SlideShare uma empresa Scribd logo
1 de 31
A Tale of a Rogue Router
Firmware
</Authors>
➔
Bijay Limbu Senihang
(CEH/CISSP)
➔
Co-Founder/Information
Security Consultant of
Entrust Solutions Nepal
➔
Trainer/Lecturer
➔
Loyal Husband
➔
Nabin KC
➔
Pentester/Security
Researcher at Entrust
Solutions Nepal
➔
CVE-2014-8496
➔
Loyal Single
Once Upon a Time...
In Parallel Universe...
Real Attack Scenario
Demo
Hacking a PC behind NAT in 4 minutes ..
Insecure Scenario
The Story of a Discovery...
Its All about Super
Backdoor Demo( no more
admin:admin )
This is not the End...
● More Than 10 Major Vendor Used Same
Firmware(*****)
This is not the End...
 Digicom
 DAPR 150RN
 DAPR 300RN
 Alpha Network
 AIP-W525H
 AWAP806N
 Pro-Link
 PRN3001
 WNR1008
 Planet Networks
 WNRT-300G
 TrendNet
 TEW-638APB
 TEW-639GR
 TWE-736RE
 Realtek
 RTL8181
 RTL8186
 RTL8186P
 Bless
 Zio-3300N
 Zio-4400N
 Zio-3200N
 Zio-3300N
 SmartGate
 SG3300N
 SG3100N
 Blue Link
 BL-R30G
This is not the End...
➢ Case of Copyright Infringement
This is not the End...
➢ Copyright Infringement (Contd..)
This is not the End...
➢ Copyright Infringement (Contd..)
Are they just Copyright
Infringement or really a Rogue?
Lets clear the confusion
● Tried to upload their vendor firmware
A Rouge Router Firmware ;-)
2ook Online Devices+(Unknown number
Offline) Affected Worldwide(approximately)
How it can be used?
 Botnet (used for DdoS attack, APT Attack )
 Personal proxy network aka My personal TOR
 Free Wi-fi Map (I am not Mark Zuckerburg but can help
to make a free Internet world)
Who is Responsible?
➔ Vendor
➔ Government
➔ Consumer
Your Last Defense!!
Your Last Defense!!(Contd..)
 Firewall aka watch guard
Your Last Defense!!(Contd..)
● Anti-virus aka body guard
Your Last Defense!!(Contd..)
● Anti-virus aka body guard
Your Last Defense!!(Contd..)
 User
Moral of the Story
Moral of the Story
● Know your Devices and Vendor
● Creating a hard time for an attacker is a win win
situation. Use as much defense you can.
● A best way to be protect home router is to disable the
Remote Management if you don't need.
● Try Open Source firmware if your device supports(eg.
OpenWrt)
P.S. No router were harm or used for illegal purpose during our research
Responsible Disclosure
Router Vendors have been informed about
this issue. Only TREDNET has replied till
now.
Contact Us
www.ensolnepal.com
Email: info@ensolnepal.com
@bhutabe
@n_cnew
Find presentation here: blog.ensolnepal.com

