0% found this document useful (0 votes)
93 views56 pages

Welcome To Free Anonymous Internet World: Samuel Koo Jihong Yoon

This document introduces two individuals, Samuel Koo and Jihong Yoon, who are members of the hacking group Taekwon-v. It then provides biographical information about each member. The document outlines an agenda to discuss cable modem hacking, including why it can be done anonymously and for free in Korea. It introduces DOCSIS standards and components, and describes how the upstream and downstream signals work. Finally, it explains that cable network sniffing is possible because the signal is broadcast and not encrypted point-to-point.

Uploaded by

tool1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views56 pages

Welcome To Free Anonymous Internet World: Samuel Koo Jihong Yoon

This document introduces two individuals, Samuel Koo and Jihong Yoon, who are members of the hacking group Taekwon-v. It then provides biographical information about each member. The document outlines an agenda to discuss cable modem hacking, including why it can be done anonymously and for free in Korea. It introduces DOCSIS standards and components, and describes how the upstream and downstream signals work. Finally, it explains that cable network sniffing is possible because the signal is broadcast and not encrypted point-to-point.

Uploaded by

tool1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 56

Welcome to Free Anonymous Internet World

SAMUEL KOO dual5651@hotmail.com


JIHONG YOON gotofbi@hotmail.com

Who Are We?

dual5651
Residing in Seoul, Republic of Korea
Undergraduate of Konkuk University
Main focus of study in Windows

rootkit technique and reverse engineering


Teakwon-v team member
Interests include ERP and hacking

gotofbi
Residing in Vancouver, BC, CANADA
Student of BC Institute of Technology
Main focus of study in binary packer

scheme.
Taekwon-v team member
Interests include embedded system and
reverse engineering

Agenda

Why do it?

DOCSIS

Status of ISPs in Korea

Hacking the cable modem

Why Do It?

Its easy!
Its free!
You can do it in anonymity!
It is not wellknown in Korea!

DOCSIS
DOCSIS - Data Over Cable Service Interface Specification is an
international standard developed by CableLabs and contributing companies.
DOCSIS defines the communications and operation support Interface
requirements for a data over cable system. It allows additional high-speed
transfers to an existing CATV system.

Maximum synchronization speed :


Version

DOCSIS
Downstream

Upstream

EuroDOCSIS
Downstream

Upstream

1.X

42.88 Mbit/s

10.24 Mbit/s

55.62 Mbit/s

10.24 Mbit/s

2.0

42.88 Mbit/s

30.72 Mbit/s

55.62 Mbit/s

30.72 Mbit/s

3.0 4 Ch

+171.52 Mbit/s +122.88 Mbit/s

+222.48 Mbit/s

+122.88 Mbit/s

3.0 8 Ch

+343.04 Mbit/s +122.88 Mbit/s

+444.96 Mbit/s

+122.88 Mbit/s

Maximum
synchronization speed

Components of DOCSIS :
CM (Cable Modem)
CMTS (Cable Modem Terminal System)
BackOffice Services (DHCP, TOD Server, TFTP Server)

DOCSIS Overview

DOCSIS Roadmap
DOCSIS Version

1.0

1.1

2.0

3.0

Service
Broadband Internet
Tiered Service
VoIP
Video conferencing
Commercial Services
Entertainment Video

O
O
O

O
O
O
O
O

O
O
O
O
O
O

O
O
O

O
O
O
O
O

O
O
O
O
O
O

Consumer Devices
Cable Modem
VoIP Phone(MTA)
Residential Gateway
Video Phone
Mobile Devices
IP Set-top Box

As you can see, an upgrade from DOCSIS 2.0 to DOCSIS 3.0 does not
automatically result in a security upgrade.

Hacking the Cable


Modem
Key aspect:
Arresting criminal will be very hard
Trace will only reach up to the node
SNMP-port of cable modem is opened insecurely
By sending an SNMP packet, an attacker can achieve

many things

Up/Down stream rate limited by cable modems config


Maximum rate can be manually changed

All network streams are shared insecurely


All packets in the node are sniffable

Status of ISPs in Korea


Internet Service
Provider Name

SNMP
Port opened

CFG
Spoofing

MAC
Vendor code
00:50:D4
(JOHONG)
00:04:BD(Motorola)

S company

Yes

Yes

L company

Yes

Yes

00:02:00(Net&Sys)

3rd Party ISP

Potentially

Potentially

00:C0:B1(Genius)
.

I recently tested four large ISPs in Korea, and the results show that
they were all vulnerable. Therefore, I hypothesize that other 3rd party
ISP may be as potentially vulnerable.

Hacking the Cable


Modem

Arrest criminal process

Customer
Database

3) Matching MAC customer is


aa:bb:cc:dd,
We have the customers info
since we lent him our modem.
Ha Ha Ha Ha Ha!!

