SlideShare une entreprise Scribd logo
1  sur  59
Télécharger pour lire hors ligne
SmartTV	
  
INSecurity	
  
ReVuln	
  Ltd.	
  
PhDays	
  2014	
  
Who?	
  
Donato	
  Ferrante	
  
@dntbug	
  
Luigi	
  Auriemma	
  
@luigi_auriemma	
  
2
ReVuln?	
  
Consulting	
  
Penetration	
  Testing	
  
Vulnerability	
  Research	
  
revuln.com	
  
	
  
info@revuln.com	
  
	
  
@revuln	
   3
What’s	
  a	
  SmartTV?	
  (1)	
  
4
0 Describes	
  a	
  trend	
  of	
  integration	
  of	
  the	
  Internet	
  and	
  
Web	
  2.0	
  features	
  into	
  television	
  
0 Technological	
  convergence	
  between	
  computers	
  and	
  
television	
  sets	
  and	
  set-­‐top	
  boxes	
  
0 SmartTV	
  =	
  a	
  television	
  with	
  integrated	
  Internet	
  
capabilities	
  that	
  offers	
  more	
  advanced	
  computing	
  
ability	
  and	
  connectivity	
  than	
  a	
  contemporary	
  TV	
  
What’s	
  a	
  SmartTV?	
  (2)	
  
5
6
Not	
  all	
  the	
  TVs	
  are	
  SmartTVs…	
  
7but	
  a	
  lot	
  of	
  TVs	
  are	
  actually	
  SmartTVs	
  
8SmartTVs	
  at	
  the	
  Airport..	
  
9
And	
  in	
  our	
  hotel	
  room..	
  
SmartTV	
  or	
  not	
  SmartTV,	
  that	
  is	
  the	
  problem..	
  
10
We	
  checked	
  the	
  back	
  
of	
  the	
  TV	
  and	
  it	
  was	
  dark..	
  
	
  
So	
  we	
  turned	
  on	
  a	
  Blashlight	
  
and..	
  
11
Before	
  and	
  After	
  
12
TV	
   SmartTV	
  
Get	
  input	
  signal	
  then	
  output	
   Fully-­‐featured	
  PC	
  
Why	
  are	
  SmartTV	
  so	
  popular?	
  
13
2	
  
1st	
  Commercial	
  
•  If	
  you	
  have	
  to	
  choose	
  between	
  a	
  simple	
  TV	
  and	
  a	
  TV	
  with	
  
a	
  lot	
  of	
  features,	
  even	
  features	
  that	
  you	
  don’t	
  know	
  (but	
  
they	
  sound	
  cool),	
  you	
  will	
  go	
  for	
  the	
  second	
  one	
  
	
  
14
2nd	
  Advertising	
  
0 Advertising	
  =	
  Money	
  for	
  Vendors/Ads	
  Providers	
  
0 Targeted	
  advertising	
  and	
  other	
  advanced	
  advertising	
  
features	
  such	
  as	
  ad	
  telescoping	
  using	
  VOD	
  and	
  PVR,	
  
enhanced	
  TV	
  for	
  consumer	
  call-­‐to-­‐action	
  and	
  
audience	
  measurement	
  solutions	
  for	
  ad	
  campaign	
  
effectiveness	
  
0 Bidirectional	
  Blow	
  between	
  TV	
  and	
  Ads	
  providers	
  
15
Advertising	
  and	
  Security	
  
16
0 This	
  bidirectional	
  Xlow	
  between	
  TV	
  and	
  Ads	
  provider,	
  
has	
  2	
  main	
  consequences:	
  
0  Privacy,	
  the	
  viewer	
  is	
  disclosing	
  personal	
  habits	
  
0  Security,	
  a	
  man-­‐in-­‐the-­‐middle	
  attack	
  can	
  be	
  pretty	
  
effective	
  to	
  achieve	
  one	
  of	
  the	
  following	
  goals:	
  
0 Ads-­‐Hijacking	
  =>	
  To	
  inXluence	
  the	
  viewer	
  
0 Vulnerability	
  Exploitation	
  =>	
  To	
  get	
  access	
  to	
  the	
  TV	
  
Why	
  SmartTV	
  as	
  Target?	
  
	
  
0 Used	
  worldwide	
  
0 Huge	
  attack	
  surface	
  
0 And..	
  
17
TV	
  can	
  see	
  you..	
  
18
TV	
  can	
  hear	
  you..	
  
19
1984	
  
20
	
  
0 An	
  attacker	
  able	
  to	
  gain	
  access	
  to	
  your	
  
SmartTV	
  can:	
  
0  Get	
  access	
  to	
  your	
  Home	
  privacy	
  
	
  
0  Get	
  access	
  to	
  your	
  Company	
  meeting	
  room	
  
0  And	
  more..	
  
The	
  Problem	
  (1):	
  Insecurity	
  
	
  
0 SmartTV	
  are	
  insecure!	
  
21
The	
  Problem	
  (2):	
  Bad	
  &	
  Obscure	
  
	
  
0 They	
  rely	
  on	
  bad	
  coding	
  practice	
  and..	
  
0 They	
  usually	
  rely	
  on	
  security	
  by	
  obscurity	
  (sigh)	
  
22
The	
  Problem	
  (3):	
  Server	
  &	
  Client	
  
	
  
0  Affected	
  both	
  by	
  Server-­‐side	
  issues..	
  
0  There	
  are	
  several	
  services	
  running	
  and	
  listening	
  for	
  incoming	
  
connections	
  (by	
  default)	
  
	
  
0  And	
  Client-­‐side	
  issues	
  
0  Any	
  of	
  the	
  Apps	
  installed	
  by	
  default	
  can	
  represent	
  a	
  possible	
  attack	
  
vector	
  against	
  the	
  device	
  itself	
  
23
The	
  Problem	
  (4):	
  Updates	
  
	
  
0  A	
  lot	
  of	
  software	
  installed	
  on	
  the	
  TV..	
  
0  Have	
  you	
  ever	
  updated	
  your	
  TV?	
  
0  How	
  security	
  Bix	
  are	
  pushed	
  on	
  your	
  TV	
  by	
  the	
  Vendor?	
  
0  Are	
  you	
  running	
  the	
  latest	
  release	
  of	
  the	
  web	
  browser?	
  
24
Nice..	
  
But	
  now	
  tell	
  us	
  how	
  to	
  get	
  a	
  $hell!	
  