Mais conteúdo relacionado

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

A tale of rough firmware #router #backdoor

Notas do Editor

  1. This presentation revolves around the story of the user router and Internet
  2. Lets begin our story. This is a story between a router and user in the internet world. In this story, the need of user I.e to communicate with the world has been fulfilled by the router. And both are happy together to be a part of Internet There was a time when 1000 rupee had to pay just to use 1 hour interent story had change intert user had increase , number router ap device had increase , the home router sales had increse There more then 5 router in a house ,per flat ,some even had router and internt per room but with it ,there explotaion and vurnablity have increase but sad part is our tolarnet after being attack alsolevel had incread with it .
  3. But in the parallel universe, there is ongoing war between Red Team and Black team. One try to protect is then other try to break , Yesteray Previosuly one of the speaker told that bad guy don&amp;apos;t sleep that may be true as don&amp;apos;t sleep when we do more then enough ...that the best time to attack different security issues had been identified in home router and here nobody seems to be concerned about this issues. CV-2014-8496 is a session hijacking bug to take control over it with score 10/10 but what I seen is most of don&amp;apos;t care The problem of using default credential is already there.
  4. Let me introduce to a real world scnerio of the user attacker and how it is done fist Our pc phone laptop are behind the router while using inernet ,let say you device is online with deflaut credition I mean ,you havenot chage the default passowrd , which in most of the case is admin admin then attacker will login to you router and change the dns to hisperoson dns server . Dns it is a just a advisor which will show you the way to the destation , what really happen is that hacker now have the control over you path . At compare with a metro train which most of had problally travel a lot ,what really happen is that when I change dns mens now I will the one who will be decide where your train goes though it will be showing you the same location address. This means you decide to go to pokhara I can drop you at the dharn saying it is pokhara I know we wiill soon figure it out but what if a unkown person is drop he won&amp;apos;t figure out until its too late , that case happen here in interent world I can know point book.com when you are type facebook.com I know no one will be happy about that . This can be exploit in many way like phising , But here I will show you the worse case .
  5. Most of the time our PC are behind the router with the private ip address not as the server So directly a pc can be attack unless victim click some malware , but what in the care user try to update there software to be secured , It is good habit to frequently update you applications OS l right ets see
  6. Leak you infor u Use ur credital and hire a unploayment gury to chash out money as yestardy,can send mail in you behalf can sealt you documant and idently ,
  7. The poor router has been hacked and also the devices connected to the router were compromised. And now the user is concerned about his router security and changes his default username and password. Recently a group called Lizard squard used a DdoS attack against Sony which was possible due to botnets. And those botnets was created hacking router, the similar way that we demonstrated earlier.
  8. It was the regular day in my office I was using internet doing some offiice work as well research router started to be frequently down , and not resplonding ,lets say frequently botellnet occurred , later dig in the cause of it and found that my other frinend was using namp script for this research Now I need to find solution to solve as I cannot tell not to use namp right , Not possible to tell to drop the soldier gun when you are fighting the war. What are the ither options I do have Then I stared digging for solution and was with some Options wihich are avilabe to try , one was to upgarde the firmware other is to upload some opensource it suppor.t . no did work for me nither vedor have new firmware nor opensource community have a compative firmware for it . So I did had third options is the customized the firmware for the soultion , so I stared reverse engeering the firemware start reading the code , there bad luck or I found somehting in intresting which I had heard in daily news ,it was a backoor
  9. Not a supreman banakphone number But as powerfula as him credentilas It was a hardcoded backdoor super super Really I verfied and it worked , Now let me ask you one things who somebody have wirte this code is really his fault Or it was the fault of a guy who forget to put sticker of Super super along with admin admin as the default one, I guess
  10. After getting the info about the backdoor, we did more research. During our research, We tried to find the similar security issues in other model. In order to find that issue, we did inspection of router header and used that info in shodan search to find the similar model. And surprisingly what we found was that the same issue is presented in the router of other vendors too.
  11. These are the list of affected router models.
  12. If you are asking did I did any photograph as one of the presenter had change the make then let me tell you is that I am not that good with photoshop if not I can provide those image for forencies to him Did you any find there any differnce ? Lets try the other one
  13. Did you notice here? Ya there is a a differce if some one is good at the game find different he /she would have find it already ..
  14. I end this I go on shoing those images this presention can be in just in it let me tell is what diffrernce really was thre was was the compnay logo
  15. I was really confuse and my face was worese them his I f I was picture , Company could have sign and selll each other I don&amp;apos;t Know that .
  16. How to can we find out I stared checking the mac address of the device in public avilabe database and got trslly intresting stuff Prolink router mac address are showas trednet and to many reatail I neaver heard of , Side need next pic of digging I also came to know that many vendor use third partry hardware for the product ,so the above can telll you the 100 truth What other options are there to find out .? Best and easiest way was to try to upload the vedor provide firmware,if it is there product then it should certily accpeted there firmware right, A lot of device don&amp;apos;t accepted it ,This means the device we buy claming to may not be the real with the sticker of compnay they are attached.
  17. At the time of our reasearch, 200k online device were affected. So from this calculation we can say aprroxmiately half million devices(combning offline and online) are affected too.
  18. With this issue arise a question who is responsible and whom should we blame? A vendor, who makes router Or Government who allowed to sell false device Or a Consumer who is not bothered to buy a genuine device
  19. We can something download malware knowiy unkwoing but we still have some defese system right. We have a stleaset few watchgurd who will be chasing those stop ritght Lets see how other think or in this picture There is always a way There are a lot of way to do I won&amp;apos;t be explain here how can we do it becasuse of the time other it can be a seprate talk that but recently one of the cool way I was read is realse in defcon 22 which work in most of the case You can find it online about it if intrested
  20. Every one here know about virustotal If not it a cloud based antivius server where you can upload a any excuatable to check wethere it I malicious or not ,it will check the excuatlbe to 57 major antivirusin the server , give you the result Defult payload genrate with metaploit and 36 antivurs detected ,just 36 I was hoping atlest 50 will as it is opensouce compnay can find how those are created and catch it . Second I caeatd is a powershell shell https revese shell script and do little encoding it really show a powe and dorp detection level to 10 and only few of them are major vedor and other are vendor which name I never heard of Lets try one more time with little more reserche and combine few more techniques I was avable to create a malware with zero dection
  21. User are aware but ,but what they can do is there device are backoor and they do not know about it Recently lenovo laptop is consider dongrading the https encryption , wd ,alot hardrive drive are also conside backdoor.
  22. Better know .what you are buing , don&amp;apos;t use duplicated device preserving you cost . One day it can cost you more then you imagine. Don&amp;apos;t leave you device misconfigure ,if you do show there are a lot of guys ready to do for you but in bad way Thre is a tale creaitng hard time for attacker is a win win suation to Use antivirus they won&amp;apos;t give 100 but can will save from a lot malware l -Better use use mut iple antivirus if you pc resouce can handle of two different countlry as one antivurs can catch the virus of other one other may do the same ,mostly coprate should little concren about it , If everyone here is aware with interal cyberwar going one the you propably already have understan what I had try to say If you device support try go for the opensource firmware they are great (opnwart)