SlideShare a Scribd company logo
1 of 33
Download to read offline
RED
                                     BALLOON

                                     Security


                FRAK: Firmware Reverse Analysis Konsole

                                                        Ang Cui
                                       a@redballoonsecurity.com




7.27.2012	
       Defcon	
  20	
  
5th Year Ph.D. Candidate
                                                Intrusion Detection Systems Lab
                                                      Columbia University




 W h o               a m

                I
 What               do   I



 DO
7.27.2012	
                  Defcon	
  20	
  
5th Year Ph.D. Candidate
                                                Intrusion Detection Systems Lab
                                                      Columbia University

                                                     Co-Founder and CEO
                                                   Red Balloon Security Inc.
 W h o               a m                           www.redballoonsecurity.com




                I
 What               do   I



 DO
7.27.2012	
                  Defcon	
  20	
  
5th Year Ph.D. Candidate
                                                Intrusion Detection Systems Lab
                                                      Columbia University

                                                     Co-Founder and CEO
                                                   Red Balloon Security Inc.
 W h o               a m                           www.redballoonsecurity.com




                I                         Past publications:


                                          • 
 What               do   I                       Pervasive Insecurity of Embedded Network
                                                 Devices. [RAID10]

                                          •      A Quantitative Analysis of the Insecurity




 DO
                                                 of Embedded Network Devices. [ACSAC10]

                                          •      Killing the Myth of Cisco IOS Diversity:
                                                 Towards Reliable Large-Scale Exploitation
                                                 of Cisco IOS.          [USENIX WOOT 11]

                                          •      Defending Legacy Embedded Systems with
                                                 Software Symbiotes.           [RAID11]

                                          •      From Prey to Hunter: Transforming
                                                 Legacy Embedded Devices Into
                                                 Exploitation Sensor Grids.   [ACSAC11]



7.27.2012	
                  Defcon	
  20	
  
5th Year Ph.D. Candidate
                                                Intrusion Detection Systems Lab
                                                      Columbia University

                                                     Co-Founder and CEO
                                                   Red Balloon Security Inc.
 W h o               a m                           www.redballoonsecurity.com




                I                         Past Embedded Tinkerings:


                                          • 
 What               do   I                • 
                                                 Interrupt-Hijack Cisco IOS Rootkit
                                                 HP LaserJet Printer Rootkit




 DO
7.27.2012	
                  Defcon	
  20	
  
Interrupt-Hijack Shellcode
                      [blackhat USA 2011]




7.27.2012	
                     Defcon	
  20	
  
HP-RFU Vulnerability
                HP LaserJet 2550 Rootkit
                         [28c3]




                                        Attacker

                                                                          4. Win: Reverse Shell
                                                                             Server -> Kitteh

                                    1. Reverse Proxy
                                    Printer -> Attacker
                                                             Firewall

                                                            2. Reverse Proxy
                                                            Printer -> Victim


                                                                                    Server
                                         Network Printer


                                                  3. Attacker -> Server
                                                   Via Reverse Proxy




7.27.2012	
                 Defcon	
  20	
  
WORKFLOW
                                                       [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:
Binary Firmware Image




                                                                                          Analysis and Manipulation
                                                                                                   Firmware
                                 Re-Packing Process




                        7.27.2012	
                     Defcon	
  20	
  
WORKFLOW
                                                       [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:
Binary Firmware Image




                            Parse




                                                                                          Analysis and Manipulation
                           Package
                           Manifest




                                                                                                   Firmware
                                 Re-Packing Process




                        7.27.2012	
                     Defcon	
  20	
  
WORKFLOW
                                                                                         [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                         De{cript,compress}
Binary Firmware Image




                                          For each
                                          "Record"
                                                                                                      Record
                            Parse       In Firmware     Record        Record          Record
                                                                                                     Digitally
                                                      Encrypted?    Compressed?    Checksummed?




                                                                                                                            Analysis and Manipulation
                           Package                                                                   Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?




                                                                                                                                     Firmware
                                 Re-Packing Process




                        7.27.2012	
                                                           Defcon	
  20	
  
WORKFLOW
                                                                                         [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                         De{cript,compress}                           For each
Binary Firmware Image




                                          For each
                                          "Record"                                                               "unpacked Record"
                                                                                                      Record        In Firmware
                            Parse       In Firmware     Record        Record          Record
                                                                                                     Digitally                                FileSystem Extraction
                                                      Encrypted?    Compressed?    Checksummed?




                                                                                                                                                                           Analysis and Manipulation
                           Package                                                                   Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                Known Format or Proprietary Format?




                                                                                                                                                                                    Firmware
                                 Re-Packing Process




                        7.27.2012	
                                                           Defcon	
  20	
  
WORKFLOW
                                                                                         [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                         De{cript,compress}                           For each
Binary Firmware Image




                                          For each
                                          "Record"                                                               "unpacked Record"
                                                                                                      Record        In Firmware
                            Parse       In Firmware     Record        Record          Record
                                                                                                     Digitally                                FileSystem Extraction
                                                      Encrypted?    Compressed?    Checksummed?




                                                                                                                                                                           Analysis and Manipulation
                           Package                                                                   Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                Known Format or Proprietary Format?




                                                                                                                                                                                    Firmware
                                 Re-Packing Process




                        7.27.2012	
                                                           Defcon	
  20	
  
WORKFLOW
                                                                                         [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                         De{cript,compress}                           For each
Binary Firmware Image




                                          For each
                                          "Record"                                                               "unpacked Record"
                                                                                                      Record        In Firmware
                            Parse       In Firmware     Record        Record          Record
                                                                                                     Digitally                                FileSystem Extraction
                                                      Encrypted?    Compressed?    Checksummed?




                                                                                                                                                                                Analysis and Manipulation
                           Package                                                                   Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                Known Format or Proprietary Format?




                                                                                                                                                                                         Firmware
                                                                                                                                                                    For each
                                                                                                                                                                   "unpacked
                                                                                                                                                                    Record"
                                                                                                                                     Re-Pack Modified             In Firmware
                                                                                                                                        File System

                                                                                                                           Known Format or Proprietary Format?



                                 Re-Packing Process




                        7.27.2012	
                                                           Defcon	
  20	
  
WORKFLOW
                                                                                             [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                           De{cript,compress}                                For each
Binary Firmware Image




                                          For each
                                          "Record"                                                                      "unpacked Record"
                                                                                                          Record           In Firmware
                            Parse       In Firmware     Record          Record            Record
                                                                                                         Digitally                                   FileSystem Extraction
                                                      Encrypted?      Compressed?      Checksummed?




                                                                                                                                                                                       Analysis and Manipulation
                           Package                                                                       Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                       Known Format or Proprietary Format?




                                                                                                                                                                                                Firmware
                                                                                                                                                                           For each
                                                                                                                                                                          "unpacked
                                                               Re-{cript,compress}, Recalculate Checksum, etc                                                              Record"
                                                                                                                                            Re-Pack Modified             In Firmware
                                                                                                             Record
                                                           Record          Record           Record
                                                                                                            Digitally                          File System
                                                         Encrypted?      Compressed?     Checksummed?
                                                                                                            Signed?
                                                                                                                                  Known Format or Proprietary Format?
                                                               Known Algorithm or Proprietary Algorithm?


                                 Re-Packing Process




                        7.27.2012	
                                                               Defcon	
  20	
  
WORKFLOW
                                                                                             [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                           De{cript,compress}                                For each
Binary Firmware Image




                                          For each
                                          "Record"                                                                      "unpacked Record"
                                                                                                          Record           In Firmware
                            Parse       In Firmware     Record          Record            Record
                                                                                                         Digitally                                   FileSystem Extraction
                                                      Encrypted?      Compressed?      Checksummed?




                                                                                                                                                                                       Analysis and Manipulation
                           Package                                                                       Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                       Known Format or Proprietary Format?




