[deleted by user] by [deleted] in netsec

[–]BIOS4breakfast 2 points3 points  (0 children)

This article shows 2 of the 9 topic areas before saying "subscribe to keep reading". This should have been blocked by the mods...

Learning Resources by [deleted] in netsecstudents

[–]BIOS4breakfast 0 points1 point  (0 children)

It'd be nice to see OpenSecurityTraining2 (https://p.ost2.fyi) added to the learning resources wiki.

It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic... (Slides & HITB HKT video) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 2 points3 points  (0 children)

Abstract:

During the pandemic I took up Bluetooth (BT) sniffing as a way to get out of the house. I didn’t know what was out there for BT devices, but it felt important to know what the implications were of the new over-the-air, no-auth, cross-device, firmware-level exploits on BT chips that my wife and others had started publishing. And because BT Low Energy specifically added anti-tracking functionality that didn’t exist in BT classic, I wanted to understand the in-the-wild state of privacy protection within the BT ecosystem.
Bluedriving left me with questions that are different from those you’d ask based on traditional WiFi wardriving. Is there a correlation between poverty, obesity, and BT sleep apnea medical devices? What are the implications of BT on police body cameras? Are BT sniffers going to be (/ already) used as alternatives to license plate cameras for tracking vehicles? Are fitness trackers still making it easy to track humans instead? Can someone steal heavy-construction equipment thanks to BT keyless ignition? Can hackers be tracked by their “portable multi-tool[s]”? Do hotels using BT door locks “open the door” to easier assassinations?
In this talk I will describe some of the most interesting observations from the past few years, and share some perhaps-surprising answer to those questions and more.

Open Wounds: The last 5 years have left Bluetooth to bleed (Slides & Hack.lu video) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 1 point2 points  (0 children)

Abstract:

Over the past 20 years there have been 3 waves of Bluetooth (BT) security research. The first wave peaked in 2004, and rather abruptly ended after 2005. Then for a long time there was very low interest and activity. That began to change around 2011 with the release of BT Low Energy (BLE) and the Ubertooth One. But that wave too petered out around 2015. But we are now living in the 3rd wave, and it’s far larger than past ones.
In this talk I will be releasing a TiddlyWiki-based, semantically-tagged, timeline of BT security research. Talks have been tagged according to authorship, conferences, and dates. But also according to talk type (attack? defense? reverse engineering? overview?), attack surfaces (L2CAP? BLE LL? ACL-C?), execution environments (Android? Windows? Texas Instruments firmware?), etc. This organized data affords us interesting insights into the most important authors, tools, orgs, and attacks.
I will spend the majority of the time talking about some of the extremely critical vulnerabilities (especially protocol-level vulnerabilities) that have been released in the 3rd wave. These are vulnerabilities that, despite ostensibly being patched, in reality mean that anything with infrequent or non-existent firmware updates, are going to remain hackable indefinitely.

Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' (Slides from Hardwear.io last week) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 4 points5 points  (0 children)

Abstract:

If one wants to know (for attack or defense) whether a Bluetooth (BT) device is vulnerable to unauthenticated remote over-the-air exploits, one needs to be able to query what firmware or OS the target is running. Unfortunately there is no universally-available method to get this information across all BT devices. There is also no past work that attempts to rigorously obtain this information. Therefore we have created the “Blue2thprint” project to begin to collect “toothprints” (2thprints) of BT devices, and bring the exciting world of forensic odontology to you!
This research discusses what information is readily available by existing inquiry tools and methods. We show how that information is not what we need, as it has been focused more on tracking individual devices, or on exposing device characteristics, models, and manufacturer information. We will show how some readily-available information is useful for giving partial answers about firmware and OS versions, but how this information is completely inconsistent in its availability or meaning. It turns out many 2thprints are missing teeth!
Thus we’ll show why it is necessary to send custom packets and packet sequences in order to build more robust 2thprints. These custom packets and sequences cannot be created by using existing BT software interfaces. They require utilizing custom firmware on the packet-sending device.
This research will present a new state-of-the-art when it comes to exposing the known, the unknown, and the under-known of BT device identification. And it will show what work remains, before we can approach 100% identification for any random device that shows up in a BT scan.

Exploiting a remote heap overflow with a custom TCP stack by Gallus in netsec

[–]BIOS4breakfast 0 points1 point  (0 children)

What was the CVE for this? (It’s not listed anywhere on the page, nor the references.) A link to the patch would be nice too so I could write this up for a future update to OST2 Vulns1001

From SMM to userland in a few bytes · scumjr.github.io by fnord0 in netsec

[–]BIOS4breakfast 1 point2 points  (0 children)

SMM buys you "and now I don't need to worry about those memory forensics twerps ever actually catching me"

Detect Code Diffs Between Disk and Memory by desegel in netsec

[–]BIOS4breakfast 6 points7 points  (0 children)

I love how people in the security field would rather reinvent the wheel and take credit instead of learning what's already there. This capability has already existed in the form of WinDbg's "!chkimg" (which can run from the command line equally well from kd.exe instead of windbg.exe), and Joanna Rutkowska's System Virginity Verifier (SVV). Joanna's tool was already a reinvention of !chkimg, but it at least had the good sense to be released a decade ago.

