El libre pensamiento para un internet libre
No estas registrado.
https://www.pentestpartners.com/blog/ye … re-alarms/
pido disculpas al admin que esta en ingles, solo para desmotrar hasta donde llegamos con tecnologias y brechas que tienen.
un saludo a foreros
Desconectado
¡Muy bueno!
Así de fácil... Con una DoS y un rogue AP... Mola ver a aircrrack-ng en acción en gran pantalla
Muchas Gracias a ti por compartir
Desconectado
Y para no abrir una tema nueva,
otra noticia muy parecida,
nueva brecha en cafeteras por wi-fi
enlace de la noticia
https://www.pentestpartners.com/blog/ha … ne-part-1/
y la pagina pegada aqui.
si no lo debo hacer esto,pegando en ingles, porfavor avisadme.
un saludo a la comunidad.
Hacking a Wi-Fi Coffee Machine – Part 1
Posted on Monday, November 16th, 2015 by David Lodge.
coffee
After showing some pretty serious security fails in the Wi-Fi iKettle from Smarter recently (e.g. PSK extraction over Wi-Fi in plain text) we have been eagerly awaiting delivery of their latest products; the Wi-Fi Coffee Machine and iKettle 2.0. The mobile app has had a significant update and the ridiculous static/short PIN bug doesn’t appear to be present. That’s the good news.
Now for some bad newsThis post is about attacking the coffee machine in its unconfigured state, so out of the box, powered on, but not hooked up to a mobile app yet. We found in multiple iKettles on wigle.net this state.
The Coffee Machine works as a Wi-Fi access point in unconfigured state, unlike the iKettle which operates as an ad-hoc Wi-Fi device. This makes life a little easier:
coffee1-1DHCP is enabled, the default gateway address is 192.168.4.1. The SSID will be easy to geo-locate on wigle too, once a few have got in to the market.
The iKettle communicates on TCP ports 23 and 2000.
coffee1-2No joy there, so potentially a different Wi-Fi module, not the VSD03 as found in the iKettle.
Turns out it talks on TCP & UDP port 2081, using what appears to be a simple binary protocol. You can detect the port from either a port scan, wiresharking the phone->coffee machine connection or from decompiling the am.smarter.smarterandroid.utils.UDPSocket class in the Android mobile app.
coffee1-3There appears to be a heartbeat or status message broadcast every 5 seconds. (Later investigation showed that this contained details about the status, including the fill level on the water reservoir, number of cups and coffee strength.)
So we had a play around with TCP traffic, using the mobile app code for clues.It’s a straightforward protocol to work with.
A message is composed of:
<action>[parameters]<tail><tail> = 0x7e
[parameters] is one or more bytes, depending on <action>
For example: we send the machine 0x64 0x7e, it will respond with 0x65 0x02 0x0d 0x7e.
0x65 is effectively a message reply.
0x02 is the type of the machine (we think the iKettle is version 01, coffee machine is version 02).
0x0d is decimal 13, which correlates with the SDK version of 1.3.0 (see below).
0x7e is likely to be a packet terminator.
Next, we attempt to fuzz the protocol a bit. Sending 0x6A (or the letter ‘j’ if you’re punching your keyboard) generates a response:
coffee1-4
BOOM! ‘AT+GMR’ tells us a lot; first that the Wi-Fi module in use is the ESP8266, from the command set. This module is one of the most popular IoT Wi-Fi modules available (probably because it is so cheap). AT+GMR is the command to disclose the firmware version.
coffee1-5The complete command set is available online, here’s an example:
coffee1-6It's easy to find the messages being constructed in the APK. Here's a message with decimal 13 being created, sending 0x0d -> AT+CWLAP on the ESP8266, starting a scan for access points.
coffee1-10So, now we know what we’re dealing with, what else can we do?
Here's the output from the previous message. Hence, we can use the coffee machine to discover Wi-Fi networks. No particular security issue there, but amusing nonetheless! Wi-Fi stumbling by coffee machine?
coffee1-7However, what I want to know is if I can make a cup of coffee unauthenticated. Can I drive past a user’s house and take control of their coffee machine?
Sadly, it’s just too easy:
0x37 or hit number 7 at your terminal and it starts brewing:
coffee1-8Yep, so whilst the user is out, if they haven’t configured the Wi-Fi on their coffee machine, we can have it brew to order. Nasty stale coffee anyone? Empty water container? All the coffee grounds used?
Firmware and DoS attacksFrom the AT command set, we also see the ‘Firmware Upgrade’ command: AT+CIUPDATE.
So, we’ll need to intercept / MITM the upgrade process, but it’s trivial to trigger it. Just send it 0x6e or simply hit ‘m’ on your keyboard.
We’re investigating the firmware upgrade mechanism right now (looks like a new socket is created on TCP port 6000 for the purpose), but in the meantime, triggering a firmware upgrade has the lovely effect of factory resetting the Wi-Fi module!
Without a hard reset (user holds down ‘start’ button for 10 secs) the Wi-Fi module won’t operate.
