Defcon 21 - BoutiqueKit: Playing WarGames with Expensive Rootkits and Malware

  Рет қаралды 52,582

HackersOnBoard

HackersOnBoard

10 жыл бұрын

Josh 'Monk" Thomas
August 1st--4th, 2013
Rio Hotel & Casino • Las Vegas, Nevada

Пікірлер: 57
@NedTheDread
@NedTheDread 10 жыл бұрын
Wow, that's some serious stuff right there! Fuckin awesome presentation.
@indigoanon5483
@indigoanon5483 10 жыл бұрын
1337 indeed
@Nigelxp1
@Nigelxp1 7 жыл бұрын
Eye opener, great presentation thanks :).
@Avelx
@Avelx 6 жыл бұрын
Can anyone tell me if this has been looked into by software or the GNU community?
@JonMasters
@JonMasters 7 жыл бұрын
This is fun. In the early days of YAFFS, I recall writing code to walk the OOB data to reset bad blocks during my backport efforts (ABI changes lead to incorrectly missmarking blocks bad) and thought then that this would be a great place to hide stuff. I would note that resetting OOB is totally doable to undo this - obviously not consumer friendly tho.
@sub7x226
@sub7x226 10 жыл бұрын
Greatest speaker ever.
@yoyomagic2068
@yoyomagic2068 7 жыл бұрын
That man is a god.
@jaymolly2956
@jaymolly2956 6 жыл бұрын
*bow* great presentation
@noughyou2841
@noughyou2841 10 жыл бұрын
This shit is pretty cool when you can get the gist of what they're saying at... All of this shit is fucking scary.
@Zei33
@Zei33 9 жыл бұрын
Damn that's some serious stuff.
@DweebsUnited
@DweebsUnited 8 жыл бұрын
Another cool application for this could be doing it intentionally as a dead drop. Not just for malware, but secret files as well. Mark off NAND, store secrets in it, if anyone steals your phone and tries to examine/clone it, they wont get what you hid.
@holly_hacker
@holly_hacker 8 жыл бұрын
+Eric "Ozzy" Osburn Yes, but then they find your program to accvess those files and you're fucked :p
@Cygnus0lor
@Cygnus0lor 7 жыл бұрын
as he said, it's literally not accessable because the system itself can't see it...
@DweebsUnited
@DweebsUnited 7 жыл бұрын
So don't keep the access program on the device. Also if it's "literally not accessable" then how does his malware access it? It's not paradoxical memory.
@SICKFREDO
@SICKFREDO 7 жыл бұрын
he states here he can still call into the memory address, is just the device wont recognize the bit as a good bit and wont read or write to it kzfaq.info/get/bejne/nbGFn8iI3szZpGQ.htmlm28s
@jordanhanna6884
@jordanhanna6884 9 жыл бұрын
Mister No, you've obviously never been to DefCon....
@larva5606
@larva5606 6 жыл бұрын
This talk is siiiiiiiccckkkkkkkkk!!!!111!!!1!!!!!!!
@JonMasters
@JonMasters 7 жыл бұрын
The obvious defense is to walk the OOB table and read the bad blocks manually/compare against malicious checksums, monitor rate of failure, etc.
@CGoody564
@CGoody564 5 жыл бұрын
Wouldn't you need to reverse engineer the nand and data written on it in that case? How can you read it manually if the first thing it asks is "is this block bad? Then it's not here" and refuses to acknowledge it's existence? You would need to program the nand so it doesn't do so, which seems like a fundamental change to how NAND operates as opposed to a defense in regards to how it works now. We're talking convincing an industry to relinquish control of the systems that operate their products. That's not an easy ask.
@johannesyde4408
@johannesyde4408 7 жыл бұрын
So if I was making phones and selling phones, I would send out some code that fried the camera or digitizer 1 day after warranty ended.
@MariusLuding
@MariusLuding 10 жыл бұрын
Scary stuff...anyone looked at the git yet?
@queazocotal
@queazocotal 9 жыл бұрын
Major assumption that is utterly broken. No modern phones have NAND exposed anymore. All phones today use eMMC - which is NAND internally, but you can't get at the raw blocks - it pretends to be a perfect block device. This attack only works on raw NAND, not EMMC or SD. Unless your phone is running gingerbread or below - it's not applicable.
@noname-tf7kq