2) Trying to find
a.b.c.d from
DHCP log

1) Please tell me who


had a.b.c.d
when 2008 / mm / dd

ISP

4) Criminals name
is xxxx
The Address is
yyyy

Hacking the Cable


Modem

If Criminal use hacked cable modem

Customer
Database

3) Matching MAC is
de:ad:be:ef,
It is not from our customer !
Who the hack is that?

2) Trying to find
a.b.c.d from
DHCP log

1) Please tell me who


had a.b.c.d
when 2008 / mm / dd

ISP

4) Sorry, We can`t
find who it is

Hacking the Cable


Modem

Working process of DOCSIS


Gathering information
Diagnostic web page
DHCP grabbing
SNMP scanning

Modifying the cfg file


DOCSIS Cfg Edit

Changing the cfg file


FORCE TFTP IP
Fake DHCP
Hacking Firmware

Hacking the Cable


Modem
Working process of DOCSIS
1) Modem scanning the frequency in 91000000Hz to 440000000 Hz

2) Broadcast DHCP Discover packet


3) Read cfg name from DHCP ACK packet

4) Download cfg file from TFTP server


5) Limit the upload , download speed as written in cfg file

Hacking the Cable


Modem
DHCP Grabbing

DHCP ACK is broadcast packet


Cfg file name written in Boot File filed
Server Identifier is TFTP Server IP

Hacking the Cable


Modem

Wireshark

By using bootp.dhcp filter, we can analyze DHCP packet in wireshark.

Cfg file name, TFTP Server IP remark in DHCP ACK packet

Hacking the Cable


Modem

Configuration Grabber

By programming a sniffer, you can catch DHCP packets.

Cfg file was downloaded into my computer automatically

Hacking the Cable


Modem
SNMP Scanning

Cabel modems SNMP port is open in Korea


Usually community string is public or private
Community string is written in cfg file
By sending SNMP packet, attacker can control

the modem and obtain useful information


(e.g., Firmware Overwrite, Modem reboot,
Read useful information)

Hacking the Cable


Modem

NET-SNMP

Version 2
OIDs :

Community name

IP

OID

Hacking the Cable


Modem

SNMP Cfg Admin

By using a SNMP Scanning program (such as SNMP Cfg Admin), an attacker


can obtain useful information.
Examples include System description, Configuration file name, bandwidth,
Firmware name, TFTP Server, Time Server, and MAC address.

Hacking the Cable


Modem

VultureWare DOCSIS Config File Editor

ISPs from Korea dont do integrity checks (HMAC-MD5) for cfg file
Hacker can change Frequency, Speed, etc

Hacking the Cable


Modem
Force TFTP IP Concept:

Cfg file can be forced without using DHCP

Requirements can be achieved by sending SNMP packets

Numerous TFTP server programs for Windows

Korean CMTS does not check MD5

Hacking the Cable


Modem
Sequence of normal Cable Modem registration:
IP is a.b.c.d
r
e
rv
e
S
P
T
1) TF
2) TFTP Server is avai

DHCP Server(a.b.c.c)
lable?

file
3) Download cfg

Cable Modem

4) C
with an you
regi
this
ster
c
f
g
5) Y
?
me
ou a
re n
ow r
e g is
tere
d

TFTP Server(a.b.c.d)

Attacker(e.f.g.h)

CMTS(a.b.c.f)

Hacking the Cable


Modem
Sequence of hacked Cable Modem registration:
ip is a.b.c.d
r
e
rv
e
S
P
T
1) TF

2) TFTP

Server
is

3) Dow
n

Cable Modem

load cf

availab

g file

4) C
with an you
regi
this
ster
c
f
g
5) Y
?
me
ou a
re n
ow r
e g is
tere
d

DHCP Server(a.b.c.c)

l e?

TFTP Server(a.b.c.d)

Attacker(a.b.c.d)

CMTS(a.b.c.f)

Hacking the Cable


Modem
Which OIDs are used for hacking?

1.3.6.1.2.1.69.1.4.5.0
To figure out what the current cfg file name is for cable modem.

1.3.6.1.2.1.10.127.1.1.3.1.3.1

1.3.6.1.2.1.10.127.1.1.3.1.5.1
To check Up/DownStream speed of cfg file

1.3.6.1.2.1.69.1.4.4.0
To read TFTP Server IP of cable modem

1.3.6.1.2.1.69.1.1.3.0
To reboot cable modem

Hacking the Cable


Modem
1) Read cfg file name :

2) Check upload & download bandwidth before hacking :

3) Type ipconfig /all to know, what is the ip of my computer :

Hacking the Cable


Modem
4) Run your own TFTP Server :

5) Read TFTP IP of Cable modem :

6) Download cfg file from TFTP Server :

Hacking the Cable


Modem
7) Modify cfg file :

Network Access Control : 0 means network access is not permitted


1 means network access is permitted
Maximum Number of CPEs : Givend IP
Maximum ~stream Rate : Maximum bandwidth

-> 0 means unlimited speed.

