hardware security multidimensional ... - hack in the box - a... · •hardware attack and defense...

36
/B.D(>,#3T&.%(>!?T;A)b.4bF'$+018-C(>+*&E@=P29.4D75E@T<"a Hardware security multidimensional attack and defense tool set Jie Fu Kunzhe Chai Mingchuang Qin From—360 Hacker Research Institute, 360 Security Technology

Upload: others

Post on 27-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Hardware security multidimensional attack and defense tool set

Jie FuKunzhe ChaiMingchuang QinFrom—360 Hacker Research Institute, 360 Security Technology

Page 2: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Abstract

• Hardware attack and defense tools.

• Master and implement a variety of hardware attack methods.

• Includes ultrasonic attacks, RFID attacks, power side channel attacks,

and radio defense etc.

• Design idea, design concept

Page 3: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

High frequency card reader and high frequency simulator

• ChameleonMini

• proxmark3

• HackNFC — designed by 360 Unicornteam

Page 4: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Page 5: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

HACKNFC

• Man in the NFC• Chip — PN7462• Protocol—14443A• NRF24L01

������������

Page 6: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Open source

• Arduino programming design• Simple,Practical

• Github : • Each function module will be made into Arduino library functions

Page 7: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

ChameleonMini — how to emulate a mifare card

Page 8: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

ChameleonMini

• Arduino programming design• Simple,Practical

• Github : • Each function module will be made into Arduino library functions

Page 9: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Why there is an error in the original SCH?

• Parameter adjustment

• Hardware Bug?

• The values in yellow are wrong

Page 10: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to design a NFC hack tool ?

• How to get a long distance

• How to design more concealed

• What features do you want

Page 11: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Page 12: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to achieve a long reading distance?

• PN532

• Demodulation circuit

Page 13: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to achieve a long reading distance?

• MFRC522

• Demodulation circuit

Page 14: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to achieve a long reading distance?

• Chip — CLRC663

• General method

• Current monitoring

Page 15: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to achieve a long reading distance?

• Current monitoring : 70mA - 100mA

Page 16: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to achieve a long reading distance?

• Chip — CLRC663

• General method

• Current monitoring

• Optimize parameters

Page 17: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

• Remain L0, C0; Change C1, C2

• Antenna value 1uH - 2uH

How to achieve a long reading distance?

Page 18: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Simple Arduino Reader

Page 19: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

How to make the tool by yourself ?

• Electronic circuit design software ——EAGLE , Alitum Designer

Page 20: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

NFC defender and 125Khz defender

• How to block NFC communication

Page 21: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Page 22: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

NFC defender and 125KHz defender• Detect and protect

Page 23: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

NFC defender and 125KHz defender• Detect and protect

Page 24: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

NFC defender and 125KHz defender• Detect and protect

Page 25: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultrasound attacks smart hardware

• What could voice do?

Page 26: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultrasound attacks smart hardware

• An electronic device with adjustable frequency

of sound wave

Page 27: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultrasound attacks smart hardware

• An electronic device with adjustable frequency

of sound wave

• Physical resonance

• Be patient — Looking for the frequency of resonance

Page 28: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultrasound attacks smart hardware

• Microprocessor control

• Simplified —No Amplifier

• Speaker — Characteristic

Page 29: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Hardware Power glitch attack

• Power fluctuation

• Clock disorder, program to run error

• Program bypass, decryption

Page 30: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Hardware Power glitch attack

• Power fluctuation

• Clock disorder, program to run error

• Program bypass, decryption

Page 31: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultra strong electromagnetic field circuit system breaker

• To attack a circuit system, such as an access control system, and open the

Page 32: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultra strong electromagnetic field circuit system breaker

• To attack a circuit system, such as an access control system, and open the

Page 33: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultra strong electromagnetic field circuit system breaker

Page 34: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Ultra strong electromagnetic field circuit system breaker

• How to make artificial lightning?

Page 35: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Make amazing artificial lightning

Page 36: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes

T T b. b P . T a

Hacker Research Institute

Thanks! && Any questions?

[email protected]