SlideShare une entreprise Scribd logo
1  sur  53
Télécharger pour lire hors ligne
HIGH-DEF FUZZING
EXPLORING VULNERABILITIES IN
HDMI-CEC
              name = "Joshua Smith"
              job  = "Senior Security Researcher"
              job += "HP Zero Day Initiative"
              irc  = "kernelsmith"
              twit = "@kernelsmith"
          
Which of the following is false?
1. Have had 10 knee surgeries... and 5 others
2. Worked at JHUAPL... did mostly weapon sys assessments
3. Was voted "most athletic" in high school... don't judge a
book by its cover ;)
4. Previously ran assessments at the 92d Info. Warfare
Aggressor Sq. (USAF)... now 92d Info. Ops. Sq - vuln
assessments/pentests/red teams
5. Have a B.S. in Computer Engineering from RPI...
Aeronautical. Also, an MIS & some CS from JHU
6. Am an external Metasploit dev... since Feb 2013
7. Had C2 of 50 nuclear ICBMs on 9/11... interesting story
Overview
What is CEC
Specs & Implementations
Design Details
Protocol
Attack Vectors & Surface
Fuzzing CEC
Some Results
Future Work
Why?
Wanted to research an area that was relatively untouched
For me: assembly > C/C++ and RISC > CISC
Another attack vector for mobile devices via:
Mobile High-Definition Link (MHL)
Slimport
Many car stereos as well
My son is completely obsessed with cords/wires, esp
HDMI
Previous Research
HDMI – Hacking Displays Made Interesting
Andy Davis
BlackHat EU 2012
GUI Python CEC fuzzer
Somewhat simplistic
No exception monitoring
No crash data gathering
What is HDMI?
High Def Multimedia Interface
HDMI is an interface specification
Implemented as cables & connectors
Successor to DVI
What is CEC?
Consumer Electronics Control
Feature defined in the HDMI spec
Allows user to command & control up to 15 devices
Can relay commands from remotes
It's what automatically changes your TV input
Vendor-extendable
Adopted by some other technologies
That Don't Look
Like HDMI!
Still has CEC however
Slimport
Think ~ Amazon, Google, Blackberry, LG G+
Mobile High-Definition Link (MHL)
Think ~ HTC, LG Optimus+, Samsung (not G6)
Remote Control Protocol
Specs & Features
History
Ver Published Features
1.0 Dec 2002 Boring stuff
1.1 May 2004 Boring stuff
1.2 Aug 2005 Boring stuff
1.2a* Dec 2005 Fully spec'd CEC
* This is the good stuff, for vulnerabilities anyway
Specs & Features
History Continued
Ver Published Features
1.3-3c '06-'08 Whizz-bang A/V & new conns
1.4* May 2009 Features++: 4k, HEC, ARC, 3D, micro
2.0 Sep 2013 4k @60fps, Dual View, 3D++, CEC++
* Most widely deployed & available, more in a sec
Interesting 1.4 Features
ARC (Audio Return Channel)
HEC (HDMI Ethernet Connection)
100Mb/s
Enables traditional networking w/HDMI
CEC Details
1-wire bidirectional serial bus
Slow: 500 bit/s
Uses AV.link protocol to perform remote control
functions
For HDMI:
CEC wiring is mandatory
CEC functionality (software support) is optional
Notable
Implementations
Commercial industry uses various trade names
Anynet+ (Samsung), Aquos Link (Sharp), BRAVIA
Link/Sync (Sony)
SimpLink (LG), VIERA Link (Panasonic), EasyLink
(Philips), etc
Open Source
libCEC (dual commercial license)
Android HDMI-CEC
CEC Addressing
PHYSICAL
N.N.N.N where 0x0<=N<=0xF
Root display (TV) is always 0.0.0.0
Required as CEC has a notion of switching
LOGICAL
L where 0x0<=L<=0xF
Root display (TV) is always 0
Negotiated by product type
Example: first STB in system is always 3
Logical Addresses
Address Device Address Device
0 TV 8 Playback Dev 2
1 Rec. Device 1 9 Rec Device 3
2 Rec. Device 2 10 Tuner 4
3 Tuner 1 11 Playback Dev 3
4 Playback Dev 1 12 Reserved
5 Audio System 13 Reserved
6 Tuner 2 14 Free Use
7 Tuner 3 15 Unreg/Broadcast
CEC Protocol
Header Block
Source Dest EoM Ack
3 2 1 0 3 2 1 0 E A
(4bits) Logical address of source
(4bits) Logical address of dest
(2bits) Control bits (EoM & Ack)
Example: 0100:0000:0:0 = Src 4, Dest 0
Data Block
Data EoM Ack
7 6 5 4 3 2 1 0 E A
(8bits) Data (Big-endian/MSB first)
(2bits) Control bits (EoM & Ack)
Example: 01000001:1:0 = "A"
Opcode Block
Really just a data block
Opcode EoM Ack
7 6 5 4 3 2 1 0 E A
(8bits) Opcode (Big-endian/MSB first)
(2bits) Control bits (EoM & Ack)
Example: 10000010:1:0 = 0x82 (Active Source)
CEC Protocol
The long and short of it...
0F - Broadcast ping
1 F :82 :10:00
Source Dest (Bcast) Opcode (Active Src) Param (PA of src)
1 0 :64 :44:65:66:43:6F:6E:20:32:33
Source Dest (TV) Opcode (Set OSD String) Msg params
44: Display control flags, rest is ASCII string
S D :OP :41:41:41:41:41:41:41:41:41:41:41:41:41:41
Source Dest Opcode Msg params
CEC Protocol
Pinging and Polling
The "Ping"
EOM bit in header is set to 1
Used to poll for devices etc (fuzz monitor?)
Source & dest addresses will be different
Also used for allocating Logical Addresses
Source & dest addresses are the same
CEC Protocol
Additional Info
Big-endian/MSB first
Text is only printable ASCII (0x20 <= A <= 0x7E)
Messages can be directly addressed, broadcast, or either
Should ignore a message coming from address 15, unless:
Message invokes a broadcast response
Message has been sent by a CEC Switch
The message is Standby
CEC Protocol
Transmission (Flow) Control
3 mechanisms to provide reliable frame transfer
1. Frame re-transmissions (1 to 5)
2. Flow control
3. Frame validation (ignore msgs w/wrong #args)
