPIsVodafone KPIs
Vodafone KPIs
 
Cambium networks prensent
Cambium networks prensentCambium networks prensent
Cambium networks prensent
 
Toip slide
Toip slideToip slide
Toip slide
 
e-SIM
e-SIMe-SIM
e-SIM
 

Similar to Broadcast Signal Intrusion - Hacking Radio Stations

Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
Aniket Bhor
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
Vikas Mehta
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Dr. Edwin Hernandez
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine Telecom
Andrew Trickett
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
Dr. Edwin Hernandez
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)
Craig Bayliss
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
kp12 buniel
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan
Himanshu Gupta
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
Nilgiri publicity
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET Journal
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentation
apral
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
Hi Tech Criminal Justice
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
samudra28th
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Luca Bongiorni
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
Carl Ford
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building Controls
Wayne Caswell
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)
Rahul Phulwariya
 
VHF Communication Basics Part 3
VHF Communication  Basics Part 3VHF Communication  Basics Part 3
VHF Communication Basics Part 3
Afghanistan civil aviation institute
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
Tanvir Taj
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
AJAL A J
 

Similar to Broadcast Signal Intrusion - Hacking Radio Stations (20)

Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine Telecom
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentation
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building Controls
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)
 
VHF Communication Basics Part 3
VHF Communication  Basics Part 3VHF Communication  Basics Part 3
VHF Communication Basics Part 3
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
 

More from Zero Science Lab

Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Zero Science Lab
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
Zero Science Lab
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
Zero Science Lab
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернел
Zero Science Lab
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Zero Science Lab
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
Zero Science Lab
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2
Zero Science Lab
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Zero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијата
Zero Science Lab
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)
Zero Science Lab
 
M3t4splo1t
M3t4splo1tM3t4splo1t
M3t4splo1t
Zero Science Lab
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)
Zero Science Lab
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)
Zero Science Lab
 
OWASP Bulgaria
OWASP BulgariaOWASP Bulgaria
OWASP Bulgaria
Zero Science Lab
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)
Zero Science Lab
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical Application
Zero Science Lab
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
Zero Science Lab
 

More from Zero Science Lab (19)

Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернел
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијата
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)
 
M3t4splo1t
M3t4splo1tM3t4splo1t
M3t4splo1t
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)
 
OWASP Bulgaria
OWASP BulgariaOWASP Bulgaria
OWASP Bulgaria
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical Application
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 

Recently uploaded

买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
nvoyobt
 
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER""IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
Emmanuel Onwumere
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
uwoso
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
bttak
 
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
hanniaarias53
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
bttak
 
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
bttak
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Peter Gallagher
 
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
akrooshsaleem36
 
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
lopezkatherina914
 

Recently uploaded (10)

买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
 
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER""IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
 
