Hacking Exposed 7 Network Security Secrets & Solutions

Slides:



Advertisements
Similar presentations
(Systems Analysis INTerface Board)
Advertisements

Slides created by: Professor Ian G. Harris Method of Attack, Physical Access Attacker has physical possession of the device  Many devices are small and.
LOGO Lab Supervisor – Dr. WH Lau EE3271 Design Laboratory.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Discovering Computers 2010
Department of Electrical & Computer Engineering Advisor: Michael Zink.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
1-1 Embedded Software Development Tools and Processes Hardware & Software Hardware – Host development system Software – Compilers, simulators etc. Target.
Engineering 1040: Mechanisms & Electric Circuits Fall 2011 Introduction to Embedded Systems.
Windows Tutorial 9 Maintaining Hardware and Software
S3 Computer Literacy Computer Hardware. Overview of Computer Hardware Motherboard CPU RAM Harddisk CD-ROM Floppy Disk Display Card Sound Card LAN Card.
Chapter 7Assembling Your Own Computer System  7.1Assembling the Hardware 7.1Assembling the Hardware 7.1Assembling the Hardware  7.2Installing the Operating.
COMPONENTS OF THE SYSTEM UNIT
Random access memory is a form of computer data storage. A random-access device allows stored data to be accessed directly in any random order.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
The Impact of Physical Security on Network Security
 Chasis / System cabinet  A plastic enclosure that contains most of the components of a computer (usually excluding the display, keyboard and mouse)
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
1 Chapter Overview Wireless Technologies Wireless Security.
Tutorial 11 Installing, Updating, and Configuring Software
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Ch Review1 Review Chapter Microcomputer Systems Hardware, Software, and the Operating System.
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Week #7 Objectives: Secure Windows 7 Desktop
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Smart Card Technology & Features
Hacking Hardware Ch 9.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Basic Input/Output System (BIOS). 5.1Introduction to BIOS Basic Input / Output System (BIOS) boot the computer by providing a basic set of instructions.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Computer Hardware Maintenance & Repairs Computer Hardware Maintenance & Repairs Suleiman Mohammed (mncs,mcpn) Instructor Institute of Computing & ICT,
Managing Devices Lesson 5. Objectives Objective Domain Matrix Technology SkillObjective Domain DescriptionObjective Domain Number Connecting Plug-and-Play.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Digital Literacy: Computer Basics
Lesson 2 Component Overview Core Hardware Fundamentals.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
WELCOME. Skills and Techniques - Session 2 Skills and Techniques Booting from Windows 8.1 and Windows 10 devices.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Reset Windows 10 Forgotten Local Admin Password. Just take it easy, if you’ve forgotten Windows 10 local admin password and can’t log onto your PC. Here.
Development of a Bluetooth based web camera module.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
ICT Unit 4: Network and the effects of using them
NT1110 Computer Structure and Logic Unit 8 (Module 5A) COMPUTER OPERATION AND SECURITY.
Voice Controlled Robot by Cell Phone with Android App
Wireless Technologies
Computer and Information Technology for HKCEE
Computer Fundamentals 1
The CPU is the brain of the computer
Security and Encryption
Booting Up 15-Nov-18 boot.ppt.
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Protect Your Hardware from Hacking and Theft
Hacking Hardware Some materials adapted from Sam Bowne.
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
BIOS Chapter 6.
TPM, UEFI, Trusted Boot, Secure Boot
The bios.
The Hacking Suite For Governmental Interception
Presentation transcript:

Hacking Exposed 7 Network Security Secrets & Solutions Chapter 9 Hacking Hardware

Hacking Hardware outline Physical Access: Getting In The Door Hacking Devices Reverse Engineering Hardware

Physical Access: Getting In The Door Cloning Access Cards 1. Magnetic stripe Contain three tracks of data, e.g., ID number, serial number, name, address, etc. No security measures to protect data Not clear encoding Tools A magstripe card reader/writer Magnetic-Stripe Card Explorer (software) Read read multiple cards of the same type to detect the different bits Write determine what checksum is used  recalculate a new one

Physical Access: Getting In The Door Cloning Access Cards 2. RFID Most cards access RFID on two different spectrums 135 kHz or 13.56 MHz. Many RFID cards are unprotected Recently, more RFID cards employ cryptography Hardware tools are available at Openpcd.org for the reader/writer More advanced reader/writer tools: Proxmark3 + on-board FPGA for the decoding of different RFID protocols Universal Software waves Radio Peripheral (USRP) to intercept the RFID traffic Send and receive raw signals (capture and replay) Countermeasures for Cloning Access Cards Original: Card vendor saves cost Access technology as inexpensive as possible Now: Fully cryptographic to prevent cloning, replay, etc. Private key stored on the card Challenge-response algorithm Card send private key (challenge) to reader Reader provides a valid answer (response) to card