A message is assumed correctly received when:
It has been transmitted and acknowledged
A message is assumed to have been acted upon when:
Sender does not receive Feature Abortw/in 1sec
Might be useful during fuzzing
Attack Vectors &
Thoughts
HDMI-network exploitation via CEC
HDMI Ethernet Channel (HEC)
Network connectivity to things thought un-networked
Great place to hide
Range of targetable devices
TVs, BluRays, receivers, "TV Sticks", game consoles?
Mobile phones & tablets
Devices implementing MHL/Slimport
Known popular mobile devices that implement MHL
Attack Surface
CEC commands
CEC vendor-specific commands
HEC commands
HEC functionality
Finding Vulns
Approaches
Identify "at-risk" messages & fuzz
Source Code Analysis
Hard to come by except libCEC & Android
Reverse Engineering
Can be hard to get all the firmwarez
Expect different architectures
MIPS, ARM, ARC etc
MIPS is generally most popular so far
Interesting Messages
String operations
Set OSD Name (0x47)
Preferred name for use in any OSD (menus)
Set OSD String (0x64)
Text string to the TV for display
Set Timer Program Title (0x67)
Set the name of a program associated w/a timer
Vendor-specific Messages
Because who knows what they might do
In Order to Fuzz
We Need to Answer Some Questions
How can we send arbitrary CEC commands?
How can we detect if a crash occurred?
Sending Messages
Hardware
~0 {lap,desk}tops with HDMI-CEC
Many have HDMI, none have CEC
Adapters
Pulse-Eight USB-HDMI
RainShadow HDMI-CEC to USB Bridge
Raspberry Pi
RPi & P8 adapter both use libCEC :)
Sending Messages
Software
Pulse-Eight driver is open source (libCEC)
Dual-licensed actually (GPLv2/Commercial)
Python SWIG-based bindings
Supports a handful of devices
Fuzzing CEC
libCEC
Can send CEC messages with:
Raspberry Pi + libCEC
P8 USB-HDMI adapter + libCEC
But can we really send arbitrary CEC messages?
lib.Transmit(CommandFromString("10:82:41:41:41:41:41:41:41"))
YES. It would appear at least.
To know for sure, had to ensure libCEC was not validating.
Fuzzing Process
It has been done (Davis) with Python + RainbowTech
serial API
I actually did not know this until late in the research
RainbowTech device has a nice simple serial API
Not much complex functionality
I had already started down the path below
libCEC + Python since pyCecClient is already a thing
Can use the P8 USB adapter and/or Raspberry Pi(s)
May port to Ruby since SWIG & Ruby++
https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-
Davis-HDMI-WP.pdf
Fuzzing Process
Major Steps
ID Target and Inputs
Generate Fuzzed Data
Execute Fuzzed Data
Monitor for Exceptions
Determine Exploitability
Fuzzing: Brute Force Vulnerability Discovery (Sutton, Michael; Greene, Adam; Amini, Pedram)
Generate Fuzzed Data
Started with "long" strings and string-based messages
Format strings
Parameter abuse
Vendor-specific messages
Simple bit-flipping
Adopted some from Davis work
Execute Fuzzed Data
1. Poll device
2. Send message
Monitor for Exceptions
1. Check for ack if applicable
2. Poll again
3. If debug, use that
4. If shell, check if service/app still running
5. If TV, will probably notice crash, fun, hard to automate
6. If exception, record msg & state & debug details if avail
If Shell but !Debugger
Samsung BluRay Player has BASH
But not 'watch'
Fake it:
while true; do
  date
  ps aux | grep "[a]pp_player"
  if [ $? ­ne 0 ]; then
    # do crash investigation
  fi
  sleep 0.5
done
Also TTY Output
[API_CECCMD_FeatureAbort] Return value is 0x31
API_CECCMD_FeatureAbort(op:0xB4) start.
[AP_INFOLINK/Fatal] 8:Starting background widget manager !!!
[TCFactory::GetOption] option = 37 value = 0
[TCFactory::GetOption] option = 51 value = 0
[API_CECCMD_FeatureAbort] Return value is 0x36
verified = 1
[AP_INFOLINK/Fatal] 9:CWidgetEngine::createSmartSideBar ret TRUE
[AP_INFOLINK/Fatal] 10:CWidgetEngine::activateSmartSideBar ret TRUE
DETERMINE EXPLOITABILITY
This is kind of an adventure unless debug
Specific to each device
Fuzzing
Complications
Getting Hold of Devices
They are around you however, just need to look
Can also emulate w/QEMU + firmware
Speed
500 bits/s
Not much we can do about that
Fuzz multiple devices simultaneously
RE targets to focus the fuzz
Fuzzing
Complications Continued
Debugging
Need to get access to the device
Probably no debugger
Often painful to compile one for it
Keep an eye out for gdbserver files however
Collect Data
Deduplicate
Repro
Targets
Home Theater Devices
Samsung Blu-ray Player (MIPS)
Targeted because already have shell
(Thx Ricky Lawshae & Jon Andersson)
Local shell to get on & study device
Philips Blu-ray Player
Samsung TV
Panasonic TV
Chromecast
Amazon Fire TV Stick
Targets
Mobile devices
Kindle Fire
Galaxy S5 (S6 dropped MHL)
Galaxy Note
Chromebook
Results
There's definitely more to be done
Issues Discovered
Panasonic TV
Samsung Blu-ray Player
Panasonic Can Haz
Upgrade?
Samsung's app_player
Handles CEC for BluRay player
Pulled via Ricky's root shell
Did some manual RE and
Rudimentary analysis with some ghetto IDAPython
banned = ['memcpy', 'strcpy', 'strncpy', 'etc...']
for func in banned:
  print('Processing ' + func)
  for xref in idautils.CodeRefsTo(idc.LocByName(func), True):
    print(idc.Name(
      idc.GetFunctionAttr(
        xref, idc.FUNCATTR_START
        )) + ' disasm: ' + idc.GetDisasm(xref))
    