25
Things	
  to	
  know..	
  (1)	
  
0 A	
  SmartTV	
  is	
  an	
  expensive	
  hardware	
  device	
  
0  Usually	
  >	
  1000	
  Euro	
  (47.000	
  RUB)	
  
0 You	
  might	
  “brick”	
  the	
  TV	
  (no	
  longer	
  works)	
  
0 Big	
  hardware	
  and	
  software	
  differences	
  between	
  the	
  
TV	
  models,	
  even	
  those	
  of	
  the	
  same	
  vendor	
  
0 Multiple	
  names	
  for	
  the	
  same	
  features	
  (i.e.	
  HDMI-­‐CEC*)	
  
26
*	
  http://en.wikipedia.org/wiki/HDMI#CEC	
  
Things	
  to	
  know..	
  (2)	
  
0  SmartTV	
  are	
  usually	
  based	
  on	
  Linux	
  
0  Using	
  MIPS	
  and	
  ARM	
  CPU	
  
0  Having	
  a	
  number	
  of	
  different	
  embedded	
  stuff	
  including:	
  WiFi,	
  
USB,	
  Camera,	
  Microphone,	
  sensors,	
  etc	
  
0  Running	
  a	
  wide	
  range	
  of	
  proprietary	
  and	
  customized	
  software,	
  
with	
  crazy	
  conXigurations	
  
0  Black-­‐box	
  testing	
  means	
  wasting	
  lot	
  of	
  time	
  to	
  get	
  information,	
  
having	
  few	
  control	
  over	
  the	
  TV	
  and	
  limited	
  debugging	
  
27
How	
  to	
  get	
  the	
  Software?	
  (1)	
  
0  SmartTV	
  vendors	
  (like	
  Samsung	
  and	
  LG)	
  usually	
  release	
  emulators	
  
and/or	
  SDK	
  for	
  developers	
  willing	
  to	
  create	
  new	
  Apps	
  for	
  the	
  TV	
  
0  The	
  idea	
  of	
  using	
  the	
  emulators	
  on	
  the	
  PC	
  to	
  Xind	
  issues	
  affecting	
  the	
  
TV	
  might	
  sound	
  interesting	
  
0  The	
  problem	
  is	
  that	
  the	
  emulator	
  doesn’t	
  usually	
  match	
  the	
  software	
  
running	
  on	
  the	
  real	
  TV	
  
0  For	
  example	
  if	
  you	
  Xind	
  10	
  issues	
  in	
  the	
  emulator,	
  probably	
  only	
  1	
  or	
  
2	
  will	
  work	
  on	
  the	
  TV	
  and	
  bugs	
  affecting	
  the	
  TV	
  may	
  not	
  work	
  on	
  the	
  
emulators	
  
0  But	
  emulators	
  are	
  good	
  to	
  have	
  an	
  idea	
  of	
  some	
  protocols	
  and	
  how	
  
the	
  code	
  works	
  
28
How	
  to	
  get	
  the	
  Software?	
  (2)	
  
0  Via	
  Xirmware	
  updates	
  
0  Don’t	
  need	
  to	
  access	
  the	
  TV	
  
0  Thousands	
  of	
  updates	
  available	
  for	
  free	
  on	
  the	
  Vendors	
  
websites	
  
0  Usually	
  encrypted	
  with	
  an	
  encryption	
  key	
  deXined	
  on	
  a	
  TV/
model	
  base.	
  i.e.:	
  2	
  different	
  models	
  of	
  the	
  same	
  vendor	
  will	
  
have	
  2	
  different	
  keys	
  
0  Require	
  some	
  reverse	
  engineering	
  work	
  to	
  extract	
  the	
  content	
  
29
How	
  to	
  get	
  the	
  Software?	
  (3)	
  
0  Via	
  directory	
  traversal	
  
	
  
0 Needs	
  a	
  vulnerability	
  
0 If	
  you	
  can	
  access	
  /proc	
  you	
  have	
  lot	
  of	
  information	
  
0 If	
  you	
  can	
  access	
  /dev	
  you	
  can	
  download	
  all	
  the	
  Xilesystems	
  
	
  
0 Otherwise	
  you	
  have	
  to	
  guess	
  Xile/directory	
  names	
  by	
  using	
  
some	
  techniques	
  
30
How	
  to	
  get	
  the	
  Software?	
  (4)	
  
0  Via	
  code	
  execution	
  
0  Needs	
  a	
  vulnerability	
  
0  Full	
  access	
  to	
  Xiles,	
  directory	
  and	
  attached	
  devices!	
  
0  Execute	
  whatever	
  commands	
  you	
  want	
  :]	
  
0  Bye	
  Bye	
  TV	
  Caveat:	
  You	
  might	
  brick	
  the	
  TV!!!	
  
31
How	
  to	
  get	
  the	
  Software?	
  (5)	
  
0  Via	
  JTAG	
  or	
  NAND/SD	
  physical	
  reading	
  
	
  
0  Hardware	
  solution,	
  you	
  must	
  open	
  the	
  TV	
  and	
  playing	
  with	
  its	
  
content…	
  bye	
  bye	
  warranty	
  
0  Not	
  always	
  available	
  or	
  easy	
  to	
  access	
  
0  It	
  might	
  cause	
  some	
  trouble	
  to	
  the	
  device	
  
0  A	
  lot	
  of	
  effort	
  and	
  only	
  for	
  skilled	
  people	
  
32
Reset:	
  Service	
  Menu	
  
33
Debug:	
  Serial	
  Cable	
  
34
Samsung	
  
LG	
  
Philips	
  
Attack	
  Surface	
  
0  As	
  you	
  might	
  have	
  guessed	
  there	
  are	
  a	
  lot	
  of	
  different	
  ways	
  
to	
  attack	
  a	
  SmartTV	
  
0  To	
  get	
  a	
  better	
  understanding	
  let’s	
  take	
  a	
  look	
  at	
  a	
  real	
  
world	
  device	
  
0  We	
  will	
  just	
  focus	
  on	
  a	
  subset	
  of	
  the	
  device	
  attack	
  surface	
  
0  To	
  do	
  that	
  we	
  take	
  in	
  consideration	
  the	
  following	
  schema	
  
related	
  to	
  a	
  Philips	
  SmartTV…	
  
35
Attack	
  Surface	
  example	
  
from	
  Philips	
  manual	
  
36
Attack	
  Surface	
  -­‐	
  USB	
  
37
USB	
  
Malicious	
  USB	
  stick	
  containing	
  
malformed	
  data	
  i.e.:	
  
•  Video	
  and	
  Audio	
  codecs	
  
•  Filesystem	
  
•  USB	
  stack	
  
•  Auto	
  executed	
  Xiles	
  
Attack	
  Surface	
  -­‐	
  HDMI	
  
38
HDMI	
  
Communication	
  protocols:	
  
•  CEC	
  
•  HEC*	
  
for	
  device	
  interoperability	
  
	
  
Rogue	
  hardware	
  via	
  
Ethernet	
  connection	
  (HEC)	
  
*HEC	
  is	
  not	
  that	
  popular,	
  not	
  clear	
  how	
  many	
  devices	
  are	
  using	
  this	
  standard..	
  
