How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or

Similar documents
Hacking Satellite TV receivers : Are those IoT devices secure?

MOI DVB-S2 Streaming Box Quick Start Guide

IOActive Security Advisory

Monitoring Conditional Access Systems

EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3

NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information:

Chapter 1 Hardware and Software Introductions of pcduino

The shortest path to cellular communications: Cellular Development Platform

DVCrypt Conditional Access System

An affordable all-digital solution for cable systems of every size

North America, Inc. AFFICHER. a true cloud digital signage system. Copyright PDC Co.,Ltd. All Rights Reserved.

Secure IP Address Management Layer 2 Network Access Control Solution

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

DIRECTV Set Top Box and Content Protection Description

Digg Dekodere - HDPV-C20CXM - HD-C63CX

TechGuard Firewall Products Specs/Parts/Competitive Analysis

SonicWALL Advantages Over WatchGuard

GigaBlue HD QUAD Plus Hybrid- HDTV Linux Receiver

EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1

OpenWRT - embedded Linux for wireless routers

Higth definition from A to Z.

OfficeServ Application Suite

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor

Setup Guide. You re minutes away from a whole new way of watching TV. Of controlling TV. Of thinking about what TV can be.

Coolmax CN-590 Network Storage Solution

2014 Teradici Corporation.

Page 1 / 14 Groupe MOBILITECHMIOSBOX Technical Specification MWP-DT1010. Technical specifications

Running Debian on Inexpensive Network Attached Storage Device

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Archives About ARCHOS TV+

Industry First X86-based Single Board Computer JaguarBoard Released

Getting Started with the Xilinx Zynq All Programmable SoC Mini-ITX Development Kit

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22.

Easy H.264 video streaming with Freescale's i.mx27 and Linux

QuickSpecs. HP Compaq t5525 Thin Client. Overview

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability

Artikel-Detailinformationen

Towards Secure Multi-network Video Services. Steve Oetegenn, President

HotelTV1. Client Software Update REV A0.6 D October. Web : Mail : support@vestek.com.tr Tel :

Output Power (without antenna) 5GHz 2.4GHz

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Sistemi ad agenti Principi di programmazione di sistema

Designed for the needs of automation, telecommunications, remote supervision, and monitoring

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Broadcasting encryption or systematic #FAIL? Phil

Automated Flashing and Testing for Continuous Integration

Using VyOS as a Firewall

Post Genie TM WebMail Server 2400/2208R

Artikel-Detailinformationen

Extended communication server: Fax Server- Administration

Advanced Network Routers. Datasheet. Model: ERLite-3, ERPoe-5. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

Network Based Intrusion Detection Using Honey pot Deception

Tools for Attacking Layer 2 Network Infrastructure

4/2/2014 Linux Dev-Boards. Linux Dev Boards. Tagung Forth Gesellschaft e.v. Maerz file:///home/cas/talk/linux-boards/html/linux-boards.

Who s Endian?

Ahsay BackupBox v1.0. Deployment Guide. Ahsay TM Online Backup - Development Department

SUN COBALT RaQ 4 Server Appliance FAQ

Digital Video Broadcasting Conditional Access Architecture

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

IP Surveillance TroubleShooting Guide Version: 0.9 Release:

ANTIK JUICE IPTV DEMO KIT MANUAL

Video Monitoring and Log System

ATV310B User Manual. V1.1

Deep Security Vulnerability Protection Summary

FortiWeb 5.0, Web Application Firewall Course #251

Enterprise Erase LAN

- Open Architecture/Interoperability Issues

Cloud Services Prevent Zero-day and Targeted Attacks

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

Lecture 2: Computer Hardware and Ports.

VIA CONNECT PRO Deployment Guide

IOVU-571N ARM-based Panel PC

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Alexander installation and configuration guide.

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

Web Tracking for You. Gregory Fleischer

PFSENSE Load Balance with Fail Over From Version Beta3

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

SPEED Cloud Computing Terminal. Model: SPEED-TY310

Cisco NAC Appliance Hardware Platforms

Secure Cloud and Remote Service Connections for AllJoyn Applications

Building A Secure Microsoft Exchange Continuity Appliance

Nighthawk AC1900 Smart WiFi Router Dual Band Gigabit

Secure Cloud and Remote Service Connections for AllJoyn Applications

User Guide 980 HDMI Protocol Analyzer

TABLE OF CONTENTS NETWORK SECURITY 2...1

SUN COBALT Qube 3 Appliance FAQ

Korenix Embedded Systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

SECURITY VULNERABILITIES OF DIGITAL VIDEO BROADCAST CHIPSETS

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Performance of Host Identity Protocol on Nokia Internet Tablet

Transcription:

Subverting satellite receivers for botnet and profit Sofiane Talmat Senior Security Consultant

Agenda The famous who am I? slide The quest for the Control Word A series of What could possibly go wrong? Questions?