Samsung's app_player
jalr $t9; strcpy => 333
jalr $t9; strncpy => 409
jalr $t9; memcpy => 310
jalr $t9; [.*]printf => 11685
/me wrings hands
However, most are not called by CEC code :(
3 memcpy's, 2 of which I had already found manually
73 printf's, but aren't (so far) exploitable conditions
app_player
Post exploitation
Enable HEC
Enable LAN
Attack LAN services if nec
Enable higher speed exfil etc
Control an MHL device
Beachhead for attacking other devices
Hiding
Future Work
Unuglify my Python
Integrate into bigger/better fuzz framework
Exploit CEC & bind shell to network interface
Exploit CEC, enable HEC, bind shell to HEC interface
Exploit CEC & "bind" shell to HDMI interface
Explore attack surface of:
HDMI: 3D, Audio Return Channel, more w/HEC
Feature adds to CEC (HDMI 2.0)
Moar devices
Emulation
Conclusion
Becoming more and more pervasive and invasive
Old vuln types may be new again
May be benefitting simply because code is newer
Hard, sometimes impossible, to upgrade, maintain,
configure
Risk = Vulnerabilty x Exposure x Impact
Exposure is growing
Impact is probably highest for your privacy
Links
not yet tho
P8 USB-HDMI Adapter
Simplified Wrapper & Interface Generator
Reveal.js
github.com/ZDI/hdfuzzing
blackhat.com/bh-eu-12-Davis-HDMI
github.com/Pulse-Eight/libcec
hdmi.org
www.pulse-eight.com
swig.org
github.com/hakimel/reveal.js
cec-o-matic.com

Contenu connexe

Tendances

How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
Building Voice
Building Voice Building Voice
Building Voice Videoguy
 
Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT SystemsInstallation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT SystemsrAVe [PUBS]
 
Infocomm2012 basic building blocks of iptv mp v2
Infocomm2012 basic building blocks of iptv mp v2Infocomm2012 basic building blocks of iptv mp v2
Infocomm2012 basic building blocks of iptv mp v2Will Bakewell
 
Iaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd Iaetsd
 
Hdmi Bit Rate Calculator
Hdmi Bit Rate CalculatorHdmi Bit Rate Calculator
Hdmi Bit Rate CalculatorMaryArmenta
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceVideoguy
 
Atlona Sales Presentation Ii
Atlona Sales Presentation IiAtlona Sales Presentation Ii
Atlona Sales Presentation Iimikeg112
 
Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016Kartik Parmar
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State NetworksVideoguy
 
Offline Voice Control
Offline Voice ControlOffline Voice Control
Offline Voice ControlJishnu Rajeev
 

Tendances (19)

HDMI
HDMIHDMI
HDMI
 
HDMI
HDMIHDMI
HDMI
 
Hdmi
Hdmi Hdmi
Hdmi
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
Building Voice
Building Voice Building Voice
Building Voice
 
Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT SystemsInstallation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT Systems
 
Infocomm2012 basic building blocks of iptv mp v2
Infocomm2012 basic building blocks of iptv mp v2Infocomm2012 basic building blocks of iptv mp v2
Infocomm2012 basic building blocks of iptv mp v2
 
Surf Communication Solutions - Voice Video Gw
Surf Communication Solutions - Voice Video GwSurf Communication Solutions - Voice Video Gw
Surf Communication Solutions - Voice Video Gw
 
Iaetsd the universal brain for all robots
Iaetsd the universal brain for all robotsIaetsd the universal brain for all robots
Iaetsd the universal brain for all robots
 
Hdmi Bit Rate Calculator
Hdmi Bit Rate CalculatorHdmi Bit Rate Calculator
Hdmi Bit Rate Calculator
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing Service
 
Atlona Sales Presentation Ii
Atlona Sales Presentation IiAtlona Sales Presentation Ii
Atlona Sales Presentation Ii
 
Hdmi cables
Hdmi cablesHdmi cables
Hdmi cables
 
Linkedin
LinkedinLinkedin
Linkedin
 
Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State Networks
 
HVTpaperDI2003v5
HVTpaperDI2003v5HVTpaperDI2003v5
HVTpaperDI2003v5
 
Offline Voice Control
Offline Voice ControlOffline Voice Control
Offline Voice Control
 
Vinay's_profile
Vinay's_profileVinay's_profile
Vinay's_profile
 

En vedette

Introduction of HDMI
Introduction of HDMIIntroduction of HDMI
Introduction of HDMIdrawtenor74
 
Fuzzing underestimated method of finding hidden bugs
Fuzzing underestimated method of finding hidden bugsFuzzing underestimated method of finding hidden bugs
Fuzzing underestimated method of finding hidden bugsPawel Rzepa
 
Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles E hacking
 
Развитие технологий генерации эксплойтов на основе анализа бинарного кода
Развитие технологий генерации эксплойтов на основе анализа бинарного кодаРазвитие технологий генерации эксплойтов на основе анализа бинарного кода
Развитие технологий генерации эксплойтов на основе анализа бинарного кодаPositive Hack Days
 
D1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FFD1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FFAnthony Jose
 
The Python bites your apple
The Python bites your appleThe Python bites your apple
The Python bites your appleQidan He
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 
Henrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using SwaggerHenrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using SwaggerDevSecCon
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco GrassiShakacon
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...CODE BLUE
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationMalachi Jones
 
OWASP Open SAMM
OWASP Open SAMMOWASP Open SAMM
OWASP Open SAMMintive
 
Bug Hunting with Media Formats
Bug Hunting with Media FormatsBug Hunting with Media Formats
Bug Hunting with Media FormatsRussell Sanford
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitAbhisek Datta
 
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerThe Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerJoxean Koret
 
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" Peter Hlavaty
 
Hacking Web Apps by Brent White
Hacking Web Apps by Brent WhiteHacking Web Apps by Brent White
Hacking Web Apps by Brent WhiteEC-Council
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Andrew McNicol
 

En vedette (20)

American Fuzzy Lop
American Fuzzy LopAmerican Fuzzy Lop
American Fuzzy Lop
 
Introduction of HDMI
Introduction of HDMIIntroduction of HDMI
Introduction of HDMI
 
Fuzzing underestimated method of finding hidden bugs
Fuzzing underestimated method of finding hidden bugsFuzzing underestimated method of finding hidden bugs
Fuzzing underestimated method of finding hidden bugs
 
Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles Drive it Like you Hacked It - New Attacks and Tools to Wireles
Drive it Like you Hacked It - New Attacks and Tools to Wireles
 
Развитие технологий генерации эксплойтов на основе анализа бинарного кода
Развитие технологий генерации эксплойтов на основе анализа бинарного кодаРазвитие технологий генерации эксплойтов на основе анализа бинарного кода
Развитие технологий генерации эксплойтов на основе анализа бинарного кода
 
D1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FFD1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FF
 
The Python bites your apple
The Python bites your appleThe Python bites your apple
The Python bites your apple
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
What the fuzz
What the fuzzWhat the fuzz
What the fuzz
 
Henrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using SwaggerHenrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using Swagger
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_Exploitation
 
OWASP Open SAMM
OWASP Open SAMMOWASP Open SAMM
OWASP Open SAMM
 
Bug Hunting with Media Formats
Bug Hunting with Media FormatsBug Hunting with Media Formats
Bug Hunting with Media Formats
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and Profit
 
