Hardware Backdooring is practical
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards. The first net effect of Rakshasa is to disable NX permanently and remove SMM related fixes from the BIOS, resulting in permanent lowering of the security of the backdoored computer, even after complete earasing of hard disks and reinstallation of a new operating system. We shall also demonstrate that preexisting work on MBR subvertions such as bootkiting and preboot authentication software bruteforce can be embedded in Rakshasa with little effort. More over, Rakshasa is built on top of free software, including the Coreboot project, meaning that most of its source code is already public. This presentation will take a deep dive into Coreboot and hardware components such as the BIOS, CMOS and PIC embedded on the motherboard, before detailing the inner workings of Rakshasa and demo its capabilities. It is hoped to raise awareness of the security community regarding the dangers associated with non open source firmwares shipped with any computer and question their integrity. This shall also result in upgrading the best practices for forensics and post intrusion analysis by including the afore mentioned firmwares as part of their scope of work.
Presented By:
Jonathan Brossard
Black Hat - USA - 2012 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security
Other Videos By All Hacking Cons
2021-12-30 | CuteCats exe and the Arab Spring |
2021-12-30 | Hacking the Corporare Mind: using social engineering tactics to improve organizational security |
2021-12-30 | Legal Aspects of Cyberspace Operations |
2021-12-30 | Meeting Yaniv Karta |
2021-12-30 | A stitch in time saves nine: A Case of Multiple Operation System Vurnarability |
2021-12-30 | Hacking with WebSockets |
2021-12-30 | Dex Education: Practicing safe Dex |
2021-12-30 | Dont stand so close to me: an analysis of the NFC attack surface |
2021-12-30 | Looking into the Eye of the Meter |
2021-12-30 | Errata Hits Puberty: 13 years of chagrin |
2021-12-30 | Hardware Backdooring is practical |
2021-12-30 | Package Clone Detection |
2021-12-30 | Evasion of Webapplication |
2021-12-30 | MAC EFI Rootkits |
2021-12-30 | Passive Bluetooth Monitoring |
2021-12-30 | HTML5 Threats |
2021-12-30 | Exchanging Demands |
2021-12-30 | Malware |
2021-12-30 | Pin Pad Pwn |
2021-12-30 | AMF Testing |
2021-12-30 | Insider Data Theft |