SlideShare une entreprise Scribd logo
1  sur  56
http://Garage4Hackers.com
Fuzzing USB Modems
[CanSecWest 2013]
Rahul Sasi @fb1h2s
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
Disclaimer
I don‟t own any of the images I have used in
these slides, and I don‟t know whom to give
credits for other than Google, so don‟t come
crying back to me with copyright crap .
I might have copy/pasted diagrams from other
websites and articles and I do not remember all
the sites to give credits to, so don‟t be a kid just
deal with it.
References would be there in the actual white
paper.
http://Garage4Hackers.com
Who am IRahul Sasi aka fb1h2s.
Admin Member at Team [Garage4hackers.com]
Work as a Security Researcher .
I was invited to present my researches at:
Blackhat[Europe],
Blackhat Arsenal[ Las Vegas],
HITB[Amsterdam],
HITB[Malaysia],
Nullcon [Goa 2010-2013],
NullCon [Delhi],
Ekoparty [ Argentina] ,
Cocon[2012-2013]
CanSecwest [Canada]
http://Garage4Hackers.com
What I do at work
http://Garage4Hackers.com
What I do at Work.
14%
19%
19%10%
5%
33%
At work
15% Reverse
Engineer
20% Build Tools
19% Exploit
Analysis
10% Malware
Analysis
5% Play counter
strike
http://Garage4Hackers.com
What I do [at Home ]
20%
20%
13%
19%
28%
At Home
Exploit Writing
Code for KXP
Try out Food
Watch Porn
Facebook
http://Garage4Hackers.com
Agenda
Introduction to USB Data modems.
Fuzzing USM modem dialer applications.
DOS attacks via SMS.
Phishing Attacks via SMS.
Fuzzing Device Drivers
Demo Potential Code execution .
http://Garage4Hackers.com
Why a security talk on USB
modems
80 million devices in 2010 [It should be more
now]
http://www.efytimes.com/e1/fullnews.asp?edid=4765
0
Is security risk all about the market share of the
device.
Yes, USB devices are so popular and is owned
by a lot of guys.
o So is this the only reason we consider this for a
security audit??
http://Garage4Hackers.com
What was my interest in
USB Data modems.
http://Garage4Hackers.com
Spot the Similarity
Tata Photon, Reliance Net connect , Idea Net
setter,
Airtel 3g, Bsnl 3G
All the above products are USB modems sold in
India by different Tele service vendors for
different prices.
And all of them are made by Huawei :D .
http://Garage4Hackers.com
USB wireless modemsA USB modem used for mobile broadband
Internet, aka dongle is widely used these days.
They use the USB port on you're computer to
make it connect to a GSM/CDMA network there
by creating a PPPoE(Point to Point protocol over
Ethernet) interface to your computer.
Default comes a dialer software either written by
the hardware manufacture customized for the
mobile supplier.
They also come bundled with device driver.
http://Garage4Hackers.com
The most important thing.
The mobile phone service providers distribute
|sell these modems.
These modems have a phone no which lies in a
particular series, so all the phone numbers end
with xxxxxx1000 to xxxxxx2000 would be running
a particular version of USB modem dialer
software so the impact is large.
This means mass exploitation since u know were
your targets are. It would be like an ms08-067
with an additional benefit of knowing where your
targets are.
http://Garage4Hackers.com
More on USB modems
These devices when plugged in to a computer detects
as a CDFS file systems and has the following
software's in it.
 Network Manager
 Device driver
 Modem dialer
These software's comes bundled as a package and need
to be installed on the host computer to connect to the
internet .
Software Included in Huawei Mobile Connect.
http://Garage4Hackers.com
Architecture USB Modem
Device
Drivers
Dialer
App
Network
Manager
http://Garage4Hackers.com
Device Driver
The device driver usually provide
interrupt handling for asynchronous
hardware interface.
They allow the host machine to
communicate to the USB interface.
A device driver package for Win
, Mac ,Linux is included with all
these devices.
http://Garage4Hackers.com
Modem Dialer
This software interacts with the modem
using AT commands, and dials a
connection to establish an internet
connection over 3g/4g.
One of the interesting features that are
added to these dialer software‟s is an
interface to read/sent SMS from your
computer directly.
This is mainly done for sending promotion
offers and advertising [Fuck u SMS
Spammers].
