SlideShare a Scribd company logo
1 of 69
Allepey, Kerala [ India ]
Hacking your Cable TV Network
TV & Media
Today, we will Hack…
• Analogue Cable TV
• DVB-C
• DVB-T [Satellite TV]
• IPTV Intro
Rahul Sasi
• Security Engineer
• Speaker.
HITB [KL], BlackHat [US Arsenal], Cocon (2011, 2012, 2013), Nullcon (2011,
2012, 2013), HITB (AMS 2012), BlackHat (EU 2012), EKoparty (Argentina),
CanSecwest(Canada 2013), HITcon(Taiwan)
• One of the Admin members Garage4Hackers.com
• https://twitter.com/fb1h2s
Garage4Hackers.com
Agenda
• Analog Cable Networks.
 Architecture
 Introduction and Attacks
• Digital Cable Networks .
 Migration form Analog to Digital
 Digital Network architecture
 Application and Network layer bugs
Analog Cable Network The Basics
• FM Modulation And
Broadcasting [TV Station]
• Antenna Farm [ Cable
Operator End]
• IRD-Integrated Receiver
Decoders.
• Local cable network.
• TV
Analog Cable Network
Home TV
Local Cable TV
Operator
Decoder
Unit QAM Signal
Amplifier
Optical Fiber
Coaxial Cables
Antenna Farms
IRD Decoder
National Channel
One IRD per Channel
Modulator to QAM
QAM: Quadrature amplitude modulation
• Analog + Digital Modulation
• Modulates the amplitudes of analog waves, using AM
• Modulates the amplitudes of digital waves, using ASK
• Modulated waves are summed
• Amplified and distributed via optic fiber
Source: http://en.wikipedia.org/wiki/Quadrature_amplitude_modulation
QAM Device
The transmission channel is Unencrypted
Cable Operation
• Each channel received would be under a particular frequency.
• Cable Operators could modulate to any frequency.
• FDMA is used to sent all the different channels to users.
• The transmission medium is Radio over Fiber.
• TV channels tunes in individual frequency and decodes them to audio
and video.
Attacking Analog Network
Home TV
Local Cable TV
Operator
Decoder
Unit QAM Signal
Amplifier
Optical Fiber
Coaxial Cables
MITM
MITM:~ Local Cable Operator$
• Easy MITM: No Encryption in Analog Network
• Physical access = Free cable connection.
Or
• You can even Broadcast your own signals.
DTK: Our MITM unit Operator end:~ Devices used
• Optical
Receiver
• Optical to
Coaxial
• RF modulator
• Amplifier
• Signal Tap
Total: 80 usd
Our Garage
Local cable operator
• Fiber optic is fast and reliable but expensive.
• Doing a Man-In-Middle on Fiber optic is expensive
[atleast for us].
• Local cable admins convert optic input to co-axial.
• Coaxial cable could be easily tapped.
Optical Receiver:~
Device:~ optical to coaxial
Coaxial out
Optic IN
MITM:~ Tap and inject signals
The Process:~ For example
• BBC news would be in frequency A and Fox news on frequency
B.
• Both these frequency signals are sent over coaxial cable.
• TV knows how to decode each frequencies.
• So channel no 1 would be pre-set to display BBC [Frequency A]
and channel no 2 would be set to display “FOX NEWS ”
[Frequency B].
• As a hacker if I need to replace channels, one possibility is to
do a man in the middle attack and modulate my videos with
Star Movies frequency.
MITM demo
• Video removed
Avoiding Collision
• Let us shut down the original signal source.
• Shutting down the entire signal source will stop all the
channels.
• Signal cutter to the rescue – Block FOX news Only.
• Introduce our Video in Fox news Frequency
Demo
• Video removed visit
garage4hackers.com/blog.php?u=8
Digital TV Introduction
• In December 2011, the Lok Sabha passed Cable Television
Networks (Regulation) Amendment Bill.
• In the Act the addressable system may only transmit
encrypted signals.
• So with this Act it is mandatory to install set-top boxes on
every house for decoding the transmitted signals.
Digital TV Introduction
• Cable TV & Customers Upgrade to DVBC or IP network which
can now transmit encrypted signals.
• DVBC standard [Conditional Access] is an access control
mechanism.
• IPTV Networks are traditional TCP/IP Stack.
• Now Signals are encrypted or scrambled before sent on
wire.
• A set-top box device is needed to de-scramble the output
• STB decodes the scrambled input and produces the TV out.
STB :~ Set-Top Box
• Does QAM demodulation .
• DVB-C type set top boxes work on co-axial cable.
• IPTV set-top boxes need IPTV networks.
• IPTV boxes allows internet connectivity .
• Each STB has a unique identity either using MAC
address or using a smart card.
STB Unique Identity
• Video removed visit
garage4hackers.com/blog.php?u=8
DVB-C Set-top box
• Works on Digital Video Broadcasting standard,
the same standard is used for satellite
broadcasting.
• Works based on [64,128, 256 QAM ]
modulation, a combination of amplitude and
phase modulation.
• DVB-C is used for broadcasting Audio, Video
signals.
Source: Understanding Digital Television: An Introduction to DVB Systems with
IPTV
• IP Set-Top Boxes enable Video Services
connected through IP network.
• Protocols like http, rtsp , igmp are used in
streaming the video.
• IPTV can carry Audio, video and data over the
wire aka [ Triple play].
• Internet Access is possible using IPTV.
Digital Cable Overall
• Satellite Content
• IRD decoders
• DRM Server
• Middleware Servers
• Video on Demand Server
• Billing Server
• Triple Play Convergence
• Switch
• QAM Modulator
• Network Infrastructure
• Micro PoP
• Access Switch
• Customer Premise Equipment
• Set Top Box
 Source [ Head End ].
 Management Network or Middlewares.
 Home Network
Digital Cable Network :~
Attacking Digital Network
Home TV Set-
Top Box
Local Cable TV
