Device Hacking Damian Gordon.

Slides:



Advertisements
Similar presentations
Wi-Pow! A Smart Solar Wireless Charger Katrina Maranon | Erika Aggarao | Nilda Flores | Angelo Sulit BUSINESS AND PROFESSIONAL DISCOURSE – S38 Wire-free.
Advertisements

Objectives Overview Define an operating system
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
Viruses.
Unit 2 - Hardware Computer Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Explain the purpose of an operating system
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 13 1 Chapter 13: Advanced Laptops and Portable Devices IT Essentials: PC.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
PORTS, HW, HEALTH CONCERNS. PORTS AND CONNECTIONS Bluetooth Short range radio signals between Bluetooth enabled devices Normal range within 33 feet Bluetooth.
Going Wireless Presented By: Mohamed A. Farahat By: Evan H. Shu, FAIA Web Address: Topic Number:
Understand Malware LESSON Security Fundamentals.
Securing A Wireless Home Network. Simple home wired LAN.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Introducing Networks and the Internet Mrs. Wilson Rocky Point High School.
Computer Security Sample security policy Dr Alexei Vernitski.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
Understanding Essential Computer Concepts. Objectives Investigate types of computers Examine computer systems Examine input devices Examine output devices.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Chapter 1: Wireless Networking/Technology. Wireless Networking Definition: –the technologies that enable computers to communicate using standard network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Chapter 40 Internet Security.
Voice Controlled Robot by Cell Phone with Android App
Introduction to Computers
What they are and how to protect against them
Koji Nakao, Dai Arisue NICT, Japan
ETHICAL HACKING Presentation By: FATHIMA SHIMNA S3 ECE ROLL NO: 31 1.
BLUETOOTH modules…?.
Firmware threat Dhaval Chauhan MIS 534.
Section II Terms Emily Stepp.
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
RCS v7 Infection Vectors
Outline Introduction Standards Project General Idea
Components of Computer
Principles of Information Technology
Wireless Network Security
Introduction to Wireless Technology
Presented by: Jeffrey D. Bombell, American Computer Technologies
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Common Operating System Exploits
Bad Battery: Accessing Data and Injecting Malware into Android Devices
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Introduction to Computers
Staying Austin College
How Cyber Security vulnerabilities will shape the future of Healthcare Sector Globally?
Call AVG Antivirus Support | Fix Your PC
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Internet of Things Vulnerabilities
The Internet of Unsecure Things
Ransomware in Web Apps OWASP Singapore.
How to keep the bad guys out and your data safe
Wireless networking Rytis Garbauskas.
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Presentation transcript:

Device Hacking Damian Gordon

Device Hacking Although it is difficult to exploit hardware, there is a lot of interest in device hacking as it gives so much more control over devices. As the security of software becomes more robust, attackers are looking in other areas to control systems, and hardware and firmware are the new targets.

Device Hacking

USB Hacking Newer smartphones and laptops use a USB port for charging (USB-C port). The EU would like a common charger for all devices, and think USB-C is the way to go:

USB Hacking The problem is that the port can take data and instructions as well as power, therefore, if I create a fake charging station, I can steal all the data off a phone, install malware, or do anything else I want with the phone. So experts have identified 29 different types of USB attacks, and recommend never to use public chargers.

USB Hacking Ran Yahalom of Ben-Gurion University showed the following kinds of USB attacks: Installation of infections, or other malicious software, that once connected, have access and take control of your computer or phone. Microcontrollers attacks, Microcontrollers (like an Arduino) can impersonate a USB peripheral and act like a keyboard or a mouse. Once you connect, it starts injecting key presses. Electrical attacks, creating an electrical component that looks like a flash drive, but conducts a power surge attack once connected, and, fry the entire computer or phone.

USB Hacking USBdriveby KeySweeper BadUSB There are also some commercial USB hacking devices: USBdriveby KeySweeper BadUSB

USB Hacking USBdriveby: This USB stick is easily identified by the chain attached to it and contains a particularly nasty surprise inside. Once plugged into a PC, it begins to imitate your keyboard and uses keystrokes to disable firewalls, opens backdoors to allow remote control and tells network monitoring apps that everything is okay.

