SlideShare une entreprise Scribd logo
1  sur  88
Télécharger pour lire hors ligne
Hacking Cable Modems
The Later Years
Bernardo Rodrigues
@bernardomr
Disclaimer
 Opinions are my own, unless hacked.
 In that case, hacker's
 This is not a talk about Theft of Service
$ whoami
 Web, Forensics & Junk Hacking
 CTF Player
https://w00tsec.blogspot.com
Cable Modem – Vendors
Cable Modem: Models
Cable Modem Hacking Timeline
1997 ( … ) 2001 2003 2004 2006 ( … ) 2009 2010
Technology
DOCSIS 1.0
Technology
DOCSIS 2.0
Firmware
Book
SIGMA by
TCNiSO
Tool
BlackCat Programmer
by Isabella
Hacking The
Cable Modem
by derEngel
Firmware
Haxorware R27
by Rajkosto
Legal
DerEngel (Ryan Harris)
arrested
Talk
DEFCON 18
Hacking
DOCSIS For
Fun and
Profit
Talk
DEFCON 16
Free Anonymous
Internet Using Modified
Cable Modems
Talk
DEFCON 16
Sniffing Cable
Modems
Technology
DOCSIS 3.0
2011 2012 2013 2014 2015
Talk
NullByte Con
Hacking Cable
Modems: The
Later Years
Firmware
ForceWare v1.2
by mforce
HOPE 9
The ARRIStocrats:
Cable Modem
Lulz
Talk
Technology
DOCSIS 3.1
w00tsec
Unpacking
Firmware Images
from Cable
Modems
Blog Post
Console Cowboys
Arris Cable Modem
Backdoor - I'm a
technician, trust me
Blog Post
Infiltrate
Practical Attacks
on DOCSIS
Talk
Cable Modem Hacking Timeline
DOCSIS
 Data Over Cable Service Interface Specification
 Network Overview:
DOCSIS 3.0 Features
 Channel Bonding (Upstream and Downstream)
 IPv6 (inc. provisioning and management of CMs)
 Security (?)
 Enhanced Traffic encryption (?)
 Enhanced Provisioning Security (?)
Channel Bonding
DOCSIS: Provisioning
 Acquire and lock the downstream frequency
 Get upstream parameters
 Get an IP address
 Download modem configuration via TFTP
 Apply the configuration and enable forwarding of
packets
DOCSIS Network Overview
DOCSIS SEC
 Encryption and authentication protocol in DOCSIS
 BPI (Baseline Privacy Interface) in DOCSIS 1.0
 BPI+ in DOCSIS 1.1 and 2.0
 SEC (Security) in DOCSIS 3.0
DOCSIS SEC
 Digital certificates (VeriSign/Excentis)
 Uniquely chained to the MAC address of each
cable modem
 CMTS allowing Self-signed certificates
 Legacy test equipment
 Cable modems that do not support BPI+
DOCSIS: Provisioning
DOCSIS: Config File
 Downstream
 Upstream
 Bandwidth cap
 ACL’s
 TFTP Servers
 SNMP community
DOCSIS: Config File
DOCSIS: Config File
 DOCSIS specification:
 CMTS generates a Message Integrity Check (MIC)
 Hash: Number of parameters, including the
"shared secret"
 Incorrect MIC: CM registration fail
 DOCSIS 2.0: MD5
 DOCSIS 3.0: New MIC hash algorithm (MMH)
DOCSIS: Config File
Cable Modems
 binwalk
Cable Modems
 binwalk + capstone
Cable Modems
 Shell access
Cable Modems
 Shell access
Cable Modems
 Bad authentication
Cable Modems
 XSS, CSRF, DoS
Cable Modems
 Default Passwords
Cable Modems
 Backdoors
Cable Modems
 Backdoors in the Backdoors
Cable Modems
 Backdoors
Hacked Firmwares
 Not Certified by CableLabs
 Backdoors (legit modems too)
 Closed source (legit modems too)
 Enable factory mode (legit modems too)
 Change MAC and Serial (legit modems too)
 Certificate Upload
 Force network access (ignore unauthorized
messages)
 Floods DHCP server with packets
repeatedly until get an IP address
 Disable & Set ISP filters (ACLs at modem level)
 Specify config filename and TFTP server IP
address
 Force config file from ISP, local TFTP or
uploaded flash memory
 Disable ISP firmware upgrade