@noname-tf7kq 9 жыл бұрын
He did explain that the source is based on the kernel based nand, I thought that was implying it was "universal" that way.. BTW, did anyone do an "um" count? Lost track lol
@uN1Qu3DZ
@uN1Qu3DZ 9 жыл бұрын
He used an Android 4.0.4 device from Sony, which is a "little bit" newer than Gingerbread. It is entirely possible to do this with EMMC too - the controller in EMMC is not stand-alone and the main processor talks to it. Remember the "sudden death" epidemic that plagued the Galaxy SIII and Note 2? That was due to a bug in the EMMC code that ended up frying it if a particular function was called accidentally. Some phones (maybe 20%) could be recovered via a full flash (emergency boot card to put it into Download Mode and complete firmware with PIT file, then IMEI and network repair with z3x box or similar), but most of them had the EMMC fried, and would need a replacement EMMC plus the complete flashing and software repair process to come back to life. It's entirely possible that something like this could have actually been at the root of the issue.
@AliSAhmad
@AliSAhmad 3 жыл бұрын
Holy. Shit.
@jt1122
@jt1122 6 жыл бұрын
Cool name
@lucun_
@lucun_ 10 жыл бұрын
So SSDs are pretty much useless if this gets huge..
@YumekuiNeru
@YumekuiNeru 10 жыл бұрын
they first have to get in, right?
@jordanhanna6884
@jordanhanna6884 9 жыл бұрын
YumekuiNeru Exactly, that was his reason for talking about 0-Days, and how the real magic (and fun) is after you get in (hidden persistence).
@akt67
@akt67 4 жыл бұрын
0 Day? anyone explain without flaming me...?
@nullvoid3545
@nullvoid3545 3 жыл бұрын
a bug or exploit in something that's been there since day 0 and hasn't been found yet. their relatively common and malicious hackers often log them to sell to someone later for lots of money.
@mizoamazzo5511
@mizoamazzo5511 7 жыл бұрын
UMM UMM UMM UMM UMM UMM UMM
@snooks5607
@snooks5607 6 жыл бұрын
"oh days", "oh days", "oh days". that's a zero. guy can't read his own damn slides
@Docko412
@Docko412 10 жыл бұрын
I'm actually downloading wargames as i watch this... funny
@archimedesworld3202
@archimedesworld3202 9 жыл бұрын
@BlasToise I get annoyed when people chew loudly but seriously can't you firkin compartmentalize that stuff. With all due respect it is super shallow. But I won't hold it against you some people can not filter out annoying repetition or anything else because of chemical imbalances, so in that case I would forgive you. Sorry I've heard people complain about swallowing in the middle of a quantum mechanics lecture and it was just so minor in comparison to the mind shattering reality of the subatomic world.
@user-rc9jf8ng2k
@user-rc9jf8ng2k 7 жыл бұрын
Drink some fucking water.
@jamesfewell2100
@jamesfewell2100 4 жыл бұрын
Can't stand when people say "oh" day and this dudes personality is extra corny. There isn't a single thing sexy about code. What he does is exceptional but he needs to mature on a personal level a whole lot as quickly as possible...
Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here
47:10
HackersOnBoard
Рет қаралды 636 М.
Defcon 21 - The Secret Life of SIM Cards
42:36
HackersOnBoard
Рет қаралды 694 М.
OMG🤪 #tiktok #shorts #potapova_blog
00:50
Potapova_blog
Рет қаралды 17 МЛН
Defcon 21 - Backdoors, Government Hacking and The Next Crypto Wars
43:50
DEFCON 16: Toying with Barcodes
44:26
Christiaan008
Рет қаралды 370 М.
Defcon 21 - Social Engineering: The Gentleman Thief
41:55
HackersOnBoard
Рет қаралды 370 М.
Get Rich or Die Trying - Making Money on the Web the black hat way
55:19
Jeremiah Grossman
Рет қаралды 385 М.
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 470 М.
Terminal Madness (A 1980 Documentary About Personal Computers)
25:29
George Martin
Рет қаралды 168 М.
Gizli Apple Watch Özelliği😱
0:14
Safak Novruz
Рет қаралды 3,5 МЛН
Secret Wireless charger 😱 #shorts
0:28
Mr DegrEE
Рет қаралды 1,3 МЛН
#miniphone
0:16
Miniphone
Рет қаралды 3,5 МЛН