Operator
Decoder
Unit
Management Network
Scrambled Signal
on Optical Fiber
Coaxial Cables
Digital
Signal
Attack Vectors
Management Network
DVB Headend
 Billing Server [ Web Application Bug ]
Attacking Set-Top boxes
 Firmware Attack [ Application Bug ]
 Protocol Attacks [Protocol Implementation Bug ]
Management Server [Middleware]
• Provides Billing and Customer Service.
• Attacks on Middleware are possible in both DVB-C and IPTV networks
Locating the Mother Program
• Network fingerprinting –Find IPTV Management service.
• Some are Internet facing !!
Bug 1:~ STB Hijack
• Application allows one operator to transfer STB to
another operator.
• This option lists all Existing operators.
• Transfer option based on an Access Key.
• The Access key implementation was flawed.
Spot the Bug
Old bug PHP < 5.3.* : Passing an array will bypass the check.
<?php
$
$apikey = "select api_key from apis where
username=.'mysql_escape($username)'";
$authenticated = strcmp($apikey, $_GET['key']);
if ($authenticated == 0) {
print "Logged IN !";
} else {
print "wrong API!";
}
?>
Voila: IPTV Management Console
• Video removed visit
garage4hackers.com/blog.php?u=8
Bug 2: Cable TV Remote shutdown
• Cable TV Operators control Clients via UAKEY.
• This is accomplished via API Keys specific to the logged in
admin.
• The implementation was flawed.
• The bug allowed a remote cable operator visiting a
malicious webpage to remotely shutdown all Digital Tv
instances.
API Key Implementation
<script src=“load_secrets.js”></script>
They had some pretty cool anti-stealing code as well.
function checkUrl()
{
var url = get_current_url();
return url.match(url+'$') == 'flappybirds.com';
}
if(checkUrl())
{
var api_key = "77d11aea20ff61c6d1e23f044";alert(api_key);
populateFormFields(super_secret); // Injects this token into the hidden input fields
} else{
alert('Bad Domain !');
}
Lets do some cross-domain magic
• Attacker can load, <script src=“load_secrets.js”></script>
• But, checkAdmin() returns false.
• Attacker can bypass this using,
// From attacker.com
<script>
String.prototype.match = function()
{
return ["flappybirds.com"];
}
</script>
<script src=“http://cable-tv.com/api_keys/load_secrets.js”></script>
Demo Video: Remote
• Video removed visit
garage4hackers.com/blog.php?u=8
Remote Denial of Service
Attacking Set-Top boxes
 Firmware Attack (1) [MPEG Parsing Bugs ]
Firmware Attack (2) [ Application Bug ]
Fuzzing DVB [Mpeg 2 ] STB
• The DVB Transport stream use MPEG format.
• If we can find bugs in mpeg/DVB parsing, then we
can do remote attacks.
• Fuzz a particular PES program
Our Fuzzer.
MPEG
Fuzz
payload
DVB-C Setup box
DVB-C TS
DVB
Modulator
[muxed into
DVB TS]
To
Bug 3: STB DVB MPEG stream parsing
Segfault.
• SIGSEGV due to buffer overflow.
• Buffer over flow is due to memory overwrite
• This bug would cause the STB to restart .
The transmission channel is Encrypted
MITM in Digital Networks:
DVB Transport stream Working
• DVB in Action:
• Provide Audio : Video streams to TV (Transport Stream).
• Provide Internet Connection [IP over DVB/MPEG ].
• Can provide multiple channels in a single stream.
• Payload of a Stream = [Audio + Video + Stream Info ]
• Stream Info = Ex : Program Association Table
• Program Association Table provide:
• PID values for (TS) packets corresponding (PMT) .
• PID stands for Packet Identifier .
• PMT (Program Map Table) provide location of cells that make up
each stream.
Program Association Table:
[Transport Stream Structure]
• DVB-C uses MPEG-2 TS [ Transport Streams].
• It transmits multiple [muxed multiplexed] channels [A : V ] .
• (MPEG TS) encapsulates all data streams in cells of 188 bytes .
• 4 byte header + 184 byte payload = 188 byte MPEG TS.
• DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS.
DVB-CSA Scrambling Algorithm
• DVB-CSA is the symmetric cipher used to protect
content of MPEG2 TS.
• DVB-CSA works in 2 passes.
Taking care of Encryption problem:
MITM Fuzzing breaking Encryption:
• The Transport Scrambling [2 bits] in TS header
indicates whether the packet is encrypted or
unencrypted.
• If both bits are set to zero , there is no scrambling.
• If one of the two is not zero they payload part is
scrambled.
• Most DVB STB implementations use this filed to
detect scrambling.
This way you can introduce Unencrypted cells to
DVBC stream and make STB parse them.
Demo: Poc crashing STB:
• Video removed visit
garage4hackers.com/blog.php?u=8
STB Firmware Update
• STB boots up and authenticates to Home
gateway.
• In case of DVB multicast it uses DSM-CC for
firmware delivery.
• In case of DVB [IPTV] unicast it checks a
middleware server for updates, if any available
download it via TFTP .
• Reboots and install new firmware.
STB Bootup: Video
• Video removed visit
garage4hackers.com/blog.php?u=8
DSM-CC [Data over DVB ]
• It is basically encapsulation of data in DVB transport
stream [MPEG 2 ].
Applications:
1. STB firmware updates.
2. STB application software download.
Middleware server used to push STB
Updates
Backdoor Firmware:~ Video
• Video removed visit
garage4hackers.com/blog.php?u=8
Thank You !!
Thanks to Ahamed Nafeez
• Security Engineer
• Client side and network
security
• blog.skepticfx.com
• @skeptic_fx
Thanks to Mrityunjay Gautam
• Garage4Hackers.com
• https://twitter.com/fb1h2s
• https://www.facebook.com/loverahulsas
• www.linkedin.com/in/fb1h2s
• https://twitter.com/garage4hackers
• https://www.facebook.com/Garage4Hackers
Questions ?