                                                                                                                                                                                                Firmware
                                                                                                                                                                           For each
                                                                                                                                                                          "unpacked
                                                               Re-{cript,compress}, Recalculate Checksum, etc                                                              Record"
                                                                                                                                            Re-Pack Modified             In Firmware
                                           Repack                                                            Record
                                                           Record          Record           Record
                                                                                                            Digitally                          File System
                                         All Binary      Encrypted?      Compressed?     Checksummed?
                                                                                                            Signed?
                                         "records"
                                                                                                                                  Known Format or Proprietary Format?
                                                               Known Algorithm or Proprietary Algorithm?


                                 Re-Packing Process




                        7.27.2012	
                                                               Defcon	
  20	
  
WORKFLOW
                                                                                             [XYZ Embedded {Offense|Defense}]




                                  Unpacking Process:


                                                                           De{cript,compress}                                For each
Binary Firmware Image




                                          For each
                                          "Record"                                                                      "unpacked Record"
                                                                                                          Record           In Firmware
                            Parse       In Firmware     Record          Record            Record
                                                                                                         Digitally                                   FileSystem Extraction
                                                      Encrypted?      Compressed?      Checksummed?




                                                                                                                                                                                       Analysis and Manipulation
                           Package                                                                       Signed?
                           Manifest
                                                            Known Algorithm or Proprietary Algorithm?                                       Known Format or Proprietary Format?




                                                                                                                                                                                                Firmware
                                                                                                                                                                           For each
                                                                                                                                                                          "unpacked
                                                               Re-{cript,compress}, Recalculate Checksum, etc                                                              Record"
                             Re-                                                                                                            Re-Pack Modified             In Firmware
                                           Repack                                                            Record
                           generate                        Record          Record           Record
                                                                                                            Digitally                          File System
                                         All Binary      Encrypted?      Compressed?     Checksummed?
                           Package                                                                          Signed?
                                         "records"
                           Manifest                                                                                               Known Format or Proprietary Format?
                                                               Known Algorithm or Proprietary Algorithm?


                                 Re-Packing Process




                        7.27.2012	
                                                               Defcon	
  20	
  
Payload Design
                                      Reasons why Ang stays
                                      home on Friday night




7.27.2012	
        Defcon	
  20	
  
Payload Design
                                      Reasons why Ang stays
                                      home on Friday night
     Payload
   Developement




7.27.2012	
        Defcon	
  20	
  
Payload Design
                                      Reasons why Ang stays
                                      home on Friday night
     Payload
   Developement



 Payload Testing




7.27.2012	
        Defcon	
  20	
  
Payload Design
                                      Reasons why Ang stays
                                      home on Friday night
     Payload
   Developement



 Payload Testing




   STARE

            @

 BINARY

    BLOB
7.27.2012	
        Defcon	
  20	
  
Payload Design
                                               Reasons why Ang stays
                                               home on Friday night
     Payload
   DevelopementDesign
        Payload

          Payload Design
          Payload
 Payload Testing
       Developement




   STARE
                           THIS PART
            @

 BINARY                     L	
  
    BLOB
7.27.2012	
                 Defcon	
  20	
  
F R A K
 irmware          everse                      nalysis   onsole

                [Better Living Through Software Engineering]




7.27.2012	
                Defcon	
  20	
  
F R A K
                                       irmware     everse   nalysis   onsole




    Firmware Unpacking         Firmware Analysis
          Engine                    Engine




   Firmware Modification       Firmware Repacking
          Engine                    Engine




      Programmatic API        Interactive Console
7.27.2012	
   ACCESS       Defcon	
  20	
   Access
F R A K
                                                       irmware     everse   nalysis   onsole


  HP-RFU    Cisco IOS      Cisco-CNU   XYZ-Format      Arbitrary
  Module     Module         Module       Module     Firmware Image
                                                      of Unknown
                                                         Format




    Firmware Unpacking
    Firmware Unpacking                         Firmware Analysis
          Engine
          Engine                                    Engine




   Firmware Modification
   Firmware Modification                      Firmware Repacking
          Engine
          Engine                                   Engine




      Programmatic API
       Programmatic                         Interactive Console
7.27.2012	
   ACCESS
              ACCESS                     Defcon	
  20	
   Access
F R A K
                                                       irmware     everse   nalysis   onsole