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
 
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
 

Broadcast Signal Intrusion - Hacking Radio Stations

  • 2. Gjoko Krstic • Founder of Zero Science Lab2 • Offensive security research lead at ING • Member of g00g00tka group • Cybernetics student ☺ 2
  • 3. AGENDA • Introduction • Radio Station Components • Broadcast Signal Intrusion • ZSL Method • Conclusion • End of Transmission 3
  • 4. 4 Guglielmo Marconi, an Italian inventor and electrical engineer, is credited with the invention of the radio in 1894 and demonstrated in 1895. He continued to develop and improve his system, and in 1901 he successfully transmitted the first transatlantic radio signal. Alexander Graham Bell, an American inventor, scientist, and teacher of the deaf, is also considered one of the pioneers of radio technology. He developed an early version of the radio, which he called the "photophone," that used light waves to transmit sound. BRIEF HISTORY
  • 5. 5 BROADCAST TYPES STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB Internet radio, which allows listeners to stream audio over the internet. AM (Amplitude Modulation) radio, which is the traditional type of radio broadcasting and uses variations in the amplitude (or strength) of a radio wave to transmit sound. FM (Frequency Modulation) radio, which uses variations in the frequency of a radio wave to transmit sound. FM radio generally provides better sound quality than AM radio. Satellite radio, which is a subscription-based service that uses a network of satellites to transmit radio signals. HD Radio, which is a digital technology that allows FM and AM stations to broadcast additional channels and data alongside their traditional analog signals.
  • 6. 1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE. 2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION. 3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM. 4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT VIA AN ANTENNA. 5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR. 6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE. 7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND PLAYS THE SOUND VIA SPEAKERS. 6 TYPICAL RADIO COMPONENTS
  • 7. 7
  • 8. 8
  • 9. 9
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. BROADCAST SIGNAL INTRUSION Broadcast signal intrusion is the unauthorized alteration or takeover of a broadcast signal. This can occur on television or radio broadcasts and can take many forms. Digital intrusion is more sophisticated and can include hacking into a station's computer systems to gain control of the signal, or intercepting and modifying the signal as it is being transmitted. 16
  • 27. 27 WHAT IS DAB? WHAT IS RDS? DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different modulation method compared to FM and AM. DAB uses a technique called COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the audio signals onto a carrier frequency. DAB also can transmit additional data, such as station information, song titles and traffic reports, but it uses a different method to transmit this data, it uses the DAB EPG (Electronic Program Guide) that allows for the transmission of more advanced information than RDS. RDS (Radio Data System) is a technology that is primarily used for FM radio, it allows for the transmission of additional data, such as song titles, station information, and traffic reports, over FM radio waves.
  • 28. Case #13 – Adtec Digital Digital Video Broadcasting (DVB)
  • 29. Flexible and powerful, it ensures perfect sound quality and full compatibility with radio broadcasting standards and can be used simultaneously for FM and HD, DAB, DRM or streaming. 29 RADIO PROCESSING
  • 31. Many audio processors and other IoT devices come with built-in web interfaces or APIs that allow for remote management and control, and software such as "Remote Control" can be used to access these interfaces. This can be useful for adjusting settings, monitoring the performance of the equipment, and troubleshooting problems remotely.
  • 32. VECTORS [BLACKBOX] • The network-connected device - Web interface (PHP, CGI, Shell scripts), HTTP - Telnet: Link&Share terminal server - ELF32 binaries (Linux/ARM) - Firmware? • The software (thick client), Windows 10 - SOUND4 Server.exe (64bit) - SOUND4 Remote Control.exe (32bit) - LinkAndShare Transmitter.exe (32bit) 32
  • 33. INVESTIGATION • DuckDuckGo, Documentation, OpenAI, YouTube • Penetration test -> Manual analysis + scan/map • Coverage-guided fuzzing • Source code review • OSINT + exposure -> Shodan, BinaryEdge 33
  • 35. RESULTS • 25 0-days and counting  • 107 radio stations affected • No response from the vendor(s)  • Collab with national CERTs and VINCE (CISA) • CVEs pending… but we don’t care about that 35
  • 36. 36 FORMAT STRING IN USERNAME ENV (LinkAndShareTransmitter.exe)
  • 37. 37 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 38. 38 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 39. 39
  • 40. 40 JACKALOPE + WINAFL SOUND4 Remote Control.exe (vc_s4client.dll)
  • 43. 43
  • 51. NEWS FLASH FROM THE AI WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E HACKER TAKE OVER A BROADCAST SIGNAL ? “If an audio processor is hacked, it is possible that the hacker could take over the broadcast signal. Depending on the specific device and the level of access gained by the hacker, they could potentially modify the audio content, disrupt the transmission, or even gain control over the entire broadcast system. However, it's important to note that these kind of hacks are not easy to carry out and would require a high level of technical knowledge and skill. Additionally, most IoT devices have some form of security measures in place to prevent unauthorized access, such as firewalls, encryption and authentication.” 51
  • 52. … if (isset($_POST['username']) && isset($_POST['password'])) { $ret = -1; exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server _check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret); … 52 FIRMWARE GLIMPSE: WEB GI (login.php)
  • 53. VULNERABILITIES! Privilege Escalation Cross-Site Request Forgery Authorization Bypass Denial of Service Authentication Bypass ICMP Flood Attack Information Disclosure Command Injection SQL Injection Cross-Site Scripting Directory Traversal Pre-auth Factory Reset Stack-based Buffer Overflow Default Credentials Hard-coded Credentials Cleartext Storage and Communication Vulnerable Libraries/Binaries Broadcast Signal Hijacking
  • 55. 55 JUST ANOTHER SHOUTOUT • Radio and broadcast signal intrusion is a serious security concern that can disrupt communications and cause confusion and panic among the public. • Security is often overlooked in the radio and broadcast industry, leaving exposed devices and components online and vulnerable to attack. • IoT vendors need to have more awareness about security and include security in their software development life cycle (SDLC) pipeline to prevent vulnerabilities from being introduced in their products.
  • 56. THANK YOU HEK.SI - 2023 @zeroscience www.zeroscience.mk 56
  • 57. 57