Attack	
  Surface	
  -­‐	
  DVB	
  
39
DVB	
  
Radio	
  signal	
  to	
  the	
  TV	
  
	
  
DVB	
  !=	
  Analog	
  
	
  
It’s	
  a	
  protocol,	
  which	
  allows	
  
using	
  different	
  codecs	
  to	
  decode	
  
the	
  video/audio	
  streams	
  
	
  
Different	
  standards:	
  
•  DVB-­‐T	
  (terrestrial)	
  
•  DVB-­‐C	
  (cable)	
  
•  DVB-­‐S	
  (satellite)	
   Homemade	
  DVB	
  transmitter	
  
Wait!	
  Before	
  we	
  forget..	
  
0 The	
  DVB	
  audio/video	
  streams	
  are	
  a	
  possible	
  fuzzing	
  
target:	
  
0  HEVC,	
  H.262,	
  H.264,	
  AVS,	
  MP2,	
  MP3,	
  AC-­‐3,	
  AAC,	
  HE-­‐AAC	
  
	
  
0 But	
  the	
  embedded	
  interactive	
  content	
  is	
  the	
  best	
  way	
  
to	
  attack	
  the	
  TV:	
  
0  HbbTV	
  
0  CE-­‐HTML	
  
0  MHEG	
  
40
Attack	
  Surface	
  -­‐	
  WiFi	
  
41
WiFi	
  
WiFi	
  adapter	
  of	
  the	
  TV	
  acting	
  as	
  
access-­‐point	
  listening	
  for	
  WiFi	
  
connections.	
  
	
  
The	
  Miracast	
  protocol	
  
is	
  composed	
  by	
  out-­‐of-­‐band	
  
WiFi	
  packets,	
  protocols	
  
and	
  codecs	
  
A	
  vulnerability	
  in	
  
Miracast	
  allows	
  the	
  
attacker	
  to	
  access	
  
the	
  TV	
  from	
  
outside	
  your	
  house	
  
Attack	
  Surface	
  -­‐	
  Apps	
  
42
Apps	
  
Vulnerabilities	
  affecting	
  Apps	
  on	
  
the	
  TV:	
  
•  Skype	
  
•  Web	
  browser	
  
•  Malicious	
  Apps	
  
	
  
Attack	
  Surface	
  -­‐	
  LAN	
  
0  Most	
  of	
  the	
  SmartTV	
  issues	
  are	
  related	
  to	
  services	
  exposed	
  via	
  LAN:	
  
0  UPNP	
  
0  Video/Audio	
  service	
  (like	
  DirectFB)	
  
0  Various	
  HTTP/HTTPS	
  servers	
  
0  Network	
  remote	
  controller	
  
0  Media	
  sharing	
  
0  Status	
  and	
  information	
  
0  First	
  thing	
  to	
  try	
  on	
  your	
  SmartTV	
  is	
  using	
  NMAP:	
  
0  You	
  will	
  see	
  a	
  number	
  of	
  different	
  TCP	
  and	
  UDP	
  ports	
  open	
  
0  Some	
  of	
  them	
  awaiting	
  for	
  you	
  to	
  connect	
  :]	
  
0  If	
  you	
  try	
  to	
  send	
  some	
  junk	
  data	
  to	
  these	
  ports	
  you	
  might	
  get	
  some	
  easy	
  way	
  to	
  
crash/reboot	
  the	
  TV,	
  a	
  starting	
  point	
  to	
  investigate	
  
0  The	
  TV	
  also	
  scans	
  the	
  LAN,	
  an	
  attacker	
  can	
  passively	
  exploit	
  vulnerabilities	
  
43
Real	
  World	
  Issues	
  
44
Samsung	
  #1	
  (1)	
  
0  Date:	
  2012	
  
0  Tested	
  device:	
  Samsung	
  SmartTV	
  D6000	
  
0  Affected	
  Service/Protocol:	
  DMRND,	
  an	
  HTTP	
  server	
  listening	
  on	
  ports	
  
52253	
  and	
  52396	
  
0  Vulnerability:	
  Directory	
  Traversal,	
  which	
  allows	
  to	
  download	
  any	
  Xile	
  
available	
  on	
  the	
  device	
  except	
  special	
  Xiles	
  like	
  those	
  in	
  /proc	
  
0  Details:	
  The	
  server	
  has	
  a	
  security	
  check	
  to	
  allow	
  people	
  to	
  download	
  Xiles	
  
having	
  only	
  whitelisted	
  Xile	
  extensions	
  (jpg,	
  png,	
  ..).	
  To	
  bypass	
  the	
  check	
  the	
  
attacker	
  needs	
  to	
  append	
  a	
  NULL	
  byte	
  followed	
  by	
  the	
  whitelisted	
  extension:	
  
0  http://SERVER:52235/../../etc/passwd%00.png	
  
45
Samsung	
  #1	
  (2)	
  
46
0 Download	
  all	
  the	
  
Xilesystems	
  from	
  the	
  
remote	
  TV	
  
0 Download	
  the	
  
Xilesystems	
  related	
  to	
  all	
  
the	
  connected	
  USB	
  
devices	
  
TV	
  controller	
  conXiguration	
  Xile,	
  it	
  
contains	
  the	
  parameters	
  used	
  by	
  the	
  
whitelisted	
  remote	
  controller	
  
ConXiguration	
  Xile	
  used	
  by	
  
the	
  our	
  PC	
  program,	
  we	
  
need	
  only	
  to	
  copy	
  the	
  above	
  
parameters	
  here	
  
Samsung	
  #1	
  (3)	
  
47
These	
  Xields	
  are	
  not	
  part	
  of	
  the	
  Ethernet	
  packets,	
  but	
  are	
  deXined	
  inside	
  the	
  protocol	
  itself	
  so	
  
it’s	
  possible	
  to	
  spoof	
  the	
  IP,	
  MAC	
  address	
  and	
  hostname	
  to	
  allow	
  an	
  attacker	
  in	
  the	
  network	
  to	
  
impersonate	
  the	
  whitelisted	
  TV	
  controller	
  
Samsung	
  #1	
  (4)	
  
48
0  Now	
  we	
  can	
  control	
  the	
  TV	
  
when	
  the	
  victim	
  is	
  not	
  
watching	
  
0  The	
  attacker	
  can	
  install	
  
arbitrary	
  malicious	
  Apps	
  on	
  
the	
  TV	
  using	
  the	
  “develop”	
  
account	
  
Samsung	
  #2	
  (1)	
  
0  Date:	
  2012	
  
0  Tested	
  device:	
  Samsung	
  SmartTV	
  D6000	
  
0  Affected	
  Service/Protocol:	
  DLNA	
  client	
  
0  Vulnerability:	
  Buffer	
  overXlow	
  exploitable	
  as	
  soon	
  as	
  the	
  device	
  tries	
  to	
  
download	
  the	
  icon	
  image	
  associated	
  to	
  a	
  DLNA	
  host	
  
	
  
49
1	
  -­‐	
  NOTIFY	
  UDP	
  Packet	
  –	
  new	
  DLNA	
  host	
  is	
  available	
  
2	
  -­‐	
  Connect	
  to	
  host	
  
3	
  -­‐	
  XML	
  data	
  containing	
  the	
  icon	
  image	
  
Samsung	
  #2	
  (2)	
  
50
1	
  -­‐	
  NOTIFY	
  UDP	
  Packet	
  –	
  new	
  DLNA	
  host	
  is	
  available	
  
NOTIFY * HTTP/1.1
Host: 239.255.255.250:1900
Location: http://192.168.0.3:56923/test.xml
NTS: ssdp:alive
Cache-Control: max-age=1800
Server: UPnP/1.0 DLNADOC/1.50 Platinum/0.6.8.0-bb
USN: uuid:
00000000-0000-0000-0000-000000000000::urn:schemas-upnp-
org:device:MediaServer:1
NT: urn:schemas-upnp-org:device:MediaServer:1
Samsung	
  #2	
  (3)	
  
51
<iconList>
<icon>
<mimetype>image/png</mimetype>
<width>48</width>
<height>48</height>
<depth>32</depth>
<url>/images/
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaa [...]
1	
  -­‐	
  NOTIFY	
  UDP	
  Packet	
  –	
  new	
  DLNA	
  host	
  is	
  available	
  
2	
  -­‐	
  Connect	
  to	
  host	
  
3	
  -­‐	
  XML	
  data	
  containing	
  the	
  icon	
  image	
  
Samsung	
  #3	
  
0  Date:	
  2012	
  
0  Tested	
  device:	
  Samsung	
  SmartTV	
  D6000	
  
0  Vulnerability:	
  Persistent	
  Endless	
  Loop	
  
0  Details:	
  The	
  controller	
  packet	
  contains	
  a	
  string,	
  which	
  is	
  used	
  to	
  identify	
  the	
  
controller	
  itself.	
  A	
  malformed	
  string	
  will	
  trigger	
  an	
  endless	
  loop.	
  The	
  only	
  way	
  to	
  
Xix	
  this	
  issue	
  is	
  to	
  access	
  the	
  device	
  service	
  mode	
  before	
  the	
  reboot.	
  
52
nnnttttHACKED!nnnnn	
  
2	
  –	
  Allow/Deny	
  controller	
  
3	
  –	
  Endless	
  Loop	
  
Philips	
  Miracast	
  (1)	
  
0  Found	
  in	
  2014	
  
0  ALL	
  the	
  Philips	
  TV	
  2013	
  models	
  are	
  affected	
  
0  Silently	
  exploitable	
  probably	
  from	
  Summer	
  2013	
  
0  No	
  PIN	
  
0  No	
  authorization	
  request	
  
0  Hardcoded	
  Xixed	
  password…	
  “Miracast”	
  J	
  
0  Full	
  access	
  to	
  the	
  TV	
  services	
  just	
  like	
  in	
  LAN	
  
0  Exploiting	
  of	
  directory	
  traversal	
  in	
  JointSpace	
  
0  Abuse	
  of	
  the	
  available	
  services	
  
0  Let’s	
  check	
  what	
  we	
  can	
  do…	
  
53
Philips	
  Miracast	
  (2)	
  
0 Controlling	
  the	
  TV	
  from	
  remote	
  
54
Philips	
  Miracast	
  (3)	
  
0 Sending	
  audio	
  and	
  video	
  to	
  the	
  TV…	
  the	
  TV	
  is	
  talking	
  
to	
  you!	
  
55
Philips	
  Miracast	
  (4)	
  
0 Stealing	
  conXiguration	
  Xiles	
  and	
  cookies	
  via	
  a	
  directory	
  
traversal	
  public	
  from	
  September	
  2013	
  but	
  unXixed	
  
56
What’s	
  next?	
  
0 Android	
  will	
  be	
  adopted	
  on	
  the	
  upcoming	
  SmartTV	
  
models:	
  
0  One	
  platform	
  makes	
  exploit	
  development	
  easier	
  
0  Same	
  vulnerable	
  App	
  will	
  be	
  used	
  across	
  different	
  Vendors..	
  
0  Less	
  customized	
  software	
  means	
  less	
  vulnerabilities	
  L	
  
57
Conclusion	
  
0  SmartTV	
  are	
  insecure	
  
0  SmartTV	
  are	
  a	
  perfect	
  target	
  	
  for	
  “monitoring”	
  a	
  speciXic	
  
target:	
  a	
  person	
  or	
  even	
  a	
  company	
  (TVs	
  are	
  everywhere)	
  
0  Exploiting	
  them	
  usually	
  requires	
  to	
  be	
  in	
  the	
  LAN	
  or	
  some	
  
user	
  interaction	
  
0  Currently	
  it’s	
  difXicult	
  to	
  have	
  a	
  vulnerability	
  for	
  owning	
  
many	
  models	
  of	
  TV,	
  so	
  you	
  must	
  focuse	
  on	
  the	
  one	
  of	
  your	
  
target	
  
58
Thanks!	
  
revuln.com	
  
info@revuln.com	
  
twitter.com/revuln	
  
59
?	
  

Contenu connexe

En vedette

22@ Barcelona 2000-2015: Barcelona's innovation district
22@ Barcelona 2000-2015: Barcelona's innovation district22@ Barcelona 2000-2015: Barcelona's innovation district
22@ Barcelona 2000-2015: Barcelona's innovation districtBarcelona Activa
 
el ABC de la Diplomacia publica
el ABC de la Diplomacia publicael ABC de la Diplomacia publica
el ABC de la Diplomacia publicaHugo Guerra
 
Achats des Français en fleurs et plantes au printemps
Achats des Français en fleurs et plantes au printempsAchats des Français en fleurs et plantes au printemps
Achats des Français en fleurs et plantes au printempsVal'hor - En Quête de Vert
 
SearchLove 2016 - WhatsAppening with Chat App Marketing
SearchLove 2016 - WhatsAppening with Chat App MarketingSearchLove 2016 - WhatsAppening with Chat App Marketing
SearchLove 2016 - WhatsAppening with Chat App MarketingJes Scholz
 
Mafalda Autoestima Femenina
Mafalda Autoestima FemeninaMafalda Autoestima Femenina
Mafalda Autoestima FemeninaKarla Poser
 
U.S. secondary markets see record multifamily investment
U.S. secondary markets see record multifamily investmentU.S. secondary markets see record multifamily investment
U.S. secondary markets see record multifamily investmentJLL
 
BEING a change agent
BEING a change agentBEING a change agent
BEING a change agentNHS Horizons
 
WordPress development checklist
WordPress development checklistWordPress development checklist
WordPress development checklistBinh Quan Duc
 
9 tendances du Mobile World Congress 2017 par @hubinstitute
9 tendances du Mobile World Congress 2017 par @hubinstitute 9 tendances du Mobile World Congress 2017 par @hubinstitute
9 tendances du Mobile World Congress 2017 par @hubinstitute HUB INSTITUTE
 
How To Make Display Ads That Work
How To Make Display Ads That WorkHow To Make Display Ads That Work
How To Make Display Ads That WorkPraveen Rajaretnam
 
Vacation inn Group of hotels & resorts in India
Vacation inn Group of hotels & resorts in IndiaVacation inn Group of hotels & resorts in India
Vacation inn Group of hotels & resorts in Indiavacationinn
 
Leadership In Uncertain World
Leadership In Uncertain WorldLeadership In Uncertain World
Leadership In Uncertain WorldFaisal Hoque
 
From Pillar To Promotion: How To Create Killer Content That Drives Growth
From Pillar To Promotion: How To Create Killer Content That Drives GrowthFrom Pillar To Promotion: How To Create Killer Content That Drives Growth
From Pillar To Promotion: How To Create Killer Content That Drives GrowthG3 Communications
 
Zinnov Zones 2016 - Product Engineering Services
Zinnov Zones 2016 - Product Engineering ServicesZinnov Zones 2016 - Product Engineering Services
Zinnov Zones 2016 - Product Engineering ServicesZinnov
 
Quotes to inspire great teamwork
Quotes to inspire great teamwork Quotes to inspire great teamwork
Quotes to inspire great teamwork ProofHub
 

En vedette (20)

22@ Barcelona 2000-2015: Barcelona's innovation district
22@ Barcelona 2000-2015: Barcelona's innovation district22@ Barcelona 2000-2015: Barcelona's innovation district
22@ Barcelona 2000-2015: Barcelona's innovation district
 
Top Content Marketing Formats
Top Content Marketing FormatsTop Content Marketing Formats
Top Content Marketing Formats
 
el ABC de la Diplomacia publica
el ABC de la Diplomacia publicael ABC de la Diplomacia publica
el ABC de la Diplomacia publica
 
Achats des Français en fleurs et plantes au printemps
Achats des Français en fleurs et plantes au printempsAchats des Français en fleurs et plantes au printemps
Achats des Français en fleurs et plantes au printemps
 
SearchLove 2016 - WhatsAppening with Chat App Marketing
SearchLove 2016 - WhatsAppening with Chat App MarketingSearchLove 2016 - WhatsAppening with Chat App Marketing
SearchLove 2016 - WhatsAppening with Chat App Marketing
 
Mapa do Emprego
Mapa do EmpregoMapa do Emprego
Mapa do Emprego
 
2016 Land Markets Survey
2016 Land Markets Survey2016 Land Markets Survey
2016 Land Markets Survey
 
Don't Mind the Gap by Galen Emery
Don't Mind the Gap by Galen EmeryDon't Mind the Gap by Galen Emery
Don't Mind the Gap by Galen Emery
 
Brecha digital de género
Brecha digital de géneroBrecha digital de género
Brecha digital de género
 
Mafalda Autoestima Femenina
Mafalda Autoestima FemeninaMafalda Autoestima Femenina
Mafalda Autoestima Femenina
 
U.S. secondary markets see record multifamily investment
U.S. secondary markets see record multifamily investmentU.S. secondary markets see record multifamily investment
U.S. secondary markets see record multifamily investment
 
BEING a change agent
BEING a change agentBEING a change agent
BEING a change agent
 
WordPress development checklist
WordPress development checklistWordPress development checklist
WordPress development checklist
 
9 tendances du Mobile World Congress 2017 par @hubinstitute
9 tendances du Mobile World Congress 2017 par @hubinstitute 9 tendances du Mobile World Congress 2017 par @hubinstitute
9 tendances du Mobile World Congress 2017 par @hubinstitute
 
How To Make Display Ads That Work
How To Make Display Ads That WorkHow To Make Display Ads That Work
How To Make Display Ads That Work
 
Vacation inn Group of hotels & resorts in India
Vacation inn Group of hotels & resorts in IndiaVacation inn Group of hotels & resorts in India
Vacation inn Group of hotels & resorts in India
 
Leadership In Uncertain World
Leadership In Uncertain WorldLeadership In Uncertain World
Leadership In Uncertain World
 
From Pillar To Promotion: How To Create Killer Content That Drives Growth
From Pillar To Promotion: How To Create Killer Content That Drives GrowthFrom Pillar To Promotion: How To Create Killer Content That Drives Growth
From Pillar To Promotion: How To Create Killer Content That Drives Growth
 
Zinnov Zones 2016 - Product Engineering Services
Zinnov Zones 2016 - Product Engineering ServicesZinnov Zones 2016 - Product Engineering Services
Zinnov Zones 2016 - Product Engineering Services
 
Quotes to inspire great teamwork
Quotes to inspire great teamwork Quotes to inspire great teamwork
Quotes to inspire great teamwork
 

Similaire à Smart TV Insecurity

Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Seungjoo Kim
 
Hacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVHacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVSeungjoo Kim
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?SecuRing
 
Gradual Introduction of Cloud based TV Functions to Legacy Networks
Gradual Introduction of Cloud based TV Functions to Legacy NetworksGradual Introduction of Cloud based TV Functions to Legacy Networks
Gradual Introduction of Cloud based TV Functions to Legacy NetworksErwan Nédellec
 
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 -
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 - IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 -
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 - IBM France Lab
 
Advanced view of atmega microcontroller projects list at mega32 avr
Advanced view of atmega microcontroller projects list   at mega32 avrAdvanced view of atmega microcontroller projects list   at mega32 avr
Advanced view of atmega microcontroller projects list at mega32 avrWiseNaeem
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsFrancois Lefebvre
 
Silicondust Powerpoint 2014
Silicondust Powerpoint 2014Silicondust Powerpoint 2014
Silicondust Powerpoint 2014Brian Henderson
 
Home automation voice control
Home automation voice controlHome automation voice control
Home automation voice controlAhammednayeem
 
robotics for embedded systems.pptx
robotics for embedded systems.pptxrobotics for embedded systems.pptx
robotics for embedded systems.pptxVikasMahor3
 
XBee and RFID
XBee and RFIDXBee and RFID
XBee and RFIDTinker
 
Digitizing your factory the open source way
Digitizing your factory the open source wayDigitizing your factory the open source way
Digitizing your factory the open source wayChristofer Dutz
 
TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS.AI
 

Similaire à Smart TV Insecurity (20)

Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
 
Hacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVHacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TV
 
Matrix
MatrixMatrix
Matrix
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
Gradual Introduction of Cloud based TV Functions to Legacy Networks
Gradual Introduction of Cloud based TV Functions to Legacy NetworksGradual Introduction of Cloud based TV Functions to Legacy Networks
Gradual Introduction of Cloud based TV Functions to Legacy Networks
 
Hisilicon
HisiliconHisilicon
Hisilicon
 
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 -
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 - IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 -
IBM Bluemix Nice Meetup #1 - CEEI NCA - 20160630 -
 
TELE-satellite-1203
TELE-satellite-1203TELE-satellite-1203
TELE-satellite-1203
 
Netgear
NetgearNetgear
Netgear
 
utmippt
utmipptutmippt
utmippt
 
Advanced view of atmega microcontroller projects list at mega32 avr
Advanced view of atmega microcontroller projects list   at mega32 avrAdvanced view of atmega microcontroller projects list   at mega32 avr
Advanced view of atmega microcontroller projects list at mega32 avr
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB Tools
 
Silicondust Powerpoint 2014
Silicondust Powerpoint 2014Silicondust Powerpoint 2014
Silicondust Powerpoint 2014
 
Home automation voice control
Home automation voice controlHome automation voice control
Home automation voice control
 
robotics for embedded systems.pptx
robotics for embedded systems.pptxrobotics for embedded systems.pptx
robotics for embedded systems.pptx
 
XBee and RFID
XBee and RFIDXBee and RFID
XBee and RFID
 
XBee and RFID
XBee and RFIDXBee and RFID
XBee and RFID
 
Digitizing your factory the open source way
Digitizing your factory the open source wayDigitizing your factory the open source way
Digitizing your factory the open source way
 
TRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide DeckTRUSTLESS Pitch Slide Deck
TRUSTLESS Pitch Slide Deck
 
Dreambox caMip
Dreambox caMipDreambox caMip
Dreambox caMip
 

Plus de Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Plus de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Dernier

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Dernier (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

Smart TV Insecurity

  • 1. SmartTV   INSecurity   ReVuln  Ltd.   PhDays  2014  
  • 2. Who?   Donato  Ferrante   @dntbug   Luigi  Auriemma   @luigi_auriemma   2
  • 3. ReVuln?   Consulting   Penetration  Testing   Vulnerability  Research   revuln.com     info@revuln.com     @revuln   3
  • 4. What’s  a  SmartTV?  (1)   4 0 Describes  a  trend  of  integration  of  the  Internet  and   Web  2.0  features  into  television   0 Technological  convergence  between  computers  and   television  sets  and  set-­‐top  boxes   0 SmartTV  =  a  television  with  integrated  Internet   capabilities  that  offers  more  advanced  computing   ability  and  connectivity  than  a  contemporary  TV  
  • 6. 6 Not  all  the  TVs  are  SmartTVs…  
  • 7. 7but  a  lot  of  TVs  are  actually  SmartTVs  
  • 8. 8SmartTVs  at  the  Airport..  
  • 9. 9 And  in  our  hotel  room..   SmartTV  or  not  SmartTV,  that  is  the  problem..  
  • 10. 10 We  checked  the  back   of  the  TV  and  it  was  dark..     So  we  turned  on  a  Blashlight   and..  
  • 11. 11
  • 12. Before  and  After   12 TV   SmartTV   Get  input  signal  then  output   Fully-­‐featured  PC  
  • 13. Why  are  SmartTV  so  popular?   13 2  
  • 14. 1st  Commercial   •  If  you  have  to  choose  between  a  simple  TV  and  a  TV  with   a  lot  of  features,  even  features  that  you  don’t  know  (but   they  sound  cool),  you  will  go  for  the  second  one     14
  • 15. 2nd  Advertising   0 Advertising  =  Money  for  Vendors/Ads  Providers   0 Targeted  advertising  and  other  advanced  advertising   features  such  as  ad  telescoping  using  VOD  and  PVR,   enhanced  TV  for  consumer  call-­‐to-­‐action  and   audience  measurement  solutions  for  ad  campaign   effectiveness   0 Bidirectional  Blow  between  TV  and  Ads  providers   15
  • 16. Advertising  and  Security   16 0 This  bidirectional  Xlow  between  TV  and  Ads  provider,   has  2  main  consequences:   0  Privacy,  the  viewer  is  disclosing  personal  habits   0  Security,  a  man-­‐in-­‐the-­‐middle  attack  can  be  pretty   effective  to  achieve  one  of  the  following  goals:   0 Ads-­‐Hijacking  =>  To  inXluence  the  viewer   0 Vulnerability  Exploitation  =>  To  get  access  to  the  TV  
  • 17. Why  SmartTV  as  Target?     0 Used  worldwide   0 Huge  attack  surface   0 And..   17
  • 18. TV  can  see  you..   18
  • 19. TV  can  hear  you..   19
  • 20. 1984   20   0 An  attacker  able  to  gain  access  to  your   SmartTV  can:   0  Get  access  to  your  Home  privacy     0  Get  access  to  your  Company  meeting  room   0  And  more..  
  • 21. The  Problem  (1):  Insecurity     0 SmartTV  are  insecure!   21
  • 22. The  Problem  (2):  Bad  &  Obscure     0 They  rely  on  bad  coding  practice  and..   0 They  usually  rely  on  security  by  obscurity  (sigh)   22
  • 23. The  Problem  (3):  Server  &  Client     0  Affected  both  by  Server-­‐side  issues..   0  There  are  several  services  running  and  listening  for  incoming   connections  (by  default)     0  And  Client-­‐side  issues   0  Any  of  the  Apps  installed  by  default  can  represent  a  possible  attack   vector  against  the  device  itself   23
  • 24. The  Problem  (4):  Updates     0  A  lot  of  software  installed  on  the  TV..   0  Have  you  ever  updated  your  TV?   0  How  security  Bix  are  pushed  on  your  TV  by  the  Vendor?   0  Are  you  running  the  latest  release  of  the  web  browser?   24
  • 25. Nice..   But  now  tell  us  how  to  get  a  $hell!   25
  • 26. Things  to  know..  (1)   0 A  SmartTV  is  an  expensive  hardware  device   0  Usually  >  1000  Euro  (47.000  RUB)   0 You  might  “brick”  the  TV  (no  longer  works)   0 Big  hardware  and  software  differences  between  the   TV  models,  even  those  of  the  same  vendor   0 Multiple  names  for  the  same  features  (i.e.  HDMI-­‐CEC*)   26 *  http://en.wikipedia.org/wiki/HDMI#CEC  
  • 27. Things  to  know..  (2)   0  SmartTV  are  usually  based  on  Linux   0  Using  MIPS  and  ARM  CPU   0  Having  a  number  of  different  embedded  stuff  including:  WiFi,   USB,  Camera,  Microphone,  sensors,  etc   0  Running  a  wide  range  of  proprietary  and  customized  software,   with  crazy  conXigurations   0  Black-­‐box  testing  means  wasting  lot  of  time  to  get  information,   having  few  control  over  the  TV  and  limited  debugging   27
  • 28. How  to  get  the  Software?  (1)   0  SmartTV  vendors  (like  Samsung  and  LG)  usually  release  emulators   and/or  SDK  for  developers  willing  to  create  new  Apps  for  the  TV   0  The  idea  of  using  the  emulators  on  the  PC  to  Xind  issues  affecting  the   TV  might  sound  interesting   0  The  problem  is  that  the  emulator  doesn’t  usually  match  the  software   running  on  the  real  TV   0  For  example  if  you  Xind  10  issues  in  the  emulator,  probably  only  1  or   2  will  work  on  the  TV  and  bugs  affecting  the  TV  may  not  work  on  the   emulators   0  But  emulators  are  good  to  have  an  idea  of  some  protocols  and  how   the  code  works   28
  • 29. How  to  get  the  Software?  (2)   0  Via  Xirmware  updates   0  Don’t  need  to  access  the  TV   0  Thousands  of  updates  available  for  free  on  the  Vendors   websites   0  Usually  encrypted  with  an  encryption  key  deXined  on  a  TV/ model  base.  i.e.:  2  different  models  of  the  same  vendor  will   have  2  different  keys   0  Require  some  reverse  engineering  work  to  extract  the  content   29
  • 30. How  to  get  the  Software?  (3)   0  Via  directory  traversal     0 Needs  a  vulnerability   0 If  you  can  access  /proc  you  have  lot  of  information   0 If  you  can  access  /dev  you  can  download  all  the  Xilesystems     0 Otherwise  you  have  to  guess  Xile/directory  names  by  using   some  techniques   30
  • 31. How  to  get  the  Software?  (4)   0  Via  code  execution   0  Needs  a  vulnerability   0  Full  access  to  Xiles,  directory  and  attached  devices!   0  Execute  whatever  commands  you  want  :]   0  Bye  Bye  TV  Caveat:  You  might  brick  the  TV!!!   31
  • 32. How  to  get  the  Software?  (5)   0  Via  JTAG  or  NAND/SD  physical  reading     0  Hardware  solution,  you  must  open  the  TV  and  playing  with  its   content…  bye  bye  warranty   0  Not  always  available  or  easy  to  access   0  It  might  cause  some  trouble  to  the  device   0  A  lot  of  effort  and  only  for  skilled  people   32
  • 34. Debug:  Serial  Cable   34 Samsung   LG   Philips  
  • 35. Attack  Surface   0  As  you  might  have  guessed  there  are  a  lot  of  different  ways   to  attack  a  SmartTV   0  To  get  a  better  understanding  let’s  take  a  look  at  a  real   world  device   0  We  will  just  focus  on  a  subset  of  the  device  attack  surface   0  To  do  that  we  take  in  consideration  the  following  schema   related  to  a  Philips  SmartTV…   35
  • 36. Attack  Surface  example   from  Philips  manual   36