More Related Content

What's hot

Florante at Laura (Saknong 12-20)
Florante at Laura   (Saknong 12-20)Florante at Laura   (Saknong 12-20)
Florante at Laura (Saknong 12-20)Kaye Abordo
 
Ang sistemang pampolitika ng mga bansa sa Silangang Asya
Ang sistemang pampolitika ng mga bansa sa Silangang AsyaAng sistemang pampolitika ng mga bansa sa Silangang Asya
Ang sistemang pampolitika ng mga bansa sa Silangang Asyaria de los santos
 
G8-Florante at Laura (Kabanata 5).pptx
G8-Florante at Laura (Kabanata 5).pptxG8-Florante at Laura (Kabanata 5).pptx
G8-Florante at Laura (Kabanata 5).pptxVanessaCMaghanoy
 
AP 7 Lesson no. 31-F: Nasyonalismo sa Vietnam
AP 7 Lesson no. 31-F: Nasyonalismo sa VietnamAP 7 Lesson no. 31-F: Nasyonalismo sa Vietnam
AP 7 Lesson no. 31-F: Nasyonalismo sa VietnamJuan Miguel Palero
 
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptx
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptxAralin 2.1 sa Filipino 8-Ikatlong Markahan.pptx
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptxMarlonJeremyToledo
 
Nasyonalismo sa asya - reports - quarter 3 - grade 8
Nasyonalismo sa asya - reports - quarter 3 - grade 8Nasyonalismo sa asya - reports - quarter 3 - grade 8
Nasyonalismo sa asya - reports - quarter 3 - grade 8ApHUB2013
 
Nelson Mandela.pptx
Nelson Mandela.pptxNelson Mandela.pptx
Nelson Mandela.pptxJoseIsip2
 
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docx
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docxAng China sa gitna ng dalawang magkatunggaling ideolohiya.docx
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docxJackeline Abinales
 
Catalogo soflight olympia 2013
Catalogo soflight    olympia 2013Catalogo soflight    olympia 2013
Catalogo soflight olympia 2013Miguel Silva
 
Mga nasyonalista sa timog at timog kanlurang asya
Mga nasyonalista sa timog at timog kanlurang asyaMga nasyonalista sa timog at timog kanlurang asya
Mga nasyonalista sa timog at timog kanlurang asyaApHUB2013
 
John locke the enlightenment thinker renz louie tejam bsed2 f
John locke the enlightenment thinker renz louie tejam bsed2 fJohn locke the enlightenment thinker renz louie tejam bsed2 f
John locke the enlightenment thinker renz louie tejam bsed2 fRenz Tejam
 
Mga Di Mabuting Epekto ng Cold War
Mga Di Mabuting Epekto ng Cold WarMga Di Mabuting Epekto ng Cold War
Mga Di Mabuting Epekto ng Cold WarAlyssaDalloran
 

What's hot (20)

Florante at Laura (Saknong 12-20)
Florante at Laura   (Saknong 12-20)Florante at Laura   (Saknong 12-20)
Florante at Laura (Saknong 12-20)
 
Ang sistemang pampolitika ng mga bansa sa Silangang Asya
Ang sistemang pampolitika ng mga bansa sa Silangang AsyaAng sistemang pampolitika ng mga bansa sa Silangang Asya
Ang sistemang pampolitika ng mga bansa sa Silangang Asya
 
