Hacking Satellite TV receivers : Are those IoT devices secure?



Similar documents
How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or

MOI DVB-S2 Streaming Box Quick Start Guide

Monitoring Conditional Access Systems

OfficeServ Application Suite

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Sistemi ad agenti Principi di programmazione di sistema

OS Installation Guide Red Hat Linux 9.0

Automated Flashing and Testing for Continuous Integration

2014 Teradici Corporation.

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Archives About ARCHOS TV+

Ignify ecommerce. Item Requirements Notes

ATV310B User Manual. V1.1

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Embedded Operating Systems in a Point of Sale Environment. White Paper

DVCrypt Conditional Access System

Avigilon Control Center Gateway User Guide

SUN COBALT RaQ 4 Server Appliance FAQ

Higth definition from A to Z.

EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3

An affordable all-digital solution for cable systems of every size

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5

Hosted SharePoint: Questions every provider should answer

Upgrade your Software

TABLE OF CONTENTS NETWORK SECURITY 2...1

Locking down a Hitachi ID Suite server

ClearOS Network, Gateway, Server Quick Start Guide

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard

Qualified Integrators and Resellers (QIR) Implementation Statement

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Coolmax CN-590 Network Storage Solution

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor

LifeSize Control Installation Guide

- Open Architecture/Interoperability Issues

HotelTV1. Client Software Update REV A0.6 D October. Web : Mail : support@vestek.com.tr Tel :

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Hardware/Software Requirements For Self-Hosting Multi Server

Performance of Host Identity Protocol on Nokia Internet Tablet

Remote Monitoring Unit SC8100. Monitoring Unit SC8100

Introduction to Mobile Access Gateway Installation

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Central Management System

Hardening Guide. Installation Guide

Digg Dekodere - HDPV-C20CXM - HD-C63CX

What is WS_FTP? How WS_FTP Works

Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance

Chapter 1 Hardware and Software Introductions of pcduino

Using SonicWALL NetExtender to Access FTP Servers

FortiWeb 5.0, Web Application Firewall Course #251

SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov

CDH installation & Application Test Report

ANTIK JUICE IPTV DEMO KIT MANUAL

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Checkmate 5.5 Self Hosted Quick Start Guide

Installing and Configuring vcenter Multi-Hypervisor Manager

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22.

SysPatrol - Server Security Monitor

AXIS Camera Station Quick Installation Guide

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Vidyo Network Configuration Guide Windows XP and Vista

NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information:

Avigilon Control Center Gateway User Guide. Version 5.4

Arrow ECS sp. z o.o. Oracle Partner Academy training environment with Oracle Virtualization. Oracle Partner HUB

CPSC 226 Lab Nine Fall 2015

MEGA Web Application Architecture Overview MEGA 2009 SP4

Buildroot for Vortex86EX (2016/04/20)

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, This document is the property of Bomgar Corporation.

Keri USB-A Connection and Configuration

Lecture 2: Computer Hardware and Ports.

Installing and Configuring vcenter Support Assistant

Raspberry Pi. Set-Top-Box

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction

Using the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network

SyncThru TM Web Admin Service Administrator Manual

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

User s Manual CONTENT. Nano NAS Server for USB storages. 1. Product Information Product Specifications System requirements..

CRYPTUS DIPLOMA IN IT SECURITY

Deep Security Vulnerability Protection Summary

Alinto Mail Server Pro

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

Lab Objectives & Turn In

EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1

Setting up a Raspberry Pi as a WiFi access point

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Enterprise Manager. Version 6.2. Installation Guide

Virtual Appliance Setup Guide

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

Aspen Cloud Server Management Console

Easy H.264 video streaming with Freescale's i.mx27 and Linux

Linux Embedded devices with PicoDebian Martin Noha

Transcription:

Hacking Satellite TV receivers : Are those IoT devices secure? Sofiane Talmat Security Consultant

Agenda Introduction Many things going wrong Thank you

Why Satellite TV receivers?

What is this all about?

TV encryption scheme ECM : Entitlement Control Message EMM : Entitlement Management Message CW : Content encryption key This is what we are looking for

Scrambling ECM CW CAS EMM CAS: Conditional Access System ECM: Entitlement Control Message EMM: Entitlement Management Message CW: Control word Scrambler Scrambled Stream

Descrambling STB CAM CAM: Conditional Access Module STB: Set Top Box Smart Card Scrambled Stream EMM CW ECM Descrambler To TV

What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes

Case study : Forever Nano Pro

Better than my graduation computer Forever Nano pro : ~150 USD Realtek RTL8201CP 10/100M STi7111 (ST40-300 @450 Mhz) 2x1 Gb DDR2 SDRAM Tuner 3.1 Services GL850G USB 2.0 Hub 1x2Gb NAND flash CORERIVER CICore 1.0

Recap STi7111 processor (St40 CPU @450Mhz) ROM=256MB RAM= 256MB 10/100M Ethernet port 2 USB 2.0 ports 1 card reader 2 module reader (CI) HDMI RCA SPDIF

Things getting easy

What could possibly go wrong?

What bring STBs to IoT?

What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes

Attack evolution STB without CAS Software emulator STB + CAS Cloned smart cards CAM Card Sharing Protocol providers plugin Internet connectivity Satellite key sharing

Card sharing concept Card Server oscam, Internet ECM/EMM CW Client STB ccam mgcamd gbox

Components and Actors Root Provider Rseller Reseller End User End User End user End user Plugins Plugins Plugins Plugins

Components and Actors Root provider : Generally server hosted at home Reseller : Generate keys and provide/install plugin End user : Plugin running on STB Cardsharing plugins installed on STBs: cccam, mgcamd, newcamd, gbox, etc.: UNKNOWN origin

What could possibly go wrong?

Vulnerabilities?

Root account without password Any other users?

Rooting the devices

SH4 compiling options Install gcc for SH4: Thanks to cross compiling tools Qemu and SH4 debian image: SH4 vm stlinux http://www.stlinux.com

Everything runs as root Main processes

No firewall

Iptables config start() { echo Starting firewall: iptables. iptables-restore < /etc/firewall.conf } save() { iptables-save > /etc/firewall.conf } stop() { echo Stopping firewall: iptables. save }

FTP config

Network Activity

What could reversing FRior service Unauthenticated Check status, channel details, configure, View and set alarms View and edit service status Manage streaming to remote IP More, more, more,. Does it contain bugs? : YES

What could possibly go wrong?

System Updates

What about system update? Main firmware update Clear text protocol from internet No digital signature verification Plugins and applications Clear text from internet No digital signature

Updated to the latest firmware

However they do fix some bugs.

Miscellaneous

Internet connectivity support Integrated web browser No support for HTTPS IPTV plugins applications Remote SQL Injection

What could possibly go wrong?

Put all this together

Overview Internal Architecture and security Total Fail! Cardsharing plugins installed on STBs: cccam/mgcamd/newcamd/gbox : UNKNOWN DEVLOPERS and Untrusted Firmware upgrade and patching: Total Fail! Main Actors : Unknown, untraceable and untrusted

Number of devices Number of cards haring subscribers : ~ 4 Millions in Algeria only / what about the world? End user : Unaware

Manufacturers promoting card sharing Free access to card sharing server for 394 days

Contacting vendor

Building a botnet Building the plugin : Some C/C++ coding skills to build the plugin Thanks to cross compiling tools Hosting the service : Either host a card sharing server Or become a reseller Throw that on internet End users/resellers: They will come for you

Demo of a Backdoor

OOPS Something went wrong.

Thank you