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerThe Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
 
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
 
Hacking Web Apps by Brent White
Hacking Web Apps by Brent WhiteHacking Web Apps by Brent White
Hacking Web Apps by Brent White
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
 

Similaire à High Definition Fuzzing; Exploring HDMI vulnerabilities

Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -evechiportal
 
MSMDC_CLI363
MSMDC_CLI363MSMDC_CLI363
MSMDC_CLI363mokacao
 
BonAHA framework - Lab presentation
BonAHA framework - Lab presentationBonAHA framework - Lab presentation
BonAHA framework - Lab presentationSuman Srinivasan
 
BonAHA framework - IEEE CCNC 2009
BonAHA framework - IEEE CCNC 2009BonAHA framework - IEEE CCNC 2009
BonAHA framework - IEEE CCNC 2009Suman Srinivasan
 
Tesla Hacking to FreedomEV
Tesla Hacking to FreedomEVTesla Hacking to FreedomEV
Tesla Hacking to FreedomEVJasper Nuyens
 
Porting To Symbian
Porting To SymbianPorting To Symbian
Porting To SymbianMark Wilcox
 
Driver Configuration Webinar
Driver Configuration WebinarDriver Configuration Webinar
Driver Configuration WebinarAVEVA
 
Wonho Park_20151209
Wonho Park_20151209Wonho Park_20151209
Wonho Park_20151209Wonho Park
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment Sergey Gordeychik
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Seungjoo Kim
 
20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Jorisimec.archive
 
aibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madridaibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@MadridTomoya Fujita
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkChristopher Grayson
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Manich Koomsusi
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisitedThierry Zoller
 

Similaire à High Definition Fuzzing; Exploring HDMI vulnerabilities (20)

Resume
ResumeResume
Resume
 
Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eve
 
MSMDC_CLI363
MSMDC_CLI363MSMDC_CLI363
MSMDC_CLI363
 
BonAHA framework - Lab presentation
BonAHA framework - Lab presentationBonAHA framework - Lab presentation
BonAHA framework - Lab presentation
 
Beagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009bBeagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009b
 
BonAHA framework - IEEE CCNC 2009
BonAHA framework - IEEE CCNC 2009BonAHA framework - IEEE CCNC 2009
BonAHA framework - IEEE CCNC 2009
 
Tesla Hacking to FreedomEV
Tesla Hacking to FreedomEVTesla Hacking to FreedomEV
Tesla Hacking to FreedomEV
 
Porting To Symbian
Porting To SymbianPorting To Symbian
Porting To Symbian
 
Driver Configuration Webinar
Driver Configuration WebinarDriver Configuration Webinar
Driver Configuration Webinar
 
Resume
ResumeResume
Resume
 
Wonho Park_20151209
Wonho Park_20151209Wonho Park_20151209
Wonho Park_20151209
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
 
20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris
 
Slimline Open Firmware
Slimline Open FirmwareSlimline Open Firmware
Slimline Open Firmware
 
haifux-pcie.pdf
haifux-pcie.pdfhaifux-pcie.pdf
haifux-pcie.pdf
 
aibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madridaibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madrid
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
 

Plus de E Hacking

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyE Hacking
 
Threats against the next billion devices
Threats against the next billion devicesThreats against the next billion devices
Threats against the next billion devicesE Hacking
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Exploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit SystemsExploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit SystemsE Hacking
 
Most Important steps to become a hacker
Most Important steps to become a hackerMost Important steps to become a hacker
Most Important steps to become a hackerE Hacking
 
Penetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the BattlefieldPenetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the BattlefieldE Hacking
 
Website fingerprinting on TOR
Website fingerprinting on TORWebsite fingerprinting on TOR
Website fingerprinting on TORE Hacking
 
Fuzzing the Media Framework in Android
Fuzzing the Media Framework in AndroidFuzzing the Media Framework in Android
Fuzzing the Media Framework in AndroidE Hacking
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 
Hacking Wireless World, RFID hacking
Hacking Wireless World, RFID hackingHacking Wireless World, RFID hacking
Hacking Wireless World, RFID hackingE Hacking
 
Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itE Hacking
 
Malicious Domain Profiling
Malicious Domain Profiling Malicious Domain Profiling
Malicious Domain Profiling E Hacking
 
Searching Shodan For Fun And Profit
Searching Shodan For Fun And ProfitSearching Shodan For Fun And Profit
Searching Shodan For Fun And ProfitE Hacking
 
The Machines that Betrayed their Masters
The Machines that Betrayed their MastersThe Machines that Betrayed their Masters
The Machines that Betrayed their MastersE Hacking
 
Detecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance SystemsDetecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance SystemsE Hacking
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouE Hacking
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCE Hacking
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at HomeE Hacking
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperE Hacking
 

Plus de E Hacking (20)

CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Threats against the next billion devices
Threats against the next billion devicesThreats against the next billion devices
Threats against the next billion devices
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Exploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit SystemsExploiting Linux On 32-bit and 64-bit Systems
Exploiting Linux On 32-bit and 64-bit Systems
 
Most Important steps to become a hacker
Most Important steps to become a hackerMost Important steps to become a hacker
Most Important steps to become a hacker
 
Penetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the BattlefieldPenetrating the Perimeter - Tales from the Battlefield
Penetrating the Perimeter - Tales from the Battlefield
 
Website fingerprinting on TOR
Website fingerprinting on TORWebsite fingerprinting on TOR
Website fingerprinting on TOR
 
Fuzzing the Media Framework in Android
Fuzzing the Media Framework in AndroidFuzzing the Media Framework in Android
Fuzzing the Media Framework in Android
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 
Hacking Wireless World, RFID hacking
Hacking Wireless World, RFID hackingHacking Wireless World, RFID hacking
Hacking Wireless World, RFID hacking
 
Abusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get itAbusing Microsoft Kerberos - Sorry you guys don’t get it
Abusing Microsoft Kerberos - Sorry you guys don’t get it
 
Malicious Domain Profiling
Malicious Domain Profiling Malicious Domain Profiling
Malicious Domain Profiling
 
Searching Shodan For Fun And Profit
Searching Shodan For Fun And ProfitSearching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
 
The Machines that Betrayed their Masters
The Machines that Betrayed their MastersThe Machines that Betrayed their Masters
The Machines that Betrayed their Masters
 
Detecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance SystemsDetecting Bluetooth Surveillance Systems
Detecting Bluetooth Surveillance Systems
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections Paper
 