G8-Florante at Laura (Kabanata 5).pptx
G8-Florante at Laura (Kabanata 5).pptxG8-Florante at Laura (Kabanata 5).pptx
G8-Florante at Laura (Kabanata 5).pptx
 
flroante at laura pagsasanay
flroante at laura pagsasanayflroante at laura pagsasanay
flroante at laura pagsasanay
 
ANG RENAISSANCE 2015
ANG RENAISSANCE 2015ANG RENAISSANCE 2015
ANG RENAISSANCE 2015
 
Amang mapagmahal
Amang mapagmahalAmang mapagmahal
Amang mapagmahal
 
AP 7 Lesson no. 31-F: Nasyonalismo sa Vietnam
AP 7 Lesson no. 31-F: Nasyonalismo sa VietnamAP 7 Lesson no. 31-F: Nasyonalismo sa Vietnam
AP 7 Lesson no. 31-F: Nasyonalismo sa Vietnam
 
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptx
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptxAralin 2.1 sa Filipino 8-Ikatlong Markahan.pptx
Aralin 2.1 sa Filipino 8-Ikatlong Markahan.pptx
 
Nasyonalismo sa asya - reports - quarter 3 - grade 8
Nasyonalismo sa asya - reports - quarter 3 - grade 8Nasyonalismo sa asya - reports - quarter 3 - grade 8
Nasyonalismo sa asya - reports - quarter 3 - grade 8
 
Nelson Mandela.pptx
Nelson Mandela.pptxNelson Mandela.pptx
Nelson Mandela.pptx
 
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docx
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docxAng China sa gitna ng dalawang magkatunggaling ideolohiya.docx
Ang China sa gitna ng dalawang magkatunggaling ideolohiya.docx
 
Catalogo soflight olympia 2013
Catalogo soflight    olympia 2013Catalogo soflight    olympia 2013
Catalogo soflight olympia 2013
 
Neokolonyalismo
NeokolonyalismoNeokolonyalismo
Neokolonyalismo
 
Rebolusyong Pampulitika
Rebolusyong PampulitikaRebolusyong Pampulitika
Rebolusyong Pampulitika
 
Mga nasyonalista sa timog at timog kanlurang asya
Mga nasyonalista sa timog at timog kanlurang asyaMga nasyonalista sa timog at timog kanlurang asya
Mga nasyonalista sa timog at timog kanlurang asya
 
Terrorism
TerrorismTerrorism
Terrorism
 
John locke the enlightenment thinker renz louie tejam bsed2 f
John locke the enlightenment thinker renz louie tejam bsed2 fJohn locke the enlightenment thinker renz louie tejam bsed2 f
John locke the enlightenment thinker renz louie tejam bsed2 f
 
Terrorism
TerrorismTerrorism
Terrorism
 
Mga Di Mabuting Epekto ng Cold War
Mga Di Mabuting Epekto ng Cold WarMga Di Mabuting Epekto ng Cold War
Mga Di Mabuting Epekto ng Cold War
 
Protestantismo
ProtestantismoProtestantismo
Protestantismo
 

Similar to Hacking cable TV Networks Like Die hard Movie

Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Anees Akhtar
 
Communication medium in modern tv
Communication medium in modern tvCommunication medium in modern tv
Communication medium in modern tvHarsh Mehta
 
15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)宥均 林
 
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingAn Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingRobin Beregovska
 
Broadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiBroadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiSSPI Brasil
 
Sloc product brief
Sloc product briefSloc product brief
Sloc product briefmilarisaumil
 
TV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismTV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismMuhammad Safeer Aabbasi
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiSSPI Brasil
 
DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2Rufael Mekuria
 

Similar to Hacking cable TV Networks Like Die hard Movie (20)

Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)
 
Communication medium in modern tv
Communication medium in modern tvCommunication medium in modern tv
Communication medium in modern tv
 
IPTV Basics
IPTV BasicsIPTV Basics
IPTV Basics
 
Ip live production
Ip live productionIp live production
Ip live production
 
15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)
 
digital tv DTMB
digital tv DTMBdigital tv DTMB
digital tv DTMB
 
Configuring-Cisco-CME.ppt
Configuring-Cisco-CME.pptConfiguring-Cisco-CME.ppt
Configuring-Cisco-CME.ppt
 
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingAn Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
 
Broadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiBroadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspi
 
Sloc product brief
Sloc product briefSloc product brief
Sloc product brief
 
TV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismTV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal Mechanism
 
MaxEye DVB Test and Measurement Solutions Overview
MaxEye DVB Test and Measurement Solutions OverviewMaxEye DVB Test and Measurement Solutions Overview
MaxEye DVB Test and Measurement Solutions Overview
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasi
 
Iptv presentation
Iptv presentationIptv presentation
Iptv presentation
 
DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2
 
Dth slideshare.pptx
Dth slideshare.pptxDth slideshare.pptx
Dth slideshare.pptx
 
CCNA
CCNA CCNA
CCNA
 
Zee Vee Training
Zee Vee TrainingZee Vee Training
Zee Vee Training
 
Omid Technologies Products
Omid Technologies ProductsOmid Technologies Products
Omid Technologies Products
 
