Exploiting the Obvious But Not the Trivial: Unencrypted NAND Flash Memory

  Рет қаралды 7,066

SySS Pentest TV

SySS Pentest TV

4 жыл бұрын

In this SySS (www.syss.de/) proof-of-concept video, SySS IT security expert Matthias Deeg demonstrates a rather obvious attack exploiting unencrypted NAND flash memory for gaining unauthorized root access.
Usually, exploiting unencrypted persistent storage (data at rest) in the form of hard disk or solid state drives with a popular interface like SATA is not that difficult due to readily available tools for accessing those kind of storage devices. However, when targeting raw NAND flash memory chips, for instance used in embedded devices, gaining read or write access to the data of these storage devices is sometimes more complex and not trivially done.
The challenge regarding NAND flash memory is to understand the used error correction and data format of the target platform in order to both read error-free data from and correctly write data back to the chip.
BCH (Bose-Chaudhuri-Hocquenghem) codes [1], which are a class of cyclic error-correcting codes, are a popular choice for error correction in NAND flash memory technology.
Based on the open source tool PMECC Reader and Decoder [2] by Mickaël Walter, Matthias Deeg developed the open source NAND Dump Tools [3] which can be used for decoding and encoding NAND dumps/images for different target platforms.
Thus, our NAND Dump Tools can be used in chip-off/chip-on attacks in order to extract error-free data from and write modified data to the NAND memory chip of a targeted device.
In this proof-of-concept video, such a chip-off/chip-on attack is exemplarily demonstrated against a SAMA5D4 Xplained Ultra evaluation board [4] for gaining root access to the embedded Linux operating system in an unauthorized way.
[1] BCH codes, Wikipedia, 2020
en.wikipedia.org/wiki/BCH_code
[2] PMECC Reader and Decoder, Mickaël Walter, 2018
www.mickaelwalter.fr/2018/06/...
[3] SySS NAND Dump Tools, Matthias Deeg, SySS GmbH, 2020
github.com/SySS-Research/nand...
[4] SAMA5D4 Xplained Ultra, Microchip
www.microchip.com/Development...
#hack #nand #attack

Пікірлер: 8
@diegoporras7769
@diegoporras7769 2 ай бұрын
Cool video!
@abdulkaderjaghel9055
@abdulkaderjaghel9055 3 жыл бұрын
Its very nice ....how i can decript another this nand type like as winbond ,samsung, Toshiba meaning how i can get config fils for other types
@diegoporras7769
@diegoporras7769 2 ай бұрын
How did you know the first-fourth _id_byte?
@Segphalt
@Segphalt 29 күн бұрын
It's the ID specified by the manufacturer, it can generally be found in the datasheet. There are also tables available that will show some of the more common ones. (Not often updated but really only the first 2 seem to ever really matter.)
@2000YG
@2000YG 4 жыл бұрын
how do you get the cool shell, which shows the current git branch and stuff?
@SySSPentestTV
@SySSPentestTV 4 жыл бұрын
The shell in the video is ZSH using powerline theme of Oh My Zsh (ohmyz.sh/).
@user-pk6fb6tv8y
@user-pk6fb6tv8y 11 ай бұрын
أواجه مشكله في قرأة ناند رقم 29f64g08cbaba يعطى أخطاء فى مرحلة verify عن طريق مبرمجه t56 ما الحل وشكرا
@fusca14tube
@fusca14tube 4 жыл бұрын
Very good! Amazing hack!
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 533 М.
Is Open Source More Secure?
10:07
IBM Technology
Рет қаралды 12 М.
When Steve And His Dog Don'T Give Away To Each Other 😂️
00:21
BigSchool
Рет қаралды 10 МЛН
🍕Пиццерия FNAF в реальной жизни #shorts
00:41
PyLIth v4.1: Gravitational body forces and surface loading
1:38:39
How Does Flash Memory Work? (SSD)
8:50
BLITZ
Рет қаралды 209 М.
Real Hardware Hacking for S$30 or Less - Presented by Joe FitzPatrick
45:01
Infosec In the City
Рет қаралды 15 М.
Contributing to Open Source Can Change Your Life - Here’s How to Do It
3:18
Learn Fast Make Things
Рет қаралды 1,1 МЛН
Laptop eMMC Data Recovery on a Budget - Andy's Boring Job
5:23
TheRasteri
Рет қаралды 88 М.
LPC Bus Sniffing Attack against Microsoft BitLocker in TPM-only Mode
6:49
#0 Modern Embedded Systems Programming: Getting Started
11:54
Quantum Leaps, LLC
Рет қаралды 81 М.