Network Manager: Manages the Network
http://Garage4Hackers.com
What do we Attack
Application Inputs for Remote
Attacks:
o Spear Phishing SMS campaigns.
o SMS Parsing Module.
Application Input for Local Attacks.
o Device Drivers
http://Garage4Hackers.com
Phishing SMS campaigns.
Video Here:
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
Social Engineering Attack
I Found this trick back in college 4 years back.
It still work‟s like a charm .
Finding Personal Info of any Phone number:
The security question for any sort of info on you‟r personal details is
you're last recharge value.
Call customer service , give them the no u need to track. Bluff to the
service guy u did a recharge for „n‟ amount and that it was never
reflected in you're account.
He will read out all past recharges for you :D .
Use that details to make a second call , and get access to any one‟s
personal info.
http://Garage4Hackers.com
SMS Parsing Module.
These SMS modules added to the dialers, simply
check the connected USB modem for incoming
SMS messages.
If any new message is found it‟s parsed and
moved to a local sqlite database, which is further
used to populate the SMS viewer.
Parsing take place with out user interaction.
http://Garage4Hackers.com
http://Garage4Hackers.com
Understanding SMS
When an SMS is sent, its delivered to MSC[
message service center]
SMSC will further sent the message to the
recipient.
The SMS messages is limited to 160 [7 bit chars]
to 140 [8 bit chars] or 70 [16 bit chars] .
SMS concatenation is used to send a single
large message exceeding 160 chars to be sent
over as multiple SMS and the receiver puts them
together as single SMS.
Can also deliver Binary data [OTA
Configs, Ringtones]
http://Garage4Hackers.com
Parser Working
Video here:
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
GSM 7 bit Ascii Encoding
http://Garage4Hackers.com
SMS Handling By Modem Dialer
When an SMS arrives at a modem the parser queries the
modem using AT codes and retrieve the incoming SMS.
Response would be “AT” result code and SMS [pdu] DU
(protocol description unit) | text.
[Dialer]
AT+ Command
[Modem]
Response
http://Garage4Hackers.com
The SMS PDU Format
This Is how an SMS u sent out looks like.
07911356131313F311000A9260214365870008AA5
2004800650020006400750064006500200068006F
0077007A002000740068006500200063006F006E0
066006500720065006E0063006500200067006F00
69006E0067002E002000210040002300240025005
http://Garage4Hackers.com
Understanding PDU
Format
http://Garage4Hackers.com
Understanding PDU
Format
http://Garage4Hackers.com
Making the Fuzz Payloads
SMS attacks presented by Collin Mulliner, Charlie Miller and Nico
Golde in 2010 -2011. They released a fuzzer that can fuzz mobile
phone by SMS along with test cases [PDU] format. Just steel it.
http://Garage4Hackers.com
Phase 1: My Simple Fuzz
Read PDU
Add Victim No
and SMSC
Sent to Victim
If no crash on
Victim
Do it again
http://Garage4Hackers.com
Results:
Video here:
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
Attacks
Possible to Take down n number of systems on
the network, just sent one crafted payload to
each victims and ka-boom.
http://Garage4Hackers.com
Few Interesting Bugs:
#Bug-1:
http://Garage4Hackers.com
Bug-1[ Non Exploitable ]
• If two simultaneous SMS are received on the
modem then then you can trigger a UAF[Use
after free] , and doing that is fairly simple.
• There was no user controlled registers for this
bug, or least I could not find one.
• So I marked it Non exploitable [Fun Bug]
http://Garage4Hackers.com
Bug-2 [Non-Exploitable]
App crashes handling service SMS which .
We had a partial register control, but I had to
classify it non exploitable as it was not that easy.
• More technical Details on other bugs and
analysis you can read at my Blog soon.
http://www.garage4hackers.com/blogs/8/
Lets move on …
http://Garage4Hackers.com
Now What:
http://Garage4Hackers.com
Jan-26 : Bug Reported to Huawei
http://Garage4Hackers.com
Feb 5: No response from them
Instead a Chinese New Year
Greetings
http://Garage4Hackers.com
Feb 11: PSTR sent a mail to my alternate
address asking about my Nullcon +
CansecWest talk.
http://Garage4Hackers.com
More Interactions with them and they
closed the bug thread on Feb 26
http://Garage4Hackers.com
Analysis Of the Bugs