Who am I? Senior security consultant at IOActive Like Breaking things Having fun with firmware and hardware Do not like: Coffee Who am I? slides

The quest for the Control Word

Scrambling ECM CW CAS EMM CAS: Conditional Access System ECM: Entitlement Control Message EMM: Entitlement Management Message CW: Control word Scrambler Scrambled Stream

Descrambling STB Scrambled Stream EMM ECM CAM Smart Card CW Descrambler CAM: Conditional Access Module STB: Set Top Box To TV

What could possibly go wrong?

What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes

Attack evolution STB without CAS Software emulator STB with CAS Cloned smart cards CAM Card Sharing Protocol providers plugin Internet connectivity Satellite key sharing

Card sharing concept Card Server Internet Client STB OSCAM, ECM/EMM CW CCCAM MGCamd GBOX

Components and Actors Card sharing plugins installed on STBs: CCCAM, MGCAMD, NEWCAMD, GBOX, etc. Root provider : Generally server hosted at home Reseller : Generate keys and provide/install plugin End user : Plugin running on STB

What could possibly go wrong?

Teardown of an STB Realtek RTL8201CP 10/100M STi7111 (ST40-300 @450 Mhz) 2x1 Gb DDR2 SDRAM Tuner 3.1 Services GL850G USB 2.0 Hub 1x2Gb NAND flash CORERIVER CICore 1.0

Better than my graduation computer STi7111 (ST40-300 @450Mhz) ROM=256MB RAM= 256MB 10/100M Ethernet port 2 USB 2.0 ports 1 card reader 2 module reader (CI) HDMI RCA SPDIF

Are they vulnerable? For all studied devices : Internal design : Fail! System update and upgrades : Fail! OS protection : Fail! Integrated software : Fail! Why? Because they are not designed to be secure

Remotely exploitable? YES : But most of them are behind NAT How bad is that? : Accessing an STB means access to internal LAN

What could possibly go wrong?

How does it work Root provider : Provides reseller with access to card sharing server Provides interface to create/manage accounts Provides plugins to support protocols Reseller : Create and manage accounts Install plugins on end user STBs

The weakest link of the chain End user: Installs plugins on his STB through USB key Takes his STB to reseller to install the plugin Download plugins from internet through the STB

What s wrong with that? Root provider : Unknown and proceeding from unknown location Reseller : Unknown Proceeding from specific countries (Legally in my country) End user: Unaware about the problem Always seeking free TV at any cost Trusts internet

What could possibly go wrong?

Overview Number of cards sharing subscribers joining IoT : ~ 4 Millions in Algeria only / what about the world? End user : Unaware

Are we getting more? Free access to card sharing server for 394 days

What if? A root provider deploys a plugin with backdoor A reseller deploys a plugin with backdoor Millions of end users installing them on their boxes PS : Plugins will be running as root

Demo

OOPS Something went wrong.

Basic steps to build the botnet Building the plugin : Some C/C++ coding skills to build the plugin Thanks to cross compiling tools Hosting the service : Either host a card sharing server Or become a reseller Throw that on internet End users/resellers: They will come for you

What will be the result? A massive botnet based on rooted Linux boxes Unaware users about what s happening on their boxes Access to users and companies LAN Yes some companies do have that in my country

Did this happen before? Reported CCAM plugin in the wild with a backdoor : Steal information from card sharing providers Send information to an IP address Who could be : Attackers stealing accounts Service providers to counter attack card sharing

Challenges to mitigate that The bad thing : You can not educate end user End users don t care, they just want free TV Not easy to put standards for piracy There is some light : Some work is being done for hardening CW interception

Black Hat Sound Bytes Millions of Satellite TV receivers joined IoT without security design Card sharing providers can take control of satellite receivers End user is not aware and doesn t understand the risk

Questions?

Thank you My wife Amina Fernando Arnaboldi Carlos Hollmann Ahmed Mahfouz Abdelkader Mraiagh Hamza Tahmi