USB Hacking KeySweeper: Disguised as a USB wall charger, the KeySweeper hack is a very well concealed device which uses wireless connections to identify and spy on local Microsoft wireless keyboards. And, by monitoring keystrokes, KeySweeper can quickly obtain login details and transmit these back to a remote location.

USB Hacking BadUSB: A USB stick hack, BadUSB impersonates your keyboard to allow itself to reprogram firmware associated with your existing USB devices e.g. network cards can be reprogrammed to send users to sites containing malicious software which can soon infect your entire network.

Bluetooth Hacking Bluetooth is a wireless technology standard for exchanging data between fixed and mobile devices over short distances. It used short-wavelength UHF radio waves in the industrial, scientific and medical radio bands, from 2.400 to 2.485 GHz. Bluetooth is managed by the Bluetooth Special Interest Group (SIG),

Bluetooth Hacking BlueBorne is a generic term for several security vulnerabilities affecting electronic devices involving various Bluetooth implementations in Android, iOS, Linux and Windows. BlueBorne scans for devices with Bluetooth enabled and once it finds them, can gain access in about 10 seconds. Once compromised, the device expands the reach of the attack, boosting the signal for the hacker and eliminating the need for the attack source to be within Bluetooth range of potential targets.

WiFi Hacking WiFi Spoofing A spoofing attack is one where a program successfully masquerades another by falsifying credentials. So if you login to a public WiFi regularly, e.g. Starbucks, then if a hacker sets up a WiFi spot called Starbucks, your computer/phone may automatically connect. The hacker will be connected to your computer/phone.

WiFi Hacking In 2017 Google’s Project Zero security team demonstrated a flaw in a very common wireless chip by the Broadcom (used in phones by Apple, Samsung and others) that leaves millions of mobile phones and other devices vulnerable to simple hacking by way of wireless networks. One of the discovered holes was a “stack buffer overflow” hole that would allow an attacker to “execute arbitrary code on the WiFi Chip. It has been mostly fixed, but there may be others.

Medical Device Hacking One extremely worrying area is medical device hacking; where hackers target devices like insulin pumps, pacemakers and heart implants. New Zeland computer security expert Barnaby Jack showed vulnerabilities in each of these.

Barnaby Jack Born: 22nd November 1977 Died: 25th July 2013 Born in Auckland, New Zealand A New Zealand hacker, programmer and computer security expert. Demonstrated how to hack ATMs (his technique was called “Jackpotting”. He also show how to hack various medical devices In 2012 his testimony led the United States Food And Drug Administration to change regulations regarding wireless medical devices.

Medical Device Hacking Hacking insulin pumps In October 2011 Jack demonstrated the wireless hacking of insulin pumps. Interfacing with the pumps with a high- gain antenna, he obtained complete control of the pumps without any prior knowledge of their serial numbers, up to being able to cause the demonstration pump to repeatedly deliver its maximum dose of 25 units until its entire reservoir of 300 units was depleted, amounting to many times a lethal dose if delivered to a typical patient.

Medical Device Hacking Hacking pacemakers and heart implants. In 2012-2013 Jack demonstrated the wireless hacking of pacemakers and heart implants. He developed software that allowed him to remotely send an electric shock to anyone wearing a pacemaker within a 50-foot radius. He also developed software to control of heart implants.

Medical Device Hacking The risk to medical devices grows as more and more become part of the internet of things (IoT), in which physical devices are embedded with technology to make them wirelessly accessible. According to a report from the US Department of Health and Human Services' Office of the Inspector General, the US Food and Drug Administration is not doing enough to prevent medical devices being hacked (November 1, 2018).

Medical Device Hacking Medical device company Abbott announced a voluntary recall of 465,000 pacemakers in 2017 due to a possible hacking threat. The FDA said the devices contained vulnerabilities that could allow access to a patient’s device using commercially available equipment. This access could be used to modify programming commands to the implanted pacemaker, which could result in patient harm from rapid battery depletion or administration of inappropriate pacing.