Hacking the Cable


Modem
8) Set attacker computer IP as TFTP Server IP:

9) Reboot cable modem :

Hacking the Cable


ModemHacking modem firmware
Most famous modem
SB5100,SB5101 made by Motorola
IP
192.168.100.1

OS
VxWorks , eCos
RTOS (Real Time Operating System)
x86 or MIPS flavor
Unix-like UI

Ways to communicate with modem


Parallel JTAG
USB JTAG
Serial Cable

Hacking the Cable


Modem

SB5100

SB5101

What is the difference between SB5100 and SB5101?


Chipset : Broadcom BCM3348
Broadcom BCM3349
OS
: VxWorks
eCos

Hacking the Cable


Modem
Memory map of cable modem :

32kb

Boot Loader

32kb

Parmenent NonVol

960kb

Image 0

BootLoader area contains BootLoader


Parmenet NonVol area contains all
settings.
Ex) MAC Address, Cfg file
Image0 area contains firmware image

2MB
960kb

32kb

Image 1

Dynamic NonVol

Image1 area contains firmware image

Dynamic NonVol area contains


logged events

Hacking the Cable


Modem
COM Port

Commonly usable
Many usable resources
Modem OS must support it

Hacking the Cable


Modem
Parallel JTAG

Cheap
Very slow
Easy to make
Schwarze Katze

Hacking the Cable


Modem
USB JTAG

Expensive (about $60)


Really Fast
Difficult to make
USBJTAG

Hacking the Cable


Modem

Fireball

There is an Assembler for Cable Modem Firmware


Hacker can build custom firmware for certain purpose

Hacking the Cable


Modem

Sigma X2 Build-142

Hacked Firmware for Surfboard SB5100

Hacking the Cable


Modem

Haxorware 1.0 rc6

Hacked Firmware for Surfboard SB5101

Speed Compare

Speed comparation

Hacking the Cable


Modem
Moving Picture

Its Time to Sniff Packets

SAMUEL KOO dual5651@hotmail.com


JIHONG YOON gotofbi@hotmail.com

Agenda

About Cable Modem

Cable Network Sniffing

Cable Modem Security

Question and Answer

Distribution Map

Inside a Modem

Tuner
Conprovide both upstream and downstream signals
nects directly to the COAX outlet

Demodulator
A/D converter
Demoluation
Error correction

MAC
Extracts data from MPEG

CPU
Controls almost everything in the modem.

Downstream

What cable modems receive


Frequency between 65MHz to 850MHz
DOCSIS has 6MHz of bandwidth
Euro DOCSIS has 8MHz of bandwidth
Modulation 64QAM or 256QAM
Continuous stream of data
Upstream
signaling

5-65
MHz

...
65 MHz - 550 MHz

550 MHz - 850 and up MHz

Upstream

What cable modems transmit


Frequency between 5MHz to 65MHz
Modulation QPSK or 16QAM
Transmit bursts of data in timeslots (TDM)
Reserved and contention timeslots
Upstream
signaling

5-65
MHz

...
65 MHz - 550 MHz

550 MHz - 850 and up MHz

Why Sniffing is Possible?

The signal from CMTS is received by every cable modem


in the same node
Cable modem disregards all data that is not intended for
itself
Modems OS is programmed to drop all frames which are
not meant for itself.

Upstream Sniffing

Most cable modems are designed to receive the data


between 65MHz to 850MHz
Too many upstream channels to balance the load
Modems OS is programmed to drop all frames which are
not meant for itself

Hacking the Cable


Modem
Moving Picture

Cable Modem Security


BPI: Baseline Privacy Interface
Methods for encrypting traffic between the cable modem and the
CMTS at triple 56bit DES with 768/1024 bit key modulus

BPI+: Baseline Privacy Interface Plus


Implemented in Docsis 1.1 Specs (Backwards compatible)
Introduces X.509 v3 (RSA 1024bit) digital certificates & key pairs
Authentication based on certificate hardware identity; validated
when modem registers with a CMTS

Certificates, Keys & The trust ring


Stored in the non-vol settings of a modems firmware
Contains: Public, Private, and Root Keys, CM & CA Certificates
DOCSIS Root CA signs manufacturer CA intermediate certificate,
manufacturer signs CM certificate. CMTS parses and verifies CM
certificate, an identity based on HFC MAC

DOCSIS Security Overview


(BPI+)

test
Internet

CM Authentication
(X.509 Certificates)
Key Management
(RSA, Tri-DES)

abcdef

CMTS

Mfg Certificate
......
Digitally Signed by:
DOCSIS Root

CM Certificate
......
Digitally Signed by:
Mfg CA

Data Encryption
(DES)
x$a9E!

TFTP Server

Secure Software Download


(X.509 Certificate)

abcdef

CM

CM Code
File

New CM Code
......
Digitally Signed by:

Manufacturer

PC

BPI+ CA Root Certificate

X.509 Certificate
Stored in Non-Vol
Public Certificate

BPI+ CM Certificate

X.509 Certificate
Stored in Non-Vol
Included Mac info

Cable Modem Security

Result of Enabling Baseline Privacy

Question and Answer

Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy