SlideShare uma empresa Scribd logo
1 de 29
Security Issues with Hybrid
Broadcast Broadband TV
(HbbTV)

Watching TV suddenly is fun again!
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Who am I
•
•
•
•
•

Martin Herfurt
Security Consultant working with n.runs
Co-founder of trifinite.org
Bluetooth security expert
@mherfurt

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
SmartTV Security Overview
• December 2012: ReVuln - USB/Local attacks
on SAMSUNG Smart TV
• March 2013: CanSecWest – Smart TV
Security (great talk, but excluding HbbTV
stuff) (SeungJin Lee, Seungjoo Kim)
• May 2013: (TU Darmstadt) HbbTV Privacy
issues (Marco Ghiglieri, Florian Oswald, Erik
Tews)
• June 2013: Security Issues with HbbTV
• August 2013: Attacking Smart TVs via apps
(Aaron Grattafiori, Josh Yavor)
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
HbbTV Background
•
•
•
•

Pan-European effort
HbbTV = H4TV(fr) + HTML Profil(de)
ETSI TS 102796 (published in June 2010)
Adopts existing specifications
– HTML-CE (Web for Consumer Electronics)
– OIPF (Open IPTV Forum)

• Goal is to combine broadcast content
with online content
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
DVB Stream

Plain Old DVB

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Augmented
DVB Stream

Hybrid Broadband Broadcast TV

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
The Red Button

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
SevenOne Media

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
What you think you see

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
What you are really seeing

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
How is the Red Button displayed?
•
•
•
•

TV has a DAE (Browser)
Content from URL within DVB-Stream
Overlay on actual TV image
Mostly transparent web page

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Data Collection
• Extraction of channel list
• Transparent proxy setup
• Script for switching channels via IP

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Stations with HbbTV on Astra
19.2E

List was generated on 9th of may 2013 with no CI-modules except HD+ in use (e.g. no SKY)
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Subset of Stations using
Google Analytics

RTL2 uses a service called etracker.com
Sometimes mechanisms for periodical tracking in use (transparent page refresh)
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Possible Injection Vectors

!
Augmented
DVB Stream

!
!
!

© 2013, n.runs professionals GmbH – Security Research Team

!
Martin Herfurt
What Would Dr. Evil Do?

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Watering Hole Attacks –
sometimes very likely
Apache/1.3.27 (Unix) (Red-Hat/Linux)
mod_ssl/2.8.12 OpenSSL/0.9.6b DAV/1.0.3
PHP/4.1.2 mod_perl/1.26
mod_gzip/1.3.26.1a

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Content Injection

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Rogue Video Display

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Spoofing News Tickers

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Attacks on DNS

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Possilbe Attacks (Javascript)
• OIPF Objects
– contain device specific (and maybe personal)
information (see Open IPTV Forum standard) like
channel lists etc. – not everything from standard
is implemented

• HTML/JavaScript
– time-based scan of home networks
– transmit information to arbitrary inet location
– You name it!

• Recycle known malicious javascript code!
– Google Dorks
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Countermeasures

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Unplug SmartTV

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Use a Firewall

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Block Domain Name Service

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
HAL – To Serve & Protect

© 2013, n.runs professionals GmbH – Security Research Team

Martin Herfurt
Thank You!
Find more on:

© 2013, n.runs professionals GmbH – Security Research Team

blog.nruns.com

Martin Herfurt

Mais conteúdo relacionado

Semelhante a ciso-platform-annual-summit-2013-Attacks on smart tv

Converging CAS and DRM, David Bouteruche from Nagra
Converging CAS and DRM, David Bouteruche from NagraConverging CAS and DRM, David Bouteruche from Nagra
Converging CAS and DRM, David Bouteruche from Nagra
Justindwah
 
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Burton Lee
 
Keynote - Introducing the Digital Home Working Group - G Stone
Keynote - Introducing the Digital Home Working Group - G StoneKeynote - Introducing the Digital Home Working Group - G Stone
Keynote - Introducing the Digital Home Working Group - G Stone
mfrancis
 
Asoreco presentatie werfmonitor_v12
Asoreco presentatie werfmonitor_v12Asoreco presentatie werfmonitor_v12
Asoreco presentatie werfmonitor_v12
Kristof Geilenkotten
 

Semelhante a ciso-platform-annual-summit-2013-Attacks on smart tv (20)

Splunk Webinar: Splunk App for Palo Alto Networks
Splunk Webinar: Splunk App for Palo Alto NetworksSplunk Webinar: Splunk App for Palo Alto Networks
Splunk Webinar: Splunk App for Palo Alto Networks
 
Converging CAS and DRM, David Bouteruche from Nagra
Converging CAS and DRM, David Bouteruche from NagraConverging CAS and DRM, David Bouteruche from Nagra
Converging CAS and DRM, David Bouteruche from Nagra
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
 
Get to know infoSec - EEESE2014 presentation - Duko Team
Get to know infoSec - EEESE2014  presentation - Duko TeamGet to know infoSec - EEESE2014  presentation - Duko Team
Get to know infoSec - EEESE2014 presentation - Duko Team
 