  • 37. Attack  Surface  -­‐  USB   37 USB   Malicious  USB  stick  containing   malformed  data  i.e.:   •  Video  and  Audio  codecs   •  Filesystem   •  USB  stack   •  Auto  executed  Xiles  
  • 38. Attack  Surface  -­‐  HDMI   38 HDMI   Communication  protocols:   •  CEC   •  HEC*   for  device  interoperability     Rogue  hardware  via   Ethernet  connection  (HEC)   *HEC  is  not  that  popular,  not  clear  how  many  devices  are  using  this  standard..  
  • 39. Attack  Surface  -­‐  DVB   39 DVB   Radio  signal  to  the  TV     DVB  !=  Analog     It’s  a  protocol,  which  allows   using  different  codecs  to  decode   the  video/audio  streams     Different  standards:   •  DVB-­‐T  (terrestrial)   •  DVB-­‐C  (cable)   •  DVB-­‐S  (satellite)   Homemade  DVB  transmitter  
  • 40. Wait!  Before  we  forget..   0 The  DVB  audio/video  streams  are  a  possible  fuzzing   target:   0  HEVC,  H.262,  H.264,  AVS,  MP2,  MP3,  AC-­‐3,  AAC,  HE-­‐AAC     0 But  the  embedded  interactive  content  is  the  best  way   to  attack  the  TV:   0  HbbTV   0  CE-­‐HTML   0  MHEG   40
  • 41. Attack  Surface  -­‐  WiFi   41 WiFi   WiFi  adapter  of  the  TV  acting  as   access-­‐point  listening  for  WiFi   connections.     The  Miracast  protocol   is  composed  by  out-­‐of-­‐band   WiFi  packets,  protocols   and  codecs   A  vulnerability  in   Miracast  allows  the   attacker  to  access   the  TV  from   outside  your  house  
  • 42. Attack  Surface  -­‐  Apps   42 Apps   Vulnerabilities  affecting  Apps  on   the  TV:   •  Skype   •  Web  browser   •  Malicious  Apps    
  • 43. Attack  Surface  -­‐  LAN   0  Most  of  the  SmartTV  issues  are  related  to  services  exposed  via  LAN:   0  UPNP   0  Video/Audio  service  (like  DirectFB)   0  Various  HTTP/HTTPS  servers   0  Network  remote  controller   0  Media  sharing   0  Status  and  information   0  First  thing  to  try  on  your  SmartTV  is  using  NMAP:   0  You  will  see  a  number  of  different  TCP  and  UDP  ports  open   0  Some  of  them  awaiting  for  you  to  connect  :]   0  If  you  try  to  send  some  junk  data  to  these  ports  you  might  get  some  easy  way  to   crash/reboot  the  TV,  a  starting  point  to  investigate   0  The  TV  also  scans  the  LAN,  an  attacker  can  passively  exploit  vulnerabilities   43
  • 45. Samsung  #1  (1)   0  Date:  2012   0  Tested  device:  Samsung  SmartTV  D6000   0  Affected  Service/Protocol:  DMRND,  an  HTTP  server  listening  on  ports   52253  and  52396   0  Vulnerability:  Directory  Traversal,  which  allows  to  download  any  Xile   available  on  the  device  except  special  Xiles  like  those  in  /proc   0  Details:  The  server  has  a  security  check  to  allow  people  to  download  Xiles   having  only  whitelisted  Xile  extensions  (jpg,  png,  ..).  To  bypass  the  check  the   attacker  needs  to  append  a  NULL  byte  followed  by  the  whitelisted  extension:   0  http://SERVER:52235/../../etc/passwd%00.png   45
  • 46. Samsung  #1  (2)   46 0 Download  all  the   Xilesystems  from  the   remote  TV   0 Download  the   Xilesystems  related  to  all   the  connected  USB   devices  
  • 47. TV  controller  conXiguration  Xile,  it   contains  the  parameters  used  by  the   whitelisted  remote  controller   ConXiguration  Xile  used  by   the  our  PC  program,  we   need  only  to  copy  the  above   parameters  here   Samsung  #1  (3)   47 These  Xields  are  not  part  of  the  Ethernet  packets,  but  are  deXined  inside  the  protocol  itself  so   it’s  possible  to  spoof  the  IP,  MAC  address  and  hostname  to  allow  an  attacker  in  the  network  to   impersonate  the  whitelisted  TV  controller  
  • 48. Samsung  #1  (4)   48 0  Now  we  can  control  the  TV   when  the  victim  is  not   watching   0  The  attacker  can  install   arbitrary  malicious  Apps  on   the  TV  using  the  “develop”   account  
  • 49. Samsung  #2  (1)   0  Date:  2012   0  Tested  device:  Samsung  SmartTV  D6000   0  Affected  Service/Protocol:  DLNA  client   0  Vulnerability:  Buffer  overXlow  exploitable  as  soon  as  the  device  tries  to   download  the  icon  image  associated  to  a  DLNA  host     49 1  -­‐  NOTIFY  UDP  Packet  –  new  DLNA  host  is  available   2  -­‐  Connect  to  host   3  -­‐  XML  data  containing  the  icon  image  
  • 50. Samsung  #2  (2)   50 1  -­‐  NOTIFY  UDP  Packet  –  new  DLNA  host  is  available   NOTIFY * HTTP/1.1 Host: 239.255.255.250:1900 Location: http://192.168.0.3:56923/test.xml NTS: ssdp:alive Cache-Control: max-age=1800 Server: UPnP/1.0 DLNADOC/1.50 Platinum/0.6.8.0-bb USN: uuid: 00000000-0000-0000-0000-000000000000::urn:schemas-upnp- org:device:MediaServer:1 NT: urn:schemas-upnp-org:device:MediaServer:1
  • 51. Samsung  #2  (3)   51 <iconList> <icon> <mimetype>image/png</mimetype> <width>48</width> <height>48</height> <depth>32</depth> <url>/images/ aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaa [...] 1  -­‐  NOTIFY  UDP  Packet  –  new  DLNA  host  is  available   2  -­‐  Connect  to  host   3  -­‐  XML  data  containing  the  icon  image  
  • 52. Samsung  #3   0  Date:  2012   0  Tested  device:  Samsung  SmartTV  D6000   0  Vulnerability:  Persistent  Endless  Loop   0  Details:  The  controller  packet  contains  a  string,  which  is  used  to  identify  the   controller  itself.  A  malformed  string  will  trigger  an  endless  loop.  The  only  way  to   Xix  this  issue  is  to  access  the  device  service  mode  before  the  reboot.   52 nnnttttHACKED!nnnnn   2  –  Allow/Deny  controller   3  –  Endless  Loop  
  • 53. Philips  Miracast  (1)   0  Found  in  2014   0  ALL  the  Philips  TV  2013  models  are  affected   0  Silently  exploitable  probably  from  Summer  2013   0  No  PIN   0  No  authorization  request   0  Hardcoded  Xixed  password…  “Miracast”  J   0  Full  access  to  the  TV  services  just  like  in  LAN   0  Exploiting  of  directory  traversal  in  JointSpace   0  Abuse  of  the  available  services   0  Let’s  check  what  we  can  do…   53
  • 54. Philips  Miracast  (2)   0 Controlling  the  TV  from  remote   54
  • 55. Philips  Miracast  (3)   0 Sending  audio  and  video  to  the  TV…  the  TV  is  talking   to  you!   55
  • 56. Philips  Miracast  (4)   0 Stealing  conXiguration  Xiles  and  cookies  via  a  directory   traversal  public  from  September  2013  but  unXixed   56
  • 57. What’s  next?   0 Android  will  be  adopted  on  the  upcoming  SmartTV   models:   0  One  platform  makes  exploit  development  easier   0  Same  vulnerable  App  will  be  used  across  different  Vendors..   0  Less  customized  software  means  less  vulnerabilities  L   57
  • 58. Conclusion   0  SmartTV  are  insecure   0  SmartTV  are  a  perfect  target    for  “monitoring”  a  speciXic   target:  a  person  or  even  a  company  (TVs  are  everywhere)   0  Exploiting  them  usually  requires  to  be  in  the  LAN  or  some   user  interaction   0  Currently  it’s  difXicult  to  have  a  vulnerability  for  owning   many  models  of  TV,  so  you  must  focuse  on  the  one  of  your   target   58
  • 59. Thanks!   revuln.com   info@revuln.com   twitter.com/revuln   59 ?