 Get & Set SNMP OID values and Factory mode
OID values
 Upload, flash and upgrade firmware
 Dual Boot
Hacked Cable Modems
Hacked Cable Modems
Reversing Cable Modems
Reversing Cable Modems
 RAM Start Address
Firmware Types
 Signed and compresed (PKCS#7 & binary)
 Compressed binary images
 RAM dump images (uncompressed & raw)
Firmware Structure
Firmware Structure
Firmware Upgrades
Firmware Upgrade
 Authenticate originator of any download
 Verify if the code has been altered
 Digitally signed (Root CA)
Firmware Downgrade
Firmware Upgrade
Phisical Protection
Phisical Protection
 0DAY?
Phisical Protection
SPI
 Serial Peripheral Interface Bus
 SCLK : Serial Clock (output from master).
 MOSI : Master Output, Slave Input (output from master).
 MISO : Master Input, Slave Output (output from slave).
 SS : Slave Select (active low, output from master).
SPI
 Identify the Model
SPI: Datasheet
SPI: Beaglebone
SPI: Beaglebone
SPI: Beaglebone
SPI: GoodFET
SPI: GoodFET
SPI: GoodFET
SPI: BlackCat USB
SPI: BlackCat USB
SPI: BlackCat USB
NAND Flash
 DumpFlash
 https://github.com/ohjeongwook/DumpFlash
Factory Mode
 Administrative functions
 Reflashing Firmware
 Dumping keys
Factory Mode
SNMP Scanning
SNMP Scanning
SNMP ACL’s
Bypassing SNMP ACL’s
 https://github.com/nccgroup/cisco-snmp-slap
Bypassing SNMP ACL’s
 https://github.com/nccgroup/cisco-snmp-slap
DOCSIS Encryption
 Use of 56-bit DES
 DOCSIS 3.0 adds support for AES
 Never seen AES used (as of 2015)
 Lack of use likely due to DOCSIS 2.0
support
DOCSIS Encryption
DOCSIS 3.1 Encryption: Worldwide
DOCSIS 3.1 Encryption: China
Problems with DOCSIS SEC
Problems with DOCSIS SEC
Problems with DOCSIS SEC
 CMTS are not picking most secure
cryptographic algorithm supported by CM
 Re-use of CBC IV in each frame
 Required by specification
 Identical packets will have identical
ciphertext
Sniffing DOCSIS
 MPEG packets like normal TV to encapsulate
data (ISO/IEC 13818-1)
 https://github.com/gmsoft-tuxicoman/pom-ng
 https://bitbucket.org/drspringfield/cabletables
 MPEG Encapsulation: MPEG packets > DOCSIS
frames > ETHERNET frames > IPv4 > TCP
Sniffing DOCSIS: Id the Victim
 Sniff ARP traffic on downstream and collect
subnets
 ICMP ping sweeps across subnets with various
packets sizes
 Perform correlation between encrypted packet
sizes and sent ICMP packet length
 Produce (MAC, IP) tuples
Sniffing DOCSIS
Sniffing DOCSIS
Sniffing DOCSIS
 ARP traffic is in the clear
 IP registration occurs prior to
encryption/auth
 Unless EAE enabled (Early Authentication
& Encryption)
Sniffing DOCSIS
Brazilian Criminals
Brazilian Criminals
Brazilian Criminals
Brazilian Criminals
Solutions: ISPs
 Firmware Upgrades
 Isolate DOCSIS network
 ACL's
 BPI+ Policy Total
 TFTP Enforce
Solutions: ISPs
 DMIC - Dynamically generates config file
passwords (Can’t reuse)
 Enforce EAE - Encrypts IP & DHCP process
 Cable Privacy Hotlist (finds cloned modems)
Solutions: Vendors
 No more backdoors
 FCC certification – Security
 Open Source?
 TPM, Smart Cards?
Insecurity: Root Causes
 Improperly configured CM/CMTS
 Security flaws in CM/CMTS OS
 Costs & Convenience
 Backwards compatibility != Security
Myths
 Perfect Clones (Theft of Service)
 "Nobody is innocent"
 "Needs physical access“
 "You need JTAG, SPI"
Conclusion
 The question remains:
 Is DOCSIS a secure & viable communications
protocol?
R.I.P TG862 SN XXXXXXXX91344
2015
IN MEMORIAM

