Risk
5/14/2013
08:14 AM
50%
50%

Black Hat USA 2013 Rolls Out SIM Card, Femtocell Hacking Talks

Organizers have confirmed some early details on Briefings talks

[NOTE: Black Hat and Dark Reading are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, we'll be sharing information about the show directly from its creators here on Dark Reading.]

As July's Black Hat US in Las Vegas nears, organizers have confirmed some early details on Briefings talks, revealing brand-new breaking information about subjects as diverse as femtocell hacking, BIOS security, finding and exploiting on-chip debug interfaces, and rooting SIM cards.

First, the National Institute of Standard and Technologies (NIST) 2011 publication of 800-155 one-upped the Trusted Platform Module (TPM) PC client specification by better detailing BIOS content that should be measured to provide an adequate Static Root of Trust for Measurement (SRTM). In BIOS Security, John Butterworth, Corey Kallenberg, and Xeno Kovah of MITRE Corp. will show how a laptop (pre-NIST 800-155) SRTM can be manipulated, even with signed updates enabled. The trio will also demonstrate a 51-byte SRTM patch that can trick the TPM into believing the BIOS is pristine. Reflashing the BIOS may not restore the SRTM's integrity; an esoteric technique involving a timing side-channel may be needed for the BIOS to indicate its integrity.

Next up, crypto-infosec researcher Karsten Nohl will present Rooting SIM Cards. There are over 7 billion SIMs in active circulation, yet shockingly little is known about their security traits. It is generally believed they're unbreakable, but this is only because there's a general belief that they've never been known to be exploited. In his briefing, Nohl will shatter this pretense with confirmation that SIM cards, like any other computing system, are plagued by implementation and configuration bugs.

On-chip debug (OCD) interfaces are very useful, but not always easy to find. They can provide chip-level control of a target device, and are a primary vector to extract program code or data, modify memory contents, or affect device operation on the fly. In JTAGulator: Assisted discovery of on-chip debug interfaces, electrical engineer Joe Grand will introduce JTAGulator, a piece of open-source hardware that will help you locate OCD connections without breaking a sweat. Also expect a brief on reverse-engineering methods, the field's prior art, and in-depth info on how OCD interfaces work.

Finally - femtocells are low-power cellular base stations, often offered cheaply by mobile network operators. They use a standard Internet connection to relay CDMA phone call data to the actual cellular network, sort of like a small cell tower, and work seamlessly, so users never even know they're connected to a femtocell rather than a typical tower. Cellular network authentication isn't easy to break, but Femtocells run Linux inside. In I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell iSEC Partners' Tom Ritter and Doug DePerry will show you how to completely own a Femtocell, using it to intercept voice/SMS/data, attack the network, and clone a mobile device without physical access.

More information about Black Hat USA 2013, which has a rapidly growing set of Briefings talks, as well as a comprehensive set of 2 and 4-day trainings, is available now - early, reduced-rated registration is open until May 31st.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.