• Currently Huawei does not have an Auto Update
, customers will have to manually download
install the patched application.
• The Dealers do not update there customers on
security patches.
• So technically almost all device out there that are
sold or are yet to be sold runs on a vulnerable
version.
http://Garage4Hackers.com
Now that we know bugs
are there,
More Fuzzing
http://Garage4Hackers.com
What to Fuzz for
WAP Push
Operator Logo|Messages
Service messages
VCARD
Concatenation of Message
Some support MMS
Even though all these are not supported in many of
the Modems, some do.
http://Garage4Hackers.com
Reverse Engineering
DialerWe can reverse the Parser modules to
understand the supporting formats and functions
to help us in better fuzzing.
I didn't spent much time reversing the modules
, as most of the things I wanted were available
from USB sniffing .
I had to spent some time understanding the
different SMS formats supported .The same thing
could be achieved by reading the manual.
http://Garage4Hackers.com
Poor Man‟s Fuzzing
http://Garage4Hackers.com
Sniffing USB Traffic:
Analyzing USB traffic to better understand the
process.
On Mac Using USB Prober using
http://adcdownload.apple.com/Developer_Tools/ious
bfamily_log_release_for_os_x_10.8/iousbfamily516.
4.1log.dmg .
On Windows using Usbsnoop pro:
http://jaist.dl.sourceforge.net/project/usbsnoop/Snoo
pyPro/SnoopyPro-0.22/SnoopyPro-0.22.zip
On Linux using Wireshark .
http://Garage4Hackers.com
USB Sniffing
Video Here:
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
AT Commands Extracted from USB
logs
AT^SYSINFO
This command is used to query the current system information, e.g.
system service state, domain, roaming or not and SIM card state.
+COPS: 0,1,"IDEA",2
This interface enables to query the network state and network
selection mode currently registered by the MS.
AT+CPMS="SM","SM","SM”
The SET command is used to set the message storage media
corresponding to the message read/write operations, and return the
current use state of the selected media.
http://Garage4Hackers.com
How messages are Read
We can set the Message storage area in modem
by
AT+CPMS="SM","SM","SM”
The AT+CMGL is used to read messages based
on a particular status.
Read/Unread messages are categorized based
on a status "received unread", "received
read", "stored unsent", "stored sent", etc.
AT+CMGL="REC UNREAD"
http://Garage4Hackers.com
Building Test Cases
Collect some SMS [PDU] messages.
Mutate them and build you're test cases.
Set PDU status to “received unread”.
Attach you‟r sim to you‟r fuzzer.
AT+CMGW=”+917738222968",145,” received
unread"<CR>fuzztest1<Ctrl+z>
Write test cases to SIM , you can write 500-1000 test
cases based on the storage capacity.
http://Garage4Hackers.com
The flow
Read
SMS
PDU
Set
Sender
and SMS
Set PDU
Unread
[write]
Attach to
Modem
http://Garage4Hackers.com
What to Fuzz
I downloaded other popular devices that were
available in our region and started fuzzing them.
And we got multiple crashes [w00t w00t] .
One was a memory corruption in parsing
Service Center Number. Even though this was
exploitable, in actual scenarios you cannot sent
an SMS message with an invalid Service Center
Number over a GSM network.
So that was dead end.
http://Garage4Hackers.com
Another Memory Corruption in
a Service Message
[Exploitable]Exploitation:
1) You're Hex Shell code has to be in SMS PDU
format appended along with the text.
2) SMS Concatenation works great to send longer
shell codes, but the stack is corrupted with junk
each time new shell code is appended.
3) You would not have to worry about ASLR/DEP as
they are not compiled with them.
http://Garage4Hackers.com
POC
We made a working POC [35 byte] shellcode, 1 SMS.
The shell code just write‟s to c:// hack.txt.
I know it sucks but getting a Metpreter running
needed more time and patience than I actually had.
Even though Metpreter was my aim, sometimes you
fail and you need to accept it  .
Probably other skilled hackers in this room could get
it done.
http://Garage4Hackers.com
Exploitation
Video Here:
http://www.garage4hackers.com/blogs/8/sms-
shell-fuzzing-usb-internet-modems-1082/
http://Garage4Hackers.com
Thanks
Mail me at: fb1h2s@gmail.com
https://twitter.com/fb1h2s
http://www.Garage4Hackers.com