Iptv
IptvIptv
Iptv
 

More from Rahul Sasi

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC TalkRahul Sasi
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Rahul Sasi
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .Rahul Sasi
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.Rahul Sasi
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiRahul Sasi
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chainsRahul Sasi
 

More from Rahul Sasi (6)

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC Talk
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasi
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chains
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

Hacking cable TV Networks Like Die hard Movie

  • 2. Hacking your Cable TV Network
  • 4. Today, we will Hack… • Analogue Cable TV • DVB-C • DVB-T [Satellite TV] • IPTV Intro
  • 5. Rahul Sasi • Security Engineer • Speaker. HITB [KL], BlackHat [US Arsenal], Cocon (2011, 2012, 2013), Nullcon (2011, 2012, 2013), HITB (AMS 2012), BlackHat (EU 2012), EKoparty (Argentina), CanSecwest(Canada 2013), HITcon(Taiwan) • One of the Admin members Garage4Hackers.com • https://twitter.com/fb1h2s
  • 7. Agenda • Analog Cable Networks.  Architecture  Introduction and Attacks • Digital Cable Networks .  Migration form Analog to Digital  Digital Network architecture  Application and Network layer bugs
  • 8. Analog Cable Network The Basics • FM Modulation And Broadcasting [TV Station] • Antenna Farm [ Cable Operator End] • IRD-Integrated Receiver Decoders. • Local cable network. • TV
  • 9. Analog Cable Network Home TV Local Cable TV Operator Decoder Unit QAM Signal Amplifier Optical Fiber Coaxial Cables
  • 12. One IRD per Channel
  • 14.
  • 15. QAM: Quadrature amplitude modulation • Analog + Digital Modulation • Modulates the amplitudes of analog waves, using AM • Modulates the amplitudes of digital waves, using ASK • Modulated waves are summed • Amplified and distributed via optic fiber Source: http://en.wikipedia.org/wiki/Quadrature_amplitude_modulation
  • 17. The transmission channel is Unencrypted
  • 18. Cable Operation • Each channel received would be under a particular frequency. • Cable Operators could modulate to any frequency. • FDMA is used to sent all the different channels to users. • The transmission medium is Radio over Fiber. • TV channels tunes in individual frequency and decodes them to audio and video.
  • 19. Attacking Analog Network Home TV Local Cable TV Operator Decoder Unit QAM Signal Amplifier Optical Fiber Coaxial Cables MITM
  • 20. MITM:~ Local Cable Operator$ • Easy MITM: No Encryption in Analog Network • Physical access = Free cable connection. Or • You can even Broadcast your own signals.
  • 21. DTK: Our MITM unit Operator end:~ Devices used • Optical Receiver • Optical to Coaxial • RF modulator • Amplifier • Signal Tap Total: 80 usd
  • 23. Local cable operator • Fiber optic is fast and reliable but expensive. • Doing a Man-In-Middle on Fiber optic is expensive [atleast for us]. • Local cable admins convert optic input to co-axial. • Coaxial cable could be easily tapped. Optical Receiver:~
  • 24. Device:~ optical to coaxial Coaxial out Optic IN
  • 25. MITM:~ Tap and inject signals
  • 26. The Process:~ For example • BBC news would be in frequency A and Fox news on frequency B. • Both these frequency signals are sent over coaxial cable. • TV knows how to decode each frequencies. • So channel no 1 would be pre-set to display BBC [Frequency A] and channel no 2 would be set to display “FOX NEWS ” [Frequency B]. • As a hacker if I need to replace channels, one possibility is to do a man in the middle attack and modulate my videos with Star Movies frequency.
  • 28. Avoiding Collision • Let us shut down the original signal source. • Shutting down the entire signal source will stop all the channels. • Signal cutter to the rescue – Block FOX news Only. • Introduce our Video in Fox news Frequency
  • 29. Demo • Video removed visit garage4hackers.com/blog.php?u=8
  • 30. Digital TV Introduction • In December 2011, the Lok Sabha passed Cable Television Networks (Regulation) Amendment Bill. • In the Act the addressable system may only transmit encrypted signals. • So with this Act it is mandatory to install set-top boxes on every house for decoding the transmitted signals.
  • 31. Digital TV Introduction • Cable TV & Customers Upgrade to DVBC or IP network which can now transmit encrypted signals. • DVBC standard [Conditional Access] is an access control mechanism. • IPTV Networks are traditional TCP/IP Stack. • Now Signals are encrypted or scrambled before sent on wire. • A set-top box device is needed to de-scramble the output • STB decodes the scrambled input and produces the TV out.
  • 32. STB :~ Set-Top Box • Does QAM demodulation . • DVB-C type set top boxes work on co-axial cable. • IPTV set-top boxes need IPTV networks. • IPTV boxes allows internet connectivity . • Each STB has a unique identity either using MAC address or using a smart card.
  • 33. STB Unique Identity • Video removed visit garage4hackers.com/blog.php?u=8
  • 34. DVB-C Set-top box • Works on Digital Video Broadcasting standard, the same standard is used for satellite broadcasting. • Works based on [64,128, 256 QAM ] modulation, a combination of amplitude and phase modulation. • DVB-C is used for broadcasting Audio, Video signals. Source: Understanding Digital Television: An Introduction to DVB Systems with
  • 35. IPTV • IP Set-Top Boxes enable Video Services connected through IP network. • Protocols like http, rtsp , igmp are used in streaming the video. • IPTV can carry Audio, video and data over the wire aka [ Triple play]. • Internet Access is possible using IPTV.