20100115 Critical Links Edge Box Product Presentation
20100115 Critical Links    Edge Box Product Presentation20100115 Critical Links    Edge Box Product Presentation
20100115 Critical Links Edge Box Product Presentation
 
IMA/Thales EchoVoice (VOIP) for OpenSimulator Presentation at OSCC19
IMA/Thales EchoVoice (VOIP) for OpenSimulator Presentation at OSCC19IMA/Thales EchoVoice (VOIP) for OpenSimulator Presentation at OSCC19
IMA/Thales EchoVoice (VOIP) for OpenSimulator Presentation at OSCC19
 
Keynote - Introducing the Digital Home Working Group - G Stone
Keynote - Introducing the Digital Home Working Group - G StoneKeynote - Introducing the Digital Home Working Group - G Stone
Keynote - Introducing the Digital Home Working Group - G Stone
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
4 stars
4 stars4 stars
4 stars
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Android Application Development Basic
Android Application Development BasicAndroid Application Development Basic
Android Application Development Basic
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Far South Networks Vision
Far South Networks VisionFar South Networks Vision
Far South Networks Vision
 
Asoreco presentatie werfmonitor_v12
Asoreco presentatie werfmonitor_v12Asoreco presentatie werfmonitor_v12
Asoreco presentatie werfmonitor_v12
 
Internet of things basics
Internet of things basicsInternet of things basics
Internet of things basics
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Daniel Glueck - How Bosch develops for IBM Connections
Daniel Glueck - How Bosch develops for IBM ConnectionsDaniel Glueck - How Bosch develops for IBM Connections
Daniel Glueck - How Bosch develops for IBM Connections
 

Mais de Priyanka Aash

Mais de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

ciso-platform-annual-summit-2013-Attacks on smart tv

  • 1. Security Issues with Hybrid Broadcast Broadband TV (HbbTV) Watching TV suddenly is fun again! © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 2. Who am I • • • • • Martin Herfurt Security Consultant working with n.runs Co-founder of trifinite.org Bluetooth security expert @mherfurt © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 3. SmartTV Security Overview • December 2012: ReVuln - USB/Local attacks on SAMSUNG Smart TV • March 2013: CanSecWest – Smart TV Security (great talk, but excluding HbbTV stuff) (SeungJin Lee, Seungjoo Kim) • May 2013: (TU Darmstadt) HbbTV Privacy issues (Marco Ghiglieri, Florian Oswald, Erik Tews) • June 2013: Security Issues with HbbTV • August 2013: Attacking Smart TVs via apps (Aaron Grattafiori, Josh Yavor) © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 4. HbbTV Background • • • • Pan-European effort HbbTV = H4TV(fr) + HTML Profil(de) ETSI TS 102796 (published in June 2010) Adopts existing specifications – HTML-CE (Web for Consumer Electronics) – OIPF (Open IPTV Forum) • Goal is to combine broadcast content with online content © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 5. DVB Stream Plain Old DVB © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 6. Augmented DVB Stream Hybrid Broadband Broadcast TV © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 7. The Red Button © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 8. SevenOne Media © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 9. What you think you see © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 10. What you are really seeing © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 11. How is the Red Button displayed? • • • • TV has a DAE (Browser) Content from URL within DVB-Stream Overlay on actual TV image Mostly transparent web page © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 12. Data Collection • Extraction of channel list • Transparent proxy setup • Script for switching channels via IP © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 13. Stations with HbbTV on Astra 19.2E List was generated on 9th of may 2013 with no CI-modules except HD+ in use (e.g. no SKY) © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 14. Subset of Stations using Google Analytics RTL2 uses a service called etracker.com Sometimes mechanisms for periodical tracking in use (transparent page refresh) © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 15. Possible Injection Vectors ! Augmented DVB Stream ! ! ! © 2013, n.runs professionals GmbH – Security Research Team ! Martin Herfurt
  • 16. What Would Dr. Evil Do? © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 17. Watering Hole Attacks – sometimes very likely Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_ssl/2.8.12 OpenSSL/0.9.6b DAV/1.0.3 PHP/4.1.2 mod_perl/1.26 mod_gzip/1.3.26.1a © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 18. Content Injection © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 19. Rogue Video Display © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 20. Spoofing News Tickers © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 21. Attacks on DNS © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 22. Possilbe Attacks (Javascript) • OIPF Objects – contain device specific (and maybe personal) information (see Open IPTV Forum standard) like channel lists etc. – not everything from standard is implemented • HTML/JavaScript – time-based scan of home networks – transmit information to arbitrary inet location – You name it! • Recycle known malicious javascript code! – Google Dorks © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 23. © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 24. Countermeasures © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 25. Unplug SmartTV © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 26. Use a Firewall © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 27. Block Domain Name Service © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 28. HAL – To Serve & Protect © 2013, n.runs professionals GmbH – Security Research Team Martin Herfurt
  • 29. Thank You! Find more on: © 2013, n.runs professionals GmbH – Security Research Team blog.nruns.com Martin Herfurt