Contenu connexe

Tendances

aleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesaleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesJan Seidl
 
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable FunAdventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable Funarbitrarycode
 
Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266Baoshi Zhu
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomPriyanka Aash
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllersardiri
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopDefcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopPriyanka Aash
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Intro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingIntro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingAndrew Freeborn
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar Santhosh Kumar
 
Lecture 3 - Software for the Internet of Things
Lecture 3 - Software for the Internet of ThingsLecture 3 - Software for the Internet of Things
Lecture 3 - Software for the Internet of ThingsAlexandru Radovici
 
Presentation 3 software developer in rfid
Presentation 3 software developer in rfidPresentation 3 software developer in rfid
Presentation 3 software developer in rfidMouhanad Alkhaldi
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsAleksandr Timorin
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Sergey Gordeychik
 
Home Automation by ESP8266
Home Automation by ESP8266Home Automation by ESP8266
Home Automation by ESP8266Gleb Vinnikov
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisitedThierry Zoller
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...CODE BLUE
 

Tendances (20)

Esp8266 Workshop
Esp8266 WorkshopEsp8266 Workshop
Esp8266 Workshop
 
aleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesaleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the masses
 
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable FunAdventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable Fun
 
Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllers
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopDefcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Intro to Hardware Firmware Hacking
Intro to Hardware Firmware HackingIntro to Hardware Firmware Hacking
Intro to Hardware Firmware Hacking
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
Arduino Forensics
Arduino ForensicsArduino Forensics
Arduino Forensics
 
Lecture 3 - Software for the Internet of Things
Lecture 3 - Software for the Internet of ThingsLecture 3 - Software for the Internet of Things
Lecture 3 - Software for the Internet of Things
 
Presentation 3 software developer in rfid
Presentation 3 software developer in rfidPresentation 3 software developer in rfid
Presentation 3 software developer in rfid
 
Hardware hacking 101
Hardware hacking 101Hardware hacking 101
Hardware hacking 101
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
 
Home Automation by ESP8266
Home Automation by ESP8266Home Automation by ESP8266
Home Automation by ESP8266
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
 
Buffer Overflow Attacks
Buffer Overflow AttacksBuffer Overflow Attacks
Buffer Overflow Attacks
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
 

En vedette

DEP/ASLR bypass without ROP/JIT
DEP/ASLR bypass without ROP/JITDEP/ASLR bypass without ROP/JIT
DEP/ASLR bypass without ROP/JITArtem I. Baranov
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCanSecWest
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CanSecWest
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCanSecWest
 
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CanSecWest
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CanSecWest
 
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCanSecWest
 
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CanSecWest
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
 
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CanSecWest
 
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CanSecWest
 

En vedette (14)

DEP/ASLR bypass without ROP/JIT
DEP/ASLR bypass without ROP/JITDEP/ASLR bypass without ROP/JIT
DEP/ASLR bypass without ROP/JIT
 
CanSecWest (1)
CanSecWest (1)CanSecWest (1)
CanSecWest (1)
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 final
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
 
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
 
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
 
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
 
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
 
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017
 

Similaire à Fuzzing usb modems rahu_sasi

Cable modem hacking how to(2)
Cable modem hacking how to(2)Cable modem hacking how to(2)
Cable modem hacking how to(2)NaciConSol
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkNazmul Hossain Rakib
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIEnablex io
 
Portfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer NetworkPortfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer NetworkHabib Ullah Bahar
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaDcube Tech Ventures
 
You Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedYou Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedJoe McCray
 
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOT
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOTUSER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOT
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOTFlyhigher John
 
Building your Car Hacking Labs & Car Hacking Community from Scratch
Building your Car Hacking Labs & Car Hacking Community from ScratchBuilding your Car Hacking Labs & Car Hacking Community from Scratch
Building your Car Hacking Labs & Car Hacking Community from ScratchJay Turla
 
Better watch your apps - MJ Keith
Better watch your apps - MJ KeithBetter watch your apps - MJ Keith
Better watch your apps - MJ Keithm j
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web TechnologyArun Kumar
 
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniterCodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniterWeerayut Hongsa
 
Website & Internet + Performance testing
Website & Internet + Performance testingWebsite & Internet + Performance testing
Website & Internet + Performance testingRoman Ananev
 
IRJET- Voice Recognition(AI) : Voice Assistant Robot
IRJET-  	  Voice Recognition(AI) : Voice Assistant RobotIRJET-  	  Voice Recognition(AI) : Voice Assistant Robot
IRJET- Voice Recognition(AI) : Voice Assistant RobotIRJET Journal
 
TheWriteId > components
TheWriteId > componentsTheWriteId > components
TheWriteId > componentsTim De Coninck
 
Yeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series HandoutsYeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series HandoutsDemeu Ltd.
 

Similaire à Fuzzing usb modems rahu_sasi (20)

Cable modem hacking how to(2)
Cable modem hacking how to(2)Cable modem hacking how to(2)
Cable modem hacking how to(2)
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE network
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
 
Portfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer NetworkPortfolio - PROGmaatic Developer Network
Portfolio - PROGmaatic Developer Network
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything India
 
You Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedYou Spent All That Money And Still Got Owned
You Spent All That Money And Still Got Owned
 
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOT
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOTUSER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOT
USER TIPS FOR HUAWEI E589 4G LTE POCKET WIFI HOTSPOT
 
Project Pt1
Project Pt1Project Pt1
Project Pt1
 
Building your Car Hacking Labs & Car Hacking Community from Scratch
Building your Car Hacking Labs & Car Hacking Community from ScratchBuilding your Car Hacking Labs & Car Hacking Community from Scratch
Building your Car Hacking Labs & Car Hacking Community from Scratch
 
Better watch your apps - MJ Keith
Better watch your apps - MJ KeithBetter watch your apps - MJ Keith
Better watch your apps - MJ Keith
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
 
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniterCodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
 
Website & Internet + Performance testing
Website & Internet + Performance testingWebsite & Internet + Performance testing
Website & Internet + Performance testing
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
IRJET- Voice Recognition(AI) : Voice Assistant Robot
IRJET-  	  Voice Recognition(AI) : Voice Assistant RobotIRJET-  	  Voice Recognition(AI) : Voice Assistant Robot
IRJET- Voice Recognition(AI) : Voice Assistant Robot
 
TheWriteId > components
TheWriteId > componentsTheWriteId > components
TheWriteId > components
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Yeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series HandoutsYeastar Certified Technician S-Series Handouts
Yeastar Certified Technician S-Series Handouts
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 

Plus de Rahul Sasi

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC TalkRahul Sasi
 
Hacking cable TV Networks Like Die hard Movie
Hacking cable TV Networks Like Die hard MovieHacking cable TV Networks Like Die hard Movie
Hacking cable TV Networks Like Die hard MovieRahul Sasi
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Rahul Sasi
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .Rahul Sasi
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.Rahul Sasi
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chainsRahul Sasi
 

Plus de Rahul Sasi (6)

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC Talk
 
Hacking cable TV Networks Like Die hard Movie
Hacking cable TV Networks Like Die hard MovieHacking cable TV Networks Like Die hard Movie
Hacking cable TV Networks Like Die hard Movie
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chains
 

Dernier

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Fuzzing usb modems rahu_sasi