  • 36. Digital Cable Overall • Satellite Content • IRD decoders • DRM Server • Middleware Servers • Video on Demand Server • Billing Server • Triple Play Convergence • Switch • QAM Modulator • Network Infrastructure • Micro PoP • Access Switch • Customer Premise Equipment • Set Top Box  Source [ Head End ].  Management Network or Middlewares.  Home Network
  • 38. Attacking Digital Network Home TV Set- Top Box Local Cable TV Operator Decoder Unit Management Network Scrambled Signal on Optical Fiber Coaxial Cables Digital Signal
  • 39. Attack Vectors Management Network DVB Headend  Billing Server [ Web Application Bug ] Attacking Set-Top boxes  Firmware Attack [ Application Bug ]  Protocol Attacks [Protocol Implementation Bug ]
  • 40. Management Server [Middleware] • Provides Billing and Customer Service. • Attacks on Middleware are possible in both DVB-C and IPTV networks Locating the Mother Program • Network fingerprinting –Find IPTV Management service. • Some are Internet facing !!
  • 41. Bug 1:~ STB Hijack • Application allows one operator to transfer STB to another operator. • This option lists all Existing operators. • Transfer option based on an Access Key. • The Access key implementation was flawed.
  • 42. Spot the Bug Old bug PHP < 5.3.* : Passing an array will bypass the check. <?php $ $apikey = "select api_key from apis where username=.'mysql_escape($username)'"; $authenticated = strcmp($apikey, $_GET['key']); if ($authenticated == 0) { print "Logged IN !"; } else { print "wrong API!"; } ?>
  • 43. Voila: IPTV Management Console • Video removed visit garage4hackers.com/blog.php?u=8
  • 44. Bug 2: Cable TV Remote shutdown • Cable TV Operators control Clients via UAKEY. • This is accomplished via API Keys specific to the logged in admin. • The implementation was flawed. • The bug allowed a remote cable operator visiting a malicious webpage to remotely shutdown all Digital Tv instances.
  • 45. API Key Implementation <script src=“load_secrets.js”></script> They had some pretty cool anti-stealing code as well. function checkUrl() { var url = get_current_url(); return url.match(url+'$') == 'flappybirds.com'; } if(checkUrl()) { var api_key = "77d11aea20ff61c6d1e23f044";alert(api_key); populateFormFields(super_secret); // Injects this token into the hidden input fields } else{ alert('Bad Domain !'); }
  • 46. Lets do some cross-domain magic • Attacker can load, <script src=“load_secrets.js”></script> • But, checkAdmin() returns false. • Attacker can bypass this using, // From attacker.com <script> String.prototype.match = function() { return ["flappybirds.com"]; } </script> <script src=“http://cable-tv.com/api_keys/load_secrets.js”></script>
  • 47. Demo Video: Remote • Video removed visit garage4hackers.com/blog.php?u=8
  • 48. Remote Denial of Service
  • 49. Attacking Set-Top boxes  Firmware Attack (1) [MPEG Parsing Bugs ] Firmware Attack (2) [ Application Bug ]
  • 50. Fuzzing DVB [Mpeg 2 ] STB • The DVB Transport stream use MPEG format. • If we can find bugs in mpeg/DVB parsing, then we can do remote attacks. • Fuzz a particular PES program
  • 51. Our Fuzzer. MPEG Fuzz payload DVB-C Setup box DVB-C TS DVB Modulator [muxed into DVB TS] To
  • 52. Bug 3: STB DVB MPEG stream parsing Segfault. • SIGSEGV due to buffer overflow. • Buffer over flow is due to memory overwrite • This bug would cause the STB to restart .
  • 53. The transmission channel is Encrypted MITM in Digital Networks:
  • 54. DVB Transport stream Working • DVB in Action: • Provide Audio : Video streams to TV (Transport Stream). • Provide Internet Connection [IP over DVB/MPEG ]. • Can provide multiple channels in a single stream. • Payload of a Stream = [Audio + Video + Stream Info ] • Stream Info = Ex : Program Association Table • Program Association Table provide: • PID values for (TS) packets corresponding (PMT) . • PID stands for Packet Identifier . • PMT (Program Map Table) provide location of cells that make up each stream.
  • 56. [Transport Stream Structure] • DVB-C uses MPEG-2 TS [ Transport Streams]. • It transmits multiple [muxed multiplexed] channels [A : V ] . • (MPEG TS) encapsulates all data streams in cells of 188 bytes . • 4 byte header + 184 byte payload = 188 byte MPEG TS. • DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS.
  • 57. DVB-CSA Scrambling Algorithm • DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS. • DVB-CSA works in 2 passes.
  • 58. Taking care of Encryption problem:
  • 59. MITM Fuzzing breaking Encryption: • The Transport Scrambling [2 bits] in TS header indicates whether the packet is encrypted or unencrypted. • If both bits are set to zero , there is no scrambling. • If one of the two is not zero they payload part is scrambled. • Most DVB STB implementations use this filed to detect scrambling.
  • 60. This way you can introduce Unencrypted cells to DVBC stream and make STB parse them.
  • 61. Demo: Poc crashing STB: • Video removed visit garage4hackers.com/blog.php?u=8
  • 62. STB Firmware Update • STB boots up and authenticates to Home gateway. • In case of DVB multicast it uses DSM-CC for firmware delivery. • In case of DVB [IPTV] unicast it checks a middleware server for updates, if any available download it via TFTP . • Reboots and install new firmware.
  • 63. STB Bootup: Video • Video removed visit garage4hackers.com/blog.php?u=8
  • 64. DSM-CC [Data over DVB ] • It is basically encapsulation of data in DVB transport stream [MPEG 2 ]. Applications: 1. STB firmware updates. 2. STB application software download.
  • 65. Middleware server used to push STB Updates
  • 66. Backdoor Firmware:~ Video • Video removed visit garage4hackers.com/blog.php?u=8
  • 68. Thanks to Ahamed Nafeez • Security Engineer • Client side and network security • blog.skepticfx.com • @skeptic_fx Thanks to Mrityunjay Gautam
  • 69. • Garage4Hackers.com • https://twitter.com/fb1h2s • https://www.facebook.com/loverahulsas • www.linkedin.com/in/fb1h2s • https://twitter.com/garage4hackers • https://www.facebook.com/Garage4Hackers Questions ?