Hacking Devices Locked Hard Disk Bypassing ATA (Advanced Technology Attachment) password security ATA security to deter the usage of a stolen laptop ATA requires users type password before bios access hard disk Common and simple trick  Hot-swap attack (Fool BIOS) Hot-swap attack steps Find a computer (capable of setting ATA password and an unlocked drive) Boot the computer with the unlocked drive Enter BIOS interface  prepare to set a BIOS password Replace the unlocked drive with the locked drive (Carefully) Set the harddisk password using BIOS interface  The drive will accept the new password Reboot  BIOS prompt you to unlock the drive bypassing the old one. The password can be cleared from the system if a new password is not desired.

Hacking Devices Locked Hard Disk Countermeasures The best defense Do not rely on ATA security to protect drives Alternatively, use full disk encryption products Bitlocker TrueCrypt SecurStar

Hacking Devices USB U3 Hack to a System Easiest ways into a system U3 system is a secondary partition USB flash drive made by SanDisk and Memorex U3 menu is executed automatically when USB stick is inserted. Hack work by taking advantage of Win auto run feature Autorun.ini in U3 partition runs U3 partition can be overwritten Attack by reading the password hashes from the local Windows password file or install a Trojan for remote access Universal_Customizer.exe write ISO containing Fgdump script into flash disk Countermeasures Disable auto run (Check Windows support for how to) Hold SHIFT key before inserting USB. Prevent auto run from launching the default program.

Hacking Devices Hack Phone by Bluetooth Bluetooth can hack phone sync, make calls, transfer data, etc. (nearly Bluetooth protocol) Steal contacts, social engineering Ubertooth, a hardware tool, for sniffing and playback of Bluetooth frames 80 Bluetooth channels in 2.4 GHz ISM band Spectrum analysis

Reverse Engineering Hardware IC Chips To unlock the information inside Mapping the device Identify Integrated Circuit (IC) chips Google IC data sheet  packaging, pin diagram, etc. Available external interfaces HDMI, USB, JTAG, etc. Identifying important pins Modern boards are multilayer (Difficult) Use multimeter (toning function) to create bus map Beep when a wire is connected

Reverse Engineering Hardware IC Chips Sniffing bus data Generally unprotected  Man-in-the-middle attack intercept, replay Encrypted information as chip to chip DRM (Digital Right Management) systems E.g., HDMI-HDCP (High-bandwidth Digital Content Protection) Use a logic analyzer to see and record signal on the bus Some provide built-in decoders for I2C, SPI, Serial

Reverse Engineering Hardware Sniffing Wireless Interface Layer 2 software attack Hack steps Identify FCC ID of the devices Useful information Radio frequencies on which the device is to operate. Internal diagrams Symbol decoding Radio frequencies + type of modulation Decode lowest level bits from wireless channel Software-Defined Radio WinRadio or USRP

Reverse Engineering Hardware Firmware Reversing A plethora of juicy information about the device Default passwords, admin ports, debug interfaces. Hex editor (Hex  ASCII) 010 editor and IDA pro Guess AES (Advanced Encryption Standard) encryption is being used EEPROM programmers Read firmware file

Reverse Engineering Hardware Firmware Reversing ICE (In Circuit Emulator) Tools An in-circuit emulator Hardware debugger JTAG (Joint Test Action Group) Testing interface for printed circuit boards (PCB) UrJTAG

Homework Ch9 (1/2) (100 points) (60 points) Hacking (a game) ROM 1.1) Learn how to hack a game ROM from this link http://www.nintendoage.com/forum/messageview.cfm?catid=22&threadid=19733 1.2) Change 2 PLAYER GAME in menu to 2 Your Name GAME, e.g., I change the 2 PLAYER GAME to 2 EKARAT GAME. Capture and paste your change. * You can download the target game rom (Super Mario Adventure (SMB1 Hack).nes) at the course webpage.

Homework Ch9 (2/2) 2) (20 points) Use your Hex editor to modify any programs you want, and tell us 2.1 What is the target program? 2.2 What is your modification? Show the captured screen of the result. 3) (20 points) Do a research. What are the difference between PlayStation4 and PlayState3 in terms of hardware aspects?