Главная
Study mode:
on
1
Intro
2
Supra iBox
3
ekey Android app
4
Programmed auth flow
5
Must access firmware
6
Physical access
7
Board photos
8
Internals
9
Reverse-engineering steps
10
MSP430 firmware extraction
11
BSL Overview
12
Existing BSL attacks
13
Voltage glitching attack
14
Results of voltage glitching
15
BSL timing attack
16
Timing attack problems
17
Timing attack game plan
18
Timing attack results
19
Modified attack results
20
Timing attack conclusions
21
MSP430 JTAG security
22
MSP430 1/2/4xx fuse
23
"Paparazzi" attack: Why?
24
MSP430 firmware reversing
25
IrDA
26
Firmware reversing finds
27
Supra crypto architecture
28
Syscode Key
29
Third authentication mode
30
Brute Force
31
Hardware backdoor
32
Flash write terase attack
33
Conclusions/solutions
Description:
Explore reverse engineering and exploitation techniques for hardened embedded devices through a detailed examination of the Supra iBox BT, a bluetooth and IR-based physical key storage device used by real estate professionals. Delve into the challenges of extracting firmware from an MSP430 microcontroller with a blown JTAG fuse, and learn about various attack methods, including voltage glitching and timing attacks. Discover the complex crypto key management scheme employed by Supra and understand how it handles synchronization without direct internet access. Gain insights into the internals of the iBox firmware, including an exploit demonstration that can open any iBox. Examine the physical access required, board layout, and internal components of the device. Follow the step-by-step reverse-engineering process, from initial analysis to successful firmware extraction. Investigate the Bootstrap Loader (BSL) overview, existing attacks, and their limitations. Learn about MSP430 JTAG security measures and the "Paparazzi" attack. Uncover findings from firmware reversing, including the IrDA protocol implementation and Supra's crypto architecture. Explore various authentication modes, brute force attempts, and potential hardware backdoors. Conclude with an analysis of flash write/erase attacks and discuss potential solutions for improving embedded device security. Read more

Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device

Black Hat
Add to list
0:00 / 0:00