Dernier

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 

Dernier (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 

High Definition Fuzzing; Exploring HDMI vulnerabilities

  • 1. HIGH-DEF FUZZING EXPLORING VULNERABILITIES IN HDMI-CEC               name = "Joshua Smith"               job  = "Senior Security Researcher"               job += "HP Zero Day Initiative"               irc  = "kernelsmith"               twit = "@kernelsmith"           
  • 2. Which of the following is false? 1. Have had 10 knee surgeries... and 5 others 2. Worked at JHUAPL... did mostly weapon sys assessments 3. Was voted "most athletic" in high school... don't judge a book by its cover ;) 4. Previously ran assessments at the 92d Info. Warfare Aggressor Sq. (USAF)... now 92d Info. Ops. Sq - vuln assessments/pentests/red teams 5. Have a B.S. in Computer Engineering from RPI... Aeronautical. Also, an MIS & some CS from JHU 6. Am an external Metasploit dev... since Feb 2013 7. Had C2 of 50 nuclear ICBMs on 9/11... interesting story
  • 3. Overview What is CEC Specs & Implementations Design Details Protocol Attack Vectors & Surface Fuzzing CEC Some Results Future Work
  • 4. Why? Wanted to research an area that was relatively untouched For me: assembly > C/C++ and RISC > CISC Another attack vector for mobile devices via: Mobile High-Definition Link (MHL) Slimport Many car stereos as well My son is completely obsessed with cords/wires, esp HDMI
  • 5. Previous Research HDMI – Hacking Displays Made Interesting Andy Davis BlackHat EU 2012 GUI Python CEC fuzzer Somewhat simplistic No exception monitoring No crash data gathering
  • 6. What is HDMI? High Def Multimedia Interface HDMI is an interface specification Implemented as cables & connectors Successor to DVI
  • 7. What is CEC? Consumer Electronics Control Feature defined in the HDMI spec Allows user to command & control up to 15 devices Can relay commands from remotes It's what automatically changes your TV input Vendor-extendable Adopted by some other technologies
  • 8. That Don't Look Like HDMI! Still has CEC however Slimport Think ~ Amazon, Google, Blackberry, LG G+ Mobile High-Definition Link (MHL) Think ~ HTC, LG Optimus+, Samsung (not G6) Remote Control Protocol
  • 9. Specs & Features History Ver Published Features 1.0 Dec 2002 Boring stuff 1.1 May 2004 Boring stuff 1.2 Aug 2005 Boring stuff 1.2a* Dec 2005 Fully spec'd CEC * This is the good stuff, for vulnerabilities anyway
  • 10. Specs & Features History Continued Ver Published Features 1.3-3c '06-'08 Whizz-bang A/V & new conns 1.4* May 2009 Features++: 4k, HEC, ARC, 3D, micro 2.0 Sep 2013 4k @60fps, Dual View, 3D++, CEC++ * Most widely deployed & available, more in a sec
  • 11. Interesting 1.4 Features ARC (Audio Return Channel) HEC (HDMI Ethernet Connection) 100Mb/s Enables traditional networking w/HDMI
  • 12. CEC Details 1-wire bidirectional serial bus Slow: 500 bit/s Uses AV.link protocol to perform remote control functions For HDMI: CEC wiring is mandatory CEC functionality (software support) is optional
  • 13. Notable Implementations Commercial industry uses various trade names Anynet+ (Samsung), Aquos Link (Sharp), BRAVIA Link/Sync (Sony) SimpLink (LG), VIERA Link (Panasonic), EasyLink (Philips), etc Open Source libCEC (dual commercial license)
  • 14. Android HDMI-CEC CEC Addressing PHYSICAL N.N.N.N where 0x0<=N<=0xF Root display (TV) is always 0.0.0.0 Required as CEC has a notion of switching LOGICAL L where 0x0<=L<=0xF Root display (TV) is always 0 Negotiated by product type Example: first STB in system is always 3
  • 15. Logical Addresses Address Device Address Device 0 TV 8 Playback Dev 2 1 Rec. Device 1 9 Rec Device 3 2 Rec. Device 2 10 Tuner 4 3 Tuner 1 11 Playback Dev 3 4 Playback Dev 1 12 Reserved 5 Audio System 13 Reserved 6 Tuner 2 14 Free Use 7 Tuner 3 15 Unreg/Broadcast
  • 17. Header Block Source Dest EoM Ack 3 2 1 0 3 2 1 0 E A (4bits) Logical address of source (4bits) Logical address of dest (2bits) Control bits (EoM & Ack) Example: 0100:0000:0:0 = Src 4, Dest 0
  • 18. Data Block Data EoM Ack 7 6 5 4 3 2 1 0 E A (8bits) Data (Big-endian/MSB first) (2bits) Control bits (EoM & Ack) Example: 01000001:1:0 = "A"
  • 19. Opcode Block Really just a data block Opcode EoM Ack 7 6 5 4 3 2 1 0 E A (8bits) Opcode (Big-endian/MSB first) (2bits) Control bits (EoM & Ack) Example: 10000010:1:0 = 0x82 (Active Source)
  • 20. CEC Protocol The long and short of it... 0F - Broadcast ping 1 F :82 :10:00 Source Dest (Bcast) Opcode (Active Src) Param (PA of src) 1 0 :64 :44:65:66:43:6F:6E:20:32:33 Source Dest (TV) Opcode (Set OSD String) Msg params 44: Display control flags, rest is ASCII string S D :OP :41:41:41:41:41:41:41:41:41:41:41:41:41:41 Source Dest Opcode Msg params
  • 21. CEC Protocol Pinging and Polling The "Ping" EOM bit in header is set to 1 Used to poll for devices etc (fuzz monitor?) Source & dest addresses will be different Also used for allocating Logical Addresses Source & dest addresses are the same
  • 22. CEC Protocol Additional Info Big-endian/MSB first Text is only printable ASCII (0x20 <= A <= 0x7E) Messages can be directly addressed, broadcast, or either Should ignore a message coming from address 15, unless: Message invokes a broadcast response Message has been sent by a CEC Switch The message is Standby
  • 23. CEC Protocol Transmission (Flow) Control 3 mechanisms to provide reliable frame transfer 1. Frame re-transmissions (1 to 5) 2. Flow control 3. Frame validation (ignore msgs w/wrong #args) A message is assumed correctly received when: It has been transmitted and acknowledged A message is assumed to have been acted upon when: Sender does not receive Feature Abortw/in 1sec Might be useful during fuzzing
  • 24. Attack Vectors & Thoughts HDMI-network exploitation via CEC HDMI Ethernet Channel (HEC) Network connectivity to things thought un-networked Great place to hide Range of targetable devices TVs, BluRays, receivers, "TV Sticks", game consoles? Mobile phones & tablets Devices implementing MHL/Slimport