Nice!
We have lots more to do on this project. Here’s a rough list:#1 fully reverse the protocol, so we have a complete command set. This is easiest by simply reading the APK and figuring out the binary commands for each coffee machine instruction.
More involved is to fully fuzz the command set, as it’s likely that there will be functionality available that’s not used in the mobile app. The AT+GMR command is potentially a case of this, as we can’t locate a request in the mobile app that calls this currently.
Ideally, we’re looking for a way to call AT+CWSAP, which will divulge the users Wi-Fi PSK from the ESP8266
We’ve already found AT+CWSAP being called to set the SSID [0x07] and PSK [0x05], and query the SSID [0x0d] but we haven’t found a way to recover the PSK yet.
#2 read the ESP8266 code and fully understand how it works. Here’s an image of the main board on the coffee machine, complete with the ESP8266 module and two very interesting ports on the left hand side. We struggled to get a read from these, but suspicion is that they’re UART interfaces, or possibly I2C/SPI. Time will tell.
coffee1-9#3 man in the middle the firmware update connection and attempt to grab the new firmware as it’s downloaded, and/or serve rogue firmware to it. It’ll be interesting to see if the firmware has been signed, which may make a big difference to the ease of this attack.
#4 then see if we can carry out the same attack against a configured coffee machine, just like the PSK extraction we showed with the iKettle.
Is there a chance that the coffee machine is secure once configured? Maybe, but based on the iKettle 1.0, I’ll place money on it not being.
Desconectado
Gracias por seguir informándonos sobre este tema.
He intentado hackear la mía y afortunadamente parece invulnerable :
No se que firmware lleva la mía... pero parece ser de los buenos : parece inmune a toda brecha wifi
Desconectado
le he dado unas pocas vuelta a los enlace y al video,pero mi ingles como que no,
si podeis explicar un poco mas en cristiano para que nos enteremos de este ataque.
gracias y un saludo.
Desconectado
Maldito resfriado... me ha dejado planchado...
Voy a darte el guión de la película (primera brecha)
De todo modo por lo de la segunda brecha les quedan detalles por pulir, de momento podemos hablar de vulnerabilidad.
¿Que pasa en esta película?
El ketlle se conecta al router de casa.
Así podemos activarlo remotamente y ahorrarnos los 15 segundos que necesitamos para entrar en la cocina y darle al botón de encendido.
¡Gran avance para la humanidad!
La vacuna contra la rabia es moco de pavo al lado del ketlle wifi.
Bien . Esto es la situación : tu kettle esta conectado a tu red wifi segura en WPA2.
Ahora pasa un pirata mal intencionado cerca de tu casa.
El pirata tienen un router configurado en OPEN que tiene el mismo ESSID que tu red. (Rogue AP)
Tiene también un portátil con la suite aircrack-ng instalada y un adaptador wifi compatible.
El pirata des-autentica la tetera SMART con el DoS de aircrack-ng (aireplay-ng -0 ...)
La tetera SMART tiene un chipset wifi y un firmware de muy mala cualidad.
Asi que la muy tonta se conecta al punto de acseso "falso" en OPEN inmediatamente después que haya sido desconectada del punto de acceso legitimo.
Tu tetera no esta conectada a tu router sino que esta conectado al router del pirata.
A partir de ahí el pirata abre una consola telnet.
Intenta acceder al kettle mediante telnet.
El acceso esta protegido... con pass 123456.
O sea no esta protegido.
Una vez conectado puede (entre otras cosas) recuperar la contraseña wifi (guaradada en texto plano) que utiliza el kettle para conectarse a tu red : Tiene tu clave Wifi.
resumen
desconectar la tetera del router legitimo con aireplay-ng
La tetera se conecta a su AP (mismo nombre de red pero en OPEN)
El pirata lanza una sesión telnet y concede el acceso con el pass 123456
Obtiene la llave WPA de tu red con una petición telnet "get_auth"
todo esto es posible por la mala cualidad-configuración del firmware y del chipset wifi
Desconectado
gracias por contestar, me ha quedado un poco mas claro.
kcdtv
Desconectado
Tema | Respuestas | Vistas | Ultimo mensaje |
---|---|---|---|
¡Vienen grandes cambios! por Takomou
|
2 | 247 | 29-05-2023 15:25:52 por Patcher |
Pegado: |
521 | 340556 | 10-05-2023 18:24:28 por Betis-Jesus |
|
27 | 1264 | 09-05-2023 21:32:44 por kcdtv |
Hacktivismo por CHARGER22
|
1 | 214 | 08-05-2023 19:53:26 por kcdtv |
Pegado: |
447 | 66160 | 22-04-2023 15:31:13 por kcdtv |
Ultimo usuario registrado: klurosu
Usuarios registrados conectados: 0
Invitados conectados: 12
Número total de usuarios registrados: 2,446
Número total de temas: 1,637
Número total de mensajes: 15,586
Atom tema feed - Impulsado por FluxBB