New release : CTI Report - Pharmaceutical and drug manufacturing 

                 Download now

Hack.lu 2016 – Day Three

Hack.lu 2016 – Day Three

Links to reports from other days:

Day 3

BtleJuice: the Bluetooth Smart Man In The Middle Framework

Damien Cauquil

Damien Cauquil started the day and managed to capture our attention despite the apparent lack of sleep (no doubt due to the early hour and more likely following the social event of the day before…).

After a review of the specifications of the BLE (Bluetooth Low Energy) protocol, mainly used by connected objects for its performance and low power consumption, he presented his "BtleJuice" framework written in Node.js and allowing the interception and manipulation of packets using this protocol.

Several prerequisites are nevertheless necessary: two separate machines as well as two BLE adapters are currently required to carry out these attack scenarios.

Several connected objects were then tested by Damien, for which vulnerabilities were found through the use of his framework.

The first demonstration consisted of passively listening to network traffic and enabled the Quicklock connected padlock to be unlocked via a smartphone and an application.

Quicklock

After analyzing the traffic, it appears that the PIN code is transmitted in clear text and that the authentication of the unlocking process is simply based on the BD (Bluetooth Device) address.

Damien then performed query replay on his connected robot wowwee MIP using his BTLEJuice framework to perform manual fuzzing, allowing him to discover and call undocumented functionalities:

Wowwee MIP

For the final demonstration, Damien performed a packet injection by spoofing the BD address of a blood glucose meter. Authentication here again relies solely on the BD address.

Appareil de mesure de taux de glucose dans le sang

Damien concluded his presentation by explaining how it would be possible to detect the use of his tool by observing the response time during read and/or write operations.

BTLEJuice's source code is open source and available on Github:

https://github.com/DigitalSecurity/btlejuice

ARM Shellcode Basics

Saumil Shah presented the basics of ARM compilation in this workshop.

Thanks to a simple setup consisting of a Raspberry Pi and a WiFi router, it was possible to connect to the lab set up by Saumil in order to compile and test various ARM exploits:

Installation atelier shellcode

Note: Saumil Shah also presented this work during the talk "2016: The Infosec Crossroads". The presentation materials can be retrieved from this address:

http://www.slideshare.net/saumilshah/hacklu-the-infosec-crossroads

FastIR Collector

Sébastien Larinier presented us during this workshop the analysis of various malicious codes such as Casper, Babar or Poweliks facilitated by the FastIR tool.

This takes the form of an executable that requires administrator rights when run in order to recover all Windows artifacts.

FastIR

The presentation will be published soon, and the tool's source code will be available on the following Github repository:

https://github.com/SekoiaLab/Fastir_Collector

Appendices

The various presentation materials will soon be available at the following address:

http://archive.hack.lu/2016/

In the meantime, here are some links to watch the different conferences: