Exploiting Qualcomm WLAN and Modem Over The Air

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=OgaHFcVVUB8



Duration: 44:56
43 views
0


Xiling Gong | Senior Security Researcher, Tencent Blade Team
Peter Pi | Senior Security Researcher, Tencent Blade Team
Location: Lagoon GHI
Date: Thursday, August 8 | 12:10pm-1:00pm
Format: 50-Minute Briefings
Tracks: Mobile, Exploit Development

In this talk, we will share our research in which we successfully exploit Qualcomm WLAN in FIRMWARE layer, break down the isolation between WLAN and Modem, and then fully control the Modem over the air.

Setting up the real-time debugger is the key. Without the debugger, it's difficult to inspect the program flow and runtime status. On the Qualcomm platform, subsystems are protected by the Secure Boot and unable to be touched externally. We'll introduce the vulnerability we found in Modem to defeat the Secure Boot and elevate privilege into Modem locally so that we can setup the live debugger for baseband.

The Modem and WLAN firmware is quite complex and reverse engineering is a tough work. Thanks to the debugger, we finally figured out the system architecture, the components, the program flow, the data flow, and the attack surfaces of WLAN firmware. We'll share these techniques in detail, along with the zero-days we found on the attack surfaces.

There are multiple mitigations on Qualcomm baseband, including DEP, stack protection, heap cookie, system call constraint, etc. All the details of the exploitation and mitigation bypassing techniques will be given during the presentation.

Starting from Snapdragon 835, WLAN firmware is integrated into the Modem subsystem as an isolated user space application constraint. We'll discuss these constraints, and then leverage the weakness we found to fully exploit Modem.


Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
password
code
web
concept
thief
protection
network
secure
criminal
phishing
software
access
safety
system
firewall
program
spyware
conference
learn
how to
2022
cybersecurity
owned
securing
exploit
exploitation
recon
social engineering
Xiling Gong
Peter Pi
qualcomm
wlan
real-time
vulnerability
modem
secure boot
DEP
Stack protection
heap cookie
system call constraint