Risk
5/14/2013
08:14 AM
50%
50%

Black Hat USA 2013 Rolls Out SIM Card, Femtocell Hacking Talks

Organizers have confirmed some early details on Briefings talks

[NOTE: Black Hat and Dark Reading are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, we'll be sharing information about the show directly from its creators here on Dark Reading.]

As July's Black Hat US in Las Vegas nears, organizers have confirmed some early details on Briefings talks, revealing brand-new breaking information about subjects as diverse as femtocell hacking, BIOS security, finding and exploiting on-chip debug interfaces, and rooting SIM cards.

First, the National Institute of Standard and Technologies (NIST) 2011 publication of 800-155 one-upped the Trusted Platform Module (TPM) PC client specification by better detailing BIOS content that should be measured to provide an adequate Static Root of Trust for Measurement (SRTM). In BIOS Security, John Butterworth, Corey Kallenberg, and Xeno Kovah of MITRE Corp. will show how a laptop (pre-NIST 800-155) SRTM can be manipulated, even with signed updates enabled. The trio will also demonstrate a 51-byte SRTM patch that can trick the TPM into believing the BIOS is pristine. Reflashing the BIOS may not restore the SRTM's integrity; an esoteric technique involving a timing side-channel may be needed for the BIOS to indicate its integrity.

Next up, crypto-infosec researcher Karsten Nohl will present Rooting SIM Cards. There are over 7 billion SIMs in active circulation, yet shockingly little is known about their security traits. It is generally believed they're unbreakable, but this is only because there's a general belief that they've never been known to be exploited. In his briefing, Nohl will shatter this pretense with confirmation that SIM cards, like any other computing system, are plagued by implementation and configuration bugs.

On-chip debug (OCD) interfaces are very useful, but not always easy to find. They can provide chip-level control of a target device, and are a primary vector to extract program code or data, modify memory contents, or affect device operation on the fly. In JTAGulator: Assisted discovery of on-chip debug interfaces, electrical engineer Joe Grand will introduce JTAGulator, a piece of open-source hardware that will help you locate OCD connections without breaking a sweat. Also expect a brief on reverse-engineering methods, the field's prior art, and in-depth info on how OCD interfaces work.

Finally - femtocells are low-power cellular base stations, often offered cheaply by mobile network operators. They use a standard Internet connection to relay CDMA phone call data to the actual cellular network, sort of like a small cell tower, and work seamlessly, so users never even know they're connected to a femtocell rather than a typical tower. Cellular network authentication isn't easy to break, but Femtocells run Linux inside. In I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell iSEC Partners' Tom Ritter and Doug DePerry will show you how to completely own a Femtocell, using it to intercept voice/SMS/data, attack the network, and clone a mobile device without physical access.

More information about Black Hat USA 2013, which has a rapidly growing set of Briefings talks, as well as a comprehensive set of 2 and 4-day trainings, is available now - early, reduced-rated registration is open until May 31st.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.