Editor's Notes

  1. Video from Die Hard 4.0
  2. Television is a one- way medium unlike Internet. So if someone hack into your TV provider and stream in a Video stating than a riot has started in the nearby village/city, that can cause enough panic. We will explain both analog and digital cable networks.
  3. We will see technologies behind these networks and show how to hack into them.
  4. I am not even from the signals world, am just an application security guy. But I find it bad not knowing how my TV works and calling myself a Hacker.
  5. FM Modulation And Broadcasting [TV Station] Antenna Farm [ Cable Operator End] IRD-Integrated Receiver Decoders. Local cable network. TV
  6. Multiple antennas are necessary for cable operators to capture individual channel signals from multiple satellites. These signals are decoded using an IRD decoder units [Integrated Decoder] . The decoded signal are modulated . The modulators are connected together to sent the entire collected channels to a QAM. To distribute signals optic fiber cables are used. At a local cable distributor end the optic cable is replaced with co-axial cable. Amplifiers were introduced in each nodes to keep signals strong.
  7. The head end receives the radio signal and uses the IRD to tune and amplify the signal. Once the signal is amplified, the IRD decodes the signal. IRD Convert the RF signals to Analog signals. Here each channel is frequency modulated by the modulator. So HBO would be in a particular frequency and National channel would be in another.
  8. IRD provider by the channel companies.
  9. QAM stands for quadrature amplitude modulation, the format by which digital cable channels are encoded and transmitted via cable television providers. http://en.wikipedia.org/wiki/QAM_(television)
  10. Quadrature amplitude modulation (QAM) is both an analog and a digital modulation schem It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves, using the amplitude-shift keying (ASK) digital modulation scheme or amplitude modulation (AM) analog modulation scheme. The modulated waves are summed, and the resulting waveform is a combination of both phase-shift keying (PSK) and amplitude-shift keying (ASK) The signals are amplified and distributed via optic fiber.
  11. Each channel received would be under a particular frequency. The cable operator can modulate it to a different frequency if they want and sent it on wire from head end. Certain national channels need to go in the same frequency they came in. Now with FDMA all the many different channels are sent to the users via a fiber cable. The transmission medium is Radio over Fiber. TV channels tunes in individual frequency and decodes them to audio and video.
  12. Multiple antennas are necessary for cable operators to capture individual channel signals from multiple satellites. These signals are decoded using an IRD decoder units [Integrated Decoder] . The decoded signal are modulated . The modulators are connected together to sent the entire collected channels to a QAM. To distribute signals optic fiber cables are used. At a local cable distributor end the optic cable is replaced with co-axial cable. Amplifiers were introduced in each nodes to keep signals strong.
  13. Analog network vulnerable to MITM since no Encryption. If you have physical access to these networks then you can easily have free cable connection. Or you can even Broadcast your own signals. The following cheap devices were enough to perform a MITM on Analog networks.
  14. RF modulator : An RF modulator, takes an input signal and outputs a radio frequency-modulated signal. Amplifier : Boost the output signal. Signal Cutter: Chop down a specified frequency . Signal Tap: Can inject signal into the existing signals. Optical Receiver :Reads optical inputs. Optical to Coaxial: Converts Optical input to Coaxial output. Total: 3000 RS
  15. When doing man in the middle you need to avoid collision. It could be done by fully shutting down the original signal source . Shutting down the entire signal source will stop all the channels going offline. Or include a signal cutter, that will chop reduce the signals so that the existing NDTV frequency is reduced to something else. Introduce our custom video in the frequency of fox news and game over.
  16. Nafeez
  17. there are many dvb standards, each developed for its own intended use. the first of the dvb standards to be agreed upon by etsi and others was the dvb-s standard (1994) for satellite transmission. dvb-t is used for ter- restrial transmissions, and was commercialized around 1997. dvb-c is used in cable transmissions.
  18. DVB headend DVB-C system is the information exchange center, responsible for signals, treatment and control, complete signal input, signal processing, signal output and conditions, and programs receive management, customer management, system management, and other functions. Source: http://www.chinaotec.com/en/shownew.asp?id=14 Does signal processing, Customer management .System management.