  HP-RFU     Cisco IOS     Cisco-CNU   XYZ-Format      Arbitrary
  Module      Module        Module       Module     Firmware Image
                                                      of Unknown
                                                         Format




    Firmware Unpacking
    Firmware Unpacking                         Firmware Analysis
          Engine
          Engine                                    Engine




        Unpacked
        Firmware
          Binary




   Firmware Modification
   Firmware Modification                      Firmware Repacking
          Engine
          Engine                                   Engine




      Programmatic API
       Programmatic                         Interactive Console
7.27.2012	
   ACCESS
              ACCESS                     Defcon	
  20	
   Access
F R A K
                                                            irmware    everse   nalysis   onsole


  HP-RFU     Cisco IOS     Cisco-CNU    XYZ-Format          Arbitrary
  Module      Module        Module        Module         Firmware Image
                                                           of Unknown
                                                              Format




    Firmware Unpacking
    Firmware Unpacking                             Firmware Analysis
          Engine
          Engine                                        Engine




        Unpacked                                       XYZ Dynamic
        Firmware                       Software      Instrumentation
          Binary                       Symbiotes            &
                                                         Rootkit




   Firmware Modification
   Firmware Modification                           Firmware Repacking
          Engine
          Engine                                        Engine




      Programmatic API
       Programmatic                           Interactive Console
7.27.2012	
   ACCESS
              ACCESS                       Defcon	
  20	
   Access
F R A K
                                                            irmware    everse   nalysis   onsole


  HP-RFU     Cisco IOS     Cisco-CNU    XYZ-Format          Arbitrary
  Module      Module        Module        Module         Firmware Image
                                                           of Unknown
                                                              Format




    Firmware Unpacking
    Firmware Unpacking                             Firmware Analysis
          Engine
          Engine                                        Engine




        Unpacked                                       XYZ Dynamic
        Firmware                       Software      Instrumentation
          Binary                       Symbiotes            &
                                                         Rootkit




   Firmware Modification
   Firmware Modification                           Firmware Repacking
          Engine
          Engine                                        Engine




      Programmatic API
       Programmatic                           Interactive Console
7.27.2012	
   ACCESS
              ACCESS                       Defcon	
  20	
   Access
F R A K      irmware   everse                      nalysis   onsole



      Unpack, Analyze, Modify, Repack: Cisco IOS




7.27.2012	
                        Defcon	
  20	
  
Payload Design
      Payload                          Reasons why Ang stays
   Developement
                                       home on Friday night
     Payload
  Developement
 Payload Testing


 Payload Design
 Payload Testing

  STARE @ BINARY
       BLOB




   ?
   STARE
                   THIS PART
            @

 BINARY             L	
  
    BLOB                                     Thanks FRAK!

7.27.2012	
         Defcon	
  20	
  
Demos
                •    Packer/Repacker for Cisco IOS, HP-RFU
                •    Automagic Binary Analysis
                •    IDA-Pro Integration
                •    Entropy-related Analysis
                •    Automated IOS/RFU Rootkit Injection




7.27.2012	
                   Defcon	
  20	
  
FRAK Konsole




7.27.2012	
     Defcon	
  20	
  
FRAK is still WIP. For Early Access

                                                           Contact
                                         Frak-request@redballoonsecurity.com




7.27.2012	
                  Defcon	
  20	
  
7.27.2012	
     Defcon	
  20	
  

More Related Content

Similar to DefCon 2012 - Finding Firmware Vulnerabilities

ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalAbhishek Singh
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreAT Kishore
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware AnalysisAlbert Hui
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Source Conference
 
Don't Judge a Website by its Icon - Read the Label!
Don't Judge a Website by its Icon - Read the Label!Don't Judge a Website by its Icon - Read the Label!
Don't Judge a Website by its Icon - Read the Label!Dinis Cruz
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010Aditya K Sood
 
Large scale automation with jenkins
Large scale automation with jenkinsLarge scale automation with jenkins
Large scale automation with jenkinsKohsuke Kawaguchi
 
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...MindShare_kk
 
Software Composition Analysis in PHP
Software Composition Analysis in PHP Software Composition Analysis in PHP
Software Composition Analysis in PHP Piotr Horzycki
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsSpeck&Tech
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsemanuele_nl
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsBlack Duck by Synopsys
 
DARPA: Cyber Analytical Framework (Kaufman)
DARPA: Cyber Analytical Framework (Kaufman)DARPA: Cyber Analytical Framework (Kaufman)
DARPA: Cyber Analytical Framework (Kaufman)Michael Scovetta
 
2012 04 Analysis Techniques for Mobile OS Security
2012 04 Analysis Techniques for Mobile OS Security2012 04 Analysis Techniques for Mobile OS Security
2012 04 Analysis Techniques for Mobile OS SecurityRaleigh ISSA
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security ProductsDaveEdwards12
 

Similar to DefCon 2012 - Finding Firmware Vulnerabilities (20)

ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_final
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 
Don't Judge a Website by its Icon - Read the Label!
Don't Judge a Website by its Icon - Read the Label!Don't Judge a Website by its Icon - Read the Label!
Don't Judge a Website by its Icon - Read the Label!
 
Fireshark - Brucon 2010
Fireshark - Brucon 2010Fireshark - Brucon 2010
Fireshark - Brucon 2010
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
 
Large scale automation with jenkins
Large scale automation with jenkinsLarge scale automation with jenkins
Large scale automation with jenkins
 
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out...
 
Software Composition Analysis in PHP
Software Composition Analysis in PHP Software Composition Analysis in PHP
Software Composition Analysis in PHP
 
Build Programming Language Runtime with LLVM
Build Programming Language Runtime with LLVMBuild Programming Language Runtime with LLVM
Build Programming Language Runtime with LLVM
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformations
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
DARPA: Cyber Analytical Framework (Kaufman)
DARPA: Cyber Analytical Framework (Kaufman)DARPA: Cyber Analytical Framework (Kaufman)
DARPA: Cyber Analytical Framework (Kaufman)
 
2012 04 Analysis Techniques for Mobile OS Security
2012 04 Analysis Techniques for Mobile OS Security2012 04 Analysis Techniques for Mobile OS Security
2012 04 Analysis Techniques for Mobile OS Security
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 

More from Michael Smith

BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...Michael Smith
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)Michael Smith
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityMichael Smith
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerMichael Smith
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeMichael Smith
 
DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)Michael Smith
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)Michael Smith
 
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKDefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKMichael Smith
 
DefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersDefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersMichael Smith
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesMichael Smith
 
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsMichael Smith
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksMichael Smith
 
DefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYDefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYMichael Smith
 
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingDefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingMichael Smith
 
DefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersDefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersMichael Smith
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataMichael Smith
 
DefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter HackingDefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter HackingMichael Smith
 

More from Michael Smith (17)

BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency Security
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
 
DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)
 
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKDefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
 
DefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersDefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water Meters
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over Powerlines
 
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
 
DefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYDefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPY
 
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingDefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
 
DefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersDefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO Routers
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android Data
 
DefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter HackingDefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter Hacking
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

DefCon 2012 - Finding Firmware Vulnerabilities

  • 1. RED BALLOON Security FRAK: Firmware Reverse Analysis Konsole Ang Cui a@redballoonsecurity.com 7.27.2012   Defcon  20  
  • 2. 5th Year Ph.D. Candidate Intrusion Detection Systems Lab Columbia University W h o a m I What do I DO 7.27.2012   Defcon  20  
  • 3. 5th Year Ph.D. Candidate Intrusion Detection Systems Lab Columbia University Co-Founder and CEO Red Balloon Security Inc. W h o a m www.redballoonsecurity.com I What do I DO 7.27.2012   Defcon  20  
  • 4. 5th Year Ph.D. Candidate Intrusion Detection Systems Lab Columbia University Co-Founder and CEO Red Balloon Security Inc. W h o a m www.redballoonsecurity.com I Past publications: •  What do I Pervasive Insecurity of Embedded Network Devices. [RAID10] •  A Quantitative Analysis of the Insecurity DO of Embedded Network Devices. [ACSAC10] •  Killing the Myth of Cisco IOS Diversity: Towards Reliable Large-Scale Exploitation of Cisco IOS. [USENIX WOOT 11] •  Defending Legacy Embedded Systems with Software Symbiotes. [RAID11] •  From Prey to Hunter: Transforming Legacy Embedded Devices Into Exploitation Sensor Grids. [ACSAC11] 7.27.2012   Defcon  20  
  • 5. 5th Year Ph.D. Candidate Intrusion Detection Systems Lab Columbia University Co-Founder and CEO Red Balloon Security Inc. W h o a m www.redballoonsecurity.com I Past Embedded Tinkerings: •  What do I •  Interrupt-Hijack Cisco IOS Rootkit HP LaserJet Printer Rootkit DO 7.27.2012   Defcon  20  
  • 6. Interrupt-Hijack Shellcode [blackhat USA 2011] 7.27.2012   Defcon  20  
  • 7. HP-RFU Vulnerability HP LaserJet 2550 Rootkit [28c3] Attacker 4. Win: Reverse Shell Server -> Kitteh 1. Reverse Proxy Printer -> Attacker Firewall 2. Reverse Proxy Printer -> Victim Server Network Printer 3. Attacker -> Server Via Reverse Proxy 7.27.2012   Defcon  20  
  • 8. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: Binary Firmware Image Analysis and Manipulation Firmware Re-Packing Process 7.27.2012   Defcon  20  
  • 9. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: Binary Firmware Image Parse Analysis and Manipulation Package Manifest Firmware Re-Packing Process 7.27.2012   Defcon  20  
  • 10. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} Binary Firmware Image For each "Record" Record Parse In Firmware Record Record Record Digitally Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Firmware Re-Packing Process 7.27.2012   Defcon  20  
  • 11. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware Re-Packing Process 7.27.2012   Defcon  20  
  • 12. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware Re-Packing Process 7.27.2012   Defcon  20  
  • 13. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware For each "unpacked Record" Re-Pack Modified In Firmware File System Known Format or Proprietary Format? Re-Packing Process 7.27.2012   Defcon  20  
  • 14. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware For each "unpacked Re-{cript,compress}, Recalculate Checksum, etc Record" Re-Pack Modified In Firmware Record Record Record Record Digitally File System Encrypted? Compressed? Checksummed? Signed? Known Format or Proprietary Format? Known Algorithm or Proprietary Algorithm? Re-Packing Process 7.27.2012   Defcon  20  
  • 15. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware For each "unpacked Re-{cript,compress}, Recalculate Checksum, etc Record" Re-Pack Modified In Firmware Repack Record Record Record Record Digitally File System All Binary Encrypted? Compressed? Checksummed? Signed? "records" Known Format or Proprietary Format? Known Algorithm or Proprietary Algorithm? Re-Packing Process 7.27.2012   Defcon  20  
  • 16. WORKFLOW [XYZ Embedded {Offense|Defense}] Unpacking Process: De{cript,compress} For each Binary Firmware Image For each "Record" "unpacked Record" Record In Firmware Parse In Firmware Record Record Record Digitally FileSystem Extraction Encrypted? Compressed? Checksummed? Analysis and Manipulation Package Signed? Manifest Known Algorithm or Proprietary Algorithm? Known Format or Proprietary Format? Firmware For each "unpacked Re-{cript,compress}, Recalculate Checksum, etc Record" Re- Re-Pack Modified In Firmware Repack Record generate Record Record Record Digitally File System All Binary Encrypted? Compressed? Checksummed? Package Signed? "records" Manifest Known Format or Proprietary Format? Known Algorithm or Proprietary Algorithm? Re-Packing Process 7.27.2012   Defcon  20  
  • 17. Payload Design Reasons why Ang stays home on Friday night 7.27.2012   Defcon  20  
  • 18. Payload Design Reasons why Ang stays home on Friday night Payload Developement 7.27.2012   Defcon  20  
  • 19. Payload Design Reasons why Ang stays home on Friday night Payload Developement Payload Testing 7.27.2012   Defcon  20  
  • 20. Payload Design Reasons why Ang stays home on Friday night Payload Developement Payload Testing STARE @ BINARY BLOB 7.27.2012   Defcon  20  
  • 21. Payload Design Reasons why Ang stays home on Friday night Payload DevelopementDesign Payload Payload Design Payload Payload Testing Developement STARE THIS PART @ BINARY L   BLOB 7.27.2012   Defcon  20  
  • 22. F R A K irmware everse nalysis onsole [Better Living Through Software Engineering] 7.27.2012   Defcon  20  
  • 23. F R A K irmware everse nalysis onsole Firmware Unpacking Firmware Analysis Engine Engine Firmware Modification Firmware Repacking Engine Engine Programmatic API Interactive Console 7.27.2012   ACCESS Defcon  20   Access
  • 24. F R A K irmware everse nalysis onsole HP-RFU Cisco IOS Cisco-CNU XYZ-Format Arbitrary Module Module Module Module Firmware Image of Unknown Format Firmware Unpacking Firmware Unpacking Firmware Analysis Engine Engine Engine Firmware Modification Firmware Modification Firmware Repacking Engine Engine Engine Programmatic API Programmatic Interactive Console 7.27.2012   ACCESS ACCESS Defcon  20   Access
  • 25. F R A K irmware everse nalysis onsole HP-RFU Cisco IOS Cisco-CNU XYZ-Format Arbitrary Module Module Module Module Firmware Image of Unknown Format Firmware Unpacking Firmware Unpacking Firmware Analysis Engine Engine Engine Unpacked Firmware Binary Firmware Modification Firmware Modification Firmware Repacking Engine Engine Engine Programmatic API Programmatic Interactive Console 7.27.2012   ACCESS ACCESS Defcon  20   Access
  • 26. F R A K irmware everse nalysis onsole HP-RFU Cisco IOS Cisco-CNU XYZ-Format Arbitrary Module Module Module Module Firmware Image of Unknown Format Firmware Unpacking Firmware Unpacking Firmware Analysis Engine Engine Engine Unpacked XYZ Dynamic Firmware Software Instrumentation Binary Symbiotes & Rootkit Firmware Modification Firmware Modification Firmware Repacking Engine Engine Engine Programmatic API Programmatic Interactive Console 7.27.2012   ACCESS ACCESS Defcon  20   Access
  • 27. F R A K irmware everse nalysis onsole HP-RFU Cisco IOS Cisco-CNU XYZ-Format Arbitrary Module Module Module Module Firmware Image of Unknown Format Firmware Unpacking Firmware Unpacking Firmware Analysis Engine Engine Engine Unpacked XYZ Dynamic Firmware Software Instrumentation Binary Symbiotes & Rootkit Firmware Modification Firmware Modification Firmware Repacking Engine Engine Engine Programmatic API Programmatic Interactive Console 7.27.2012   ACCESS ACCESS Defcon  20   Access
  • 28. F R A K irmware everse nalysis onsole Unpack, Analyze, Modify, Repack: Cisco IOS 7.27.2012   Defcon  20  
  • 29. Payload Design Payload Reasons why Ang stays Developement home on Friday night Payload Developement Payload Testing Payload Design Payload Testing STARE @ BINARY BLOB ? STARE THIS PART @ BINARY L   BLOB Thanks FRAK! 7.27.2012   Defcon  20  
  • 30. Demos •  Packer/Repacker for Cisco IOS, HP-RFU •  Automagic Binary Analysis •  IDA-Pro Integration •  Entropy-related Analysis •  Automated IOS/RFU Rootkit Injection 7.27.2012   Defcon  20  
  • 31. FRAK Konsole 7.27.2012   Defcon  20  
  • 32. FRAK is still WIP. For Early Access Contact Frak-request@redballoonsecurity.com 7.27.2012   Defcon  20  
  • 33. 7.27.2012   Defcon  20