  • 25. Known popular mobile devices that implement MHL Attack Surface CEC commands CEC vendor-specific commands HEC commands HEC functionality
  • 26. Finding Vulns Approaches Identify "at-risk" messages & fuzz Source Code Analysis Hard to come by except libCEC & Android Reverse Engineering Can be hard to get all the firmwarez Expect different architectures MIPS, ARM, ARC etc MIPS is generally most popular so far
  • 27. Interesting Messages String operations Set OSD Name (0x47) Preferred name for use in any OSD (menus) Set OSD String (0x64) Text string to the TV for display Set Timer Program Title (0x67) Set the name of a program associated w/a timer Vendor-specific Messages Because who knows what they might do
  • 28. In Order to Fuzz We Need to Answer Some Questions How can we send arbitrary CEC commands? How can we detect if a crash occurred?
  • 29. Sending Messages Hardware ~0 {lap,desk}tops with HDMI-CEC Many have HDMI, none have CEC Adapters Pulse-Eight USB-HDMI RainShadow HDMI-CEC to USB Bridge Raspberry Pi RPi & P8 adapter both use libCEC :)
  • 30. Sending Messages Software Pulse-Eight driver is open source (libCEC) Dual-licensed actually (GPLv2/Commercial) Python SWIG-based bindings Supports a handful of devices
  • 31. Fuzzing CEC libCEC Can send CEC messages with: Raspberry Pi + libCEC P8 USB-HDMI adapter + libCEC But can we really send arbitrary CEC messages? lib.Transmit(CommandFromString("10:82:41:41:41:41:41:41:41")) YES. It would appear at least. To know for sure, had to ensure libCEC was not validating.
  • 32. Fuzzing Process It has been done (Davis) with Python + RainbowTech serial API I actually did not know this until late in the research RainbowTech device has a nice simple serial API Not much complex functionality I had already started down the path below libCEC + Python since pyCecClient is already a thing Can use the P8 USB adapter and/or Raspberry Pi(s) May port to Ruby since SWIG & Ruby++ https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12- Davis-HDMI-WP.pdf
  • 33. Fuzzing Process Major Steps ID Target and Inputs Generate Fuzzed Data Execute Fuzzed Data Monitor for Exceptions Determine Exploitability Fuzzing: Brute Force Vulnerability Discovery (Sutton, Michael; Greene, Adam; Amini, Pedram)
  • 34. Generate Fuzzed Data Started with "long" strings and string-based messages Format strings Parameter abuse Vendor-specific messages Simple bit-flipping Adopted some from Davis work
  • 35. Execute Fuzzed Data 1. Poll device 2. Send message
  • 36. Monitor for Exceptions 1. Check for ack if applicable 2. Poll again 3. If debug, use that 4. If shell, check if service/app still running 5. If TV, will probably notice crash, fun, hard to automate 6. If exception, record msg & state & debug details if avail
  • 37. If Shell but !Debugger Samsung BluRay Player has BASH But not 'watch' Fake it: while true; do   date   ps aux | grep "[a]pp_player"   if [ $? ­ne 0 ]; then     # do crash investigation   fi   sleep 0.5 done
  • 39. DETERMINE EXPLOITABILITY This is kind of an adventure unless debug Specific to each device
  • 40. Fuzzing Complications Getting Hold of Devices They are around you however, just need to look Can also emulate w/QEMU + firmware Speed 500 bits/s Not much we can do about that Fuzz multiple devices simultaneously RE targets to focus the fuzz
  • 41. Fuzzing Complications Continued Debugging Need to get access to the device Probably no debugger Often painful to compile one for it Keep an eye out for gdbserver files however Collect Data Deduplicate Repro
  • 42. Targets Home Theater Devices Samsung Blu-ray Player (MIPS) Targeted because already have shell (Thx Ricky Lawshae & Jon Andersson) Local shell to get on & study device Philips Blu-ray Player Samsung TV Panasonic TV Chromecast Amazon Fire TV Stick
  • 43. Targets Mobile devices Kindle Fire Galaxy S5 (S6 dropped MHL) Galaxy Note Chromebook
  • 47. Samsung's app_player Handles CEC for BluRay player Pulled via Ricky's root shell Did some manual RE and Rudimentary analysis with some ghetto IDAPython banned = ['memcpy', 'strcpy', 'strncpy', 'etc...'] for func in banned:   print('Processing ' + func)   for xref in idautils.CodeRefsTo(idc.LocByName(func), True):     print(idc.Name(       idc.GetFunctionAttr(         xref, idc.FUNCATTR_START         )) + ' disasm: ' + idc.GetDisasm(xref))     
  • 48. Samsung's app_player jalr $t9; strcpy => 333 jalr $t9; strncpy => 409 jalr $t9; memcpy => 310 jalr $t9; [.*]printf => 11685 /me wrings hands However, most are not called by CEC code :( 3 memcpy's, 2 of which I had already found manually 73 printf's, but aren't (so far) exploitable conditions
  • 50. Post exploitation Enable HEC Enable LAN Attack LAN services if nec Enable higher speed exfil etc Control an MHL device Beachhead for attacking other devices Hiding
  • 51. Future Work Unuglify my Python Integrate into bigger/better fuzz framework Exploit CEC & bind shell to network interface Exploit CEC, enable HEC, bind shell to HEC interface Exploit CEC & "bind" shell to HDMI interface Explore attack surface of: HDMI: 3D, Audio Return Channel, more w/HEC Feature adds to CEC (HDMI 2.0) Moar devices Emulation
  • 52. Conclusion Becoming more and more pervasive and invasive Old vuln types may be new again May be benefitting simply because code is newer Hard, sometimes impossible, to upgrade, maintain, configure Risk = Vulnerabilty x Exposure x Impact Exposure is growing Impact is probably highest for your privacy
  • 53. Links not yet tho P8 USB-HDMI Adapter Simplified Wrapper & Interface Generator Reveal.js github.com/ZDI/hdfuzzing blackhat.com/bh-eu-12-Davis-HDMI github.com/Pulse-Eight/libcec hdmi.org www.pulse-eight.com swig.org github.com/hakimel/reveal.js cec-o-matic.com