  19. Spent 1 minute on this slide.
  20. Middleware Servers These are servers that provide the billing and customer services. Attacks on Middleware are possible in both DVB-C and IPTV networks Locating the Mother Program: Some network fingerprinting will provide details of the Web Application used to manage the IPTV service. Sometimes few of these controllers are accessible on the Internet.
  21. The cable TV local operators control panel can do stuff like shutting down access, send messages to individual clients etc by specifying the client’s UAKEY.
  22. They have a super secret JS file, which gets dynamically loaded for a given admin.
  23. Spent 1 minute on this slide.
  24. Tips: Before writing a fuzzer always check other mpeg parsing applications source code .
  25. We waited for the stb to crash and restart. So mostly stared at the TV.
  26. Finding a Bug in a media parser is to easy job.
  27. http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-smart-tv-fuzzing.pdf
  28. cable companies deliver one dvb stream to the tv. this stream contains several channels, each on its own frequency. the channels are com- bined, or “muxed” into one transport stream and delivered to the tv, which “demuxes” the signal so it can be “read” from the various channels. in addition to the audio/video streams (the payload), there are also a number of tables included in the transport stream. these tables provide the tv with information about the stream. an example is the Program association table, which lists all available programs in the transport stream. Source: http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-smart-tv-fuzzing.pdf
  29. Sample picture shows data populated using PAT info. Program Association Table (PAT): for each service in the multiplex, the PAT indicates the location (the Packet Identifier (PID) values of the Transport Stream (TS) packets) of the corresponding Program Map Table (PMT). It also gives the location of the Network Information Table (NIT). Ref: http://www.etsi.org/deliver/etsi_en/300400_300499/300468/01.03.01_60/en_300468v010301p.pdf
  30. A good tool to inspect DVB stream is Dvsnoop: http://dvbsnoop.sourceforge.net/examples/example-ts.html Image: http://www.althos.com/sample_diagrams/ag_MPEG_TS_Packet_low_res.jpg More detailed structure diagram: http://www.jdsu.com/ProductLiterature/MPEG_Poster_lowrez.pdf Each field explained: http://www.erg.abdn.ac.uk/future-net/digital-video/mpeg2-trans.html
  31. Pass 1: The plaintext of the payload is split into blocks of 64 bit length. The remainder that is smaller than 64 bit; all blocks except this remainder are then encrypted with a custom block cipher in CBC mode, using reverse block order and all zero initialization vector. Pass 2: In the second pass, a stream cipher using the first block (last block in the order used with the block cipher) as initialization vector encrypts all data again, except the first block. Note that DVB-CSA does not randomize the ciphertexts: Equal plaintexts are always mapped to the same ciphertexts Ref: https://www.cdc.informatik.tu-darmstadt.de/~jwaelde/breaking-dvbcsa.pdf
  32. The DVB-C decryption keys for the scrambling algorithm are in the STB [removable cards] or hardcoded . There are multiple papers that document ways to effectively break DVB-CSA and recover encryption key. Our aim is to inject our own streams into the network and make the end user STBs parse them. There is a better way doing it rather than breaking the key.
  33. The header starts with a well-known Synchronisation Byte (8 bits). This has the bit pattern 0x47 (0100 0111). A set of three flag bits are used to indicate how the payload should be processed. Ref: http://www.erg.abdn.ac.uk/future-net/digital-video/mpeg2-trans.html The first flag indicates a transport error. The second flag indicates the start of a payload (payload_unit_start_indicator) The third flag indicates transport priority bit. The flags are followed by a 13 bit Packet Identifier (PID). This is used to uniquely identify the stream to which the packet belongs (e.g. PES packets corresponding to an ES) generated by the multiplexer. The PID allows the receiver to differentiate the stream to which each received packet belongs. Some PID values are predefined and are used to indicate various streams of control information. A packet with an unknown PID, or one with a PID which is not required by the receiver, is silently discarded. The particular PID value of 0x1FFF is reserved to indicate that the packet is a null packet (and is to be ignored by the receiver). The two scrambling control bits are used by conditional access procedures to encrypted the payload of some TS packets. Two adaption field control bits which may take four values: 01 – no adaptation field, payload only 10 – adaptation field only, no payload 11 – adaptation field followed by payload 00 - RESERVED for future use Finally there is a half byte Continuity Counter (4 bits)
  34. Reference: http://www.etsi.org/deliver/etsi_ts/102800_102899/102824/01.02.01_60/ts_102824v010201p.pdf