Bluetooth Hacking Padocon
Bluetooth Hacking Padocon
Bluetooth Hacking Padocon
1
Bluetooth Hacking
Ⅰ. Bluetooth Technology and
Vulnerabilities
2
Bluetooth Hacking
BT Technology Overview
BT Technology
- A general cable replacement for low range wireless standards (eg. IrDA)
- Usage : information exchange and networking between devices
(eg. vCard, PAN)
- NOT WiFi!
- Pairing : Mechanism for establishing long term trust between two
BT devices
- RFCOMM : Wireless serial port emulation (basically)
- AT Commands : used to control some devices across an RFCOMM
connection
- Discoverable mode : when a device wants to be found, it will respond
to other devices sending inquires
3
Bluetooth Hacking
BT Technology Overview (~cont.)
BT Profiles
- profiles govern how like devices talk to each other
4
Bluetooth Hacking
BT related Products
6
Bluetooth Hacking
Contemporary Bluetooth Attacks
7
Bluetooth Hacking
Common Bluetooth Vulnerabilities – Stupid Default
No authentication
Discoverable by default
- attacker can find users because they use discoverable mode
- DoS attack can occur for sucking down battery faster
8
Bluetooth Hacking
Common Bluetooth Vulnerabilities
– Link-Level Attacks
Cleartext data
- just like on the web
Location Based
- RF, you can track people
(http://braces.shmoo.com)
9
Bluetooth Hacking
Common Bluetooth Vulnerabilities
– Bad Implementation
Packet-o-death
- Bluesmack sends a big l2ping packet to the device in an effort
to kill it
- Protocol fuzzing in general is a dandy way to knock over BT
devices
10
Bluetooth Hacking
Hacking Tools on BT
- issuing AT commands
- discovered by Martin Herfurt
- possibility to cause extra costs
11
Bluetooth Hacking
Hacking Tools on BT (~cont.)
- forced re-keying
- tell partner to delete pairing
- connect to unauthorized channels
12
Bluetooth Hacking
Hacking Tools on BT (~cont.)
13
Bluetooth Hacking
Hacking Tools on BT (~cont.)
14
Bluetooth Hacking
Hacking Tools on BT (~cont.)
15
Bluetooth Hacking
Hacking Tools on BT (~cont.)
16
Bluetooth Hacking
Hacking Tools on BT (~cont.)
BlueBag
- GNU/Linux Gentoo OS
- v2.6 kernel + BlueZ subsystem
- Custom python-based software
- Remote controlling
- Monitoring
- Data storage
- Data gathering in crowded places and related issues
17
Bluetooth Hacking
Hacking Tools on BT (~cont.)
18
Bluetooth Hacking
Ⅱ. Bluetooth Hacking
in Korea by PADOCON
(DEMO)
19
Bluetooth Hacking
Hacking Tool Development – Bluez Attack
00:11:22:33:44:55
00:02:32:5C:3F:22
F0:00:0C:23:43:92
00:02:32:5C:3F:22
20
Bluetooth Hacking
Various Attacks on BT Devices – Headset Injection
Headset Injection
- inquiring → paging
- 낮은 수준의 보안 모드를 적용하는 Headset
- 인증되지 않은 사용자, 인가되지 않은 장치의 접근
INQUIRING
공격서버 PAGING
CONNECTION
21
Bluetooth Hacking
Various Attacks on BT Devices – Cellphone DoS
휴대폰의 보안
- 헤드셋보다 높은 수준의 보안 적용
- PIN (Personal Identification Number) : 블루투스 패스키
- 인가되지 않은 장치의 접근의 PIN 요청에 대해 취약함
22
Bluetooth Hacking
Various Attacks on BT Devices – Cellphone DoS
L2CAP 패킷구성
…
#define SIZE 1000
#define FAKE_SIZE (SIZE-3)
// (3 bytes <=> L2CAP header)
…
l2cap_cmd_hdr *cmd;
…
cmd = (l2cap_cmd_hdr *) buffer;
cmd->code = L2CAP_ECHO_REQ;
cmd->ident = 1;
cmd->len = FAKE_SIZE;
…
send(sock, buffer, SIZE, 0);
…
…
23
Bluetooth Hacking
Various Attacks on BT Devices – ESN Sniffing
…
Manufacturer: XXXXX-ABCD CO. LTD
Model: 123
Revision: M6500C-kdv-40991 1 [Jan 00 2005 16:00:00]
ESN: M6500C-kdv-40991 1 [Jan 00 2005 16:00:00]
+GCAP: +CIS707-A, CIS-856, +MS, +ES, +DS, +FCLASS
…
24
Bluetooth Hacking
Various Attacks on BT Devices – BT Wardriving
Wardriving
- 자동차를 이용하거나 걸어다니면서 취약점을 테스트하는 것
Bluetooth Wardriving 개요
- 시간 : 2006년 8월 20일 19시 47분 ~ 20시 40분
- 장소 : 대전 대형마트(XXX), 유성 도로, 음식점
- 방법 : pairing mode 블루투스 제품 스캐닝 및 DoS 가능성 테스트
25
Bluetooth Hacking
Various Attacks on BT Devices – BT Wardriving
Bluetooth Wardriving 결과
26
Bluetooth Hacking
Various Attacks on BT Devices – BT Wardriving
27
Bluetooth Hacking
Ⅲ. Some Advices
for Bluetooth Security
28
Bluetooth Hacking
Plz, No more defaults~ OTL Secure Configuration
PIN 번호의 수정
- 좀 더 나은 PIN 관리 수행 필요
Link Key에 대한 좀 더 나은 보안
- 좀 더 안전한 Link key의 보관 장소 필요
- 장치가 갑자기 Link key를 잃을 경우 경고 발생 필요
Serial Port
- fuzzing 탐지 기법 구현
OBEX
- 인증 상시 수행 필요
29
Bluetooth Hacking
감사합니다.
Contact Point :
*About presentation : drwx@padocon.org
*About included tests : binish@padocon.org
*http://hackers.padocon.org, http://padocon.org
30
Bluetooth Hacking