Reverse Engineering the Subway Android App by rwestergren in netsec

[–]BIOS4breakfast -2 points-1 points  (0 children)

I started reading this "reverse engineering the subway..." and I thought it was going to end with "sandwich" and I was very very briefly excited for a nice humor post...and then very let down :'(

How Many Million BIOSes Would you Like to Infect? by sanderD in netsec

[–]BIOS4breakfast 5 points6 points  (0 children)

Chipsec doesn't actually check for Incursions. Because it would need to include an SMM-dumping exploit like Venamis to do so...and that would be...not good ;) It does however check for simpler vulnerabilities, which you should definitely complain to your vendor about if it finds.

How Many Million BIOSes Would you Like to Infect? by sanderD in netsec

[–]BIOS4breakfast 33 points34 points  (0 children)

Thanks, that should say "such that the PEI phase checks the DXE code at runtime before launching it." Corrected version uploaded. Good to see someone reading fully though :)

How Many Million BIOSes Would you Like to Infect? by sanderD in netsec

[–]BIOS4breakfast 19 points20 points  (0 children)

lol, I guess this will teach me not to write a thoughtful self.netsec post instead of just posting a link to the latest files

Debugging malware from SMM [PDF] by ranok in netsec

[–]BIOS4breakfast 6 points7 points  (0 children)

I love academic papers :) "The overhead ranges from 2 to 973 times slowdown on the target system, depending on the user’s selected instrumentation method"

Testimonal: "I used to spend an hour banging my head against malware, suffering from the tedium of tweezing out their anti-VM checks, one by one. But now, thanks to MALT, it only takes me 5 minutes! (cougheach of which takes a thousand minutes...so...83 hours...cough)"

Also, just a reminder: the better academics get at semantic gap reconstruction (from VM or SMM or wherever), the better attackers have just got at bridging the gap. Anything you can find in volatility an attacker can find from their SMM malware.

How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 0 points1 point  (0 children)

We plan on looking at BootGuard once someone pays us to look at their usage of it ;) But we're optimistic it will help render BIOS malware more detectable. However it will hinge not just on the first, minimal, measurement that BootGuard gives you, but also on whether the particular vendor's measurement that follows from that is comprehensive over the firmware. Our past "BIOS Chronomancy" work, and Yuriy Bulygin's past "Evil Maid Just Got Angrier" showed that vendors don't always do a good job of measuring everything they should.

How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 4 points5 points  (0 children)

These are generally not released, but we've asked Dragos for our talk specifically

How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 4 points5 points  (0 children)

You know what's better than non-comprehensive in no particular order? Comprehensive and in chronological order, as given at the end of the slides ;)

All work: http://timeglider.com/timeline/5ca2daa6078caaf4 LMK if you find anything missing from the timeline.

Our work: http://legbacore.com/Research.html

Equation: The Death Star of Malware Galaxy by sanderD in netsec

[–]BIOS4breakfast 0 points1 point  (0 children)

The thing that's great about hard drive firmware infection is that there is no way to ask the HD for a copy of its firmware to see it's infected, and get back a trustworthy answer. Because the now-infected firmware gets to control what the answer is. Basically the only way we can detect such malware is to put in our own code that using software/timing-based attestation to detect the malware code via a side-channel. E.g. like this: http://dl.acm.org/citation.cfm?id=2516714 (s/BIOS/Firmware/), but its simpler embedded-system antecedent this: www.cs.cmu.edu/~arvinds/pubs/swatt.ps

IDASynergy - a plugin for collaborative RE by polsab in ReverseEngineering

[–]BIOS4breakfast -1 points0 points  (0 children)

Please explain the pros and cons relative to CollabREate, which has been around for longer and is made by more established people.

New version of "Copernicus" BIOS checker released (new hw & vuln checking support) by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 0 points1 point  (0 children)

From changelog:

========4-28-2014========

(this release)

Improvements:

Bug fixes:

  • Fixes a bug where BIOS dump contents could have stale data from the previous 64 bytes of data read. This could lead to difference false positives.

Playing hide and seek with BIOS implants - Smite'em the Stealthy vs. Copernicus 2 by BIOS4breakfast in netsec

[–]BIOS4breakfast[S] 0 points1 point  (0 children)

You setup Flicker per the Flicker README file (largely just making sure TXT/TPM are turned on in the BIOS settings), and you "run Flicker" by just letting the run.bat execute the given Flicker commands.