Contenu connexe

Similaire à Hacking cable modems the later years

CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
Ravi Yasas
 
Mcse notes
Mcse notesMcse notes
Mcse notes
vrammn
 
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdfWhite_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
jaanyareddy
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
Videoguy
 

Similaire à Hacking cable modems the later years (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
How broken is TLS?
How broken is TLS?How broken is TLS?
How broken is TLS?
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Intel® RDT Hands-on Lab
Intel® RDT Hands-on LabIntel® RDT Hands-on Lab
Intel® RDT Hands-on Lab
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
Ethernet basics
Ethernet basicsEthernet basics
Ethernet basics
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdfWhite_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
White_Paper-Simulation_VIP-HDMI-ST-pdf.pdf
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 

Plus de Nullbyte Security Conference

Plus de Nullbyte Security Conference (10)

Speeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorallSpeeding up Red Team engagements with carnivorall
Speeding up Red Team engagements with carnivorall
 
Gitminer 2.0 - Advance Search on Github
Gitminer 2.0 - Advance Search on GithubGitminer 2.0 - Advance Search on Github
Gitminer 2.0 - Advance Search on Github
 
Automatizando o abuso de repositórios expostos
Automatizando o abuso de repositórios expostosAutomatizando o abuso de repositórios expostos
Automatizando o abuso de repositórios expostos
 
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Windows Internals: fuzzing, hijacking and weaponizing kernel objectsWindows Internals: fuzzing, hijacking and weaponizing kernel objects
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
 
Windows's Kindnesses - Commoner to D-K(d)OM (Direct Kernel Object Manipulation)
Windows's Kindnesses - Commoner to D-K(d)OM (Direct Kernel Object Manipulation)Windows's Kindnesses - Commoner to D-K(d)OM (Direct Kernel Object Manipulation)
Windows's Kindnesses - Commoner to D-K(d)OM (Direct Kernel Object Manipulation)
 
Is rust language really safe?
Is rust language really safe? Is rust language really safe?
Is rust language really safe?
 
Cabra Arretado Aperriando o WordPress
Cabra Arretado Aperriando o WordPressCabra Arretado Aperriando o WordPress
Cabra Arretado Aperriando o WordPress
 
Rootkits em kernel space - Redshift, um rootkit para o kernel do FreeBSD
Rootkits em kernel space - Redshift, um rootkit para o kernel do FreeBSDRootkits em kernel space - Redshift, um rootkit para o kernel do FreeBSD
Rootkits em kernel space - Redshift, um rootkit para o kernel do FreeBSD
 
How i cracked millions of “pt br” hashed passwords
How i cracked millions of “pt br” hashed passwordsHow i cracked millions of “pt br” hashed passwords
How i cracked millions of “pt br” hashed passwords
 
Evitando execução de códigos arbitrários com GRsecurity e PaX
Evitando execução de códigos arbitrários com GRsecurity e PaXEvitando execução de códigos arbitrários com GRsecurity e PaX
Evitando execução de códigos arbitrários com GRsecurity e PaX
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Hacking cable modems the later years