Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense...
Transcript of Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense...
![Page 1: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/1.jpg)
T T b. b P . T a
Hardware security multidimensional attack and defense tool set
Jie FuKunzhe ChaiMingchuang QinFrom—360 Hacker Research Institute, 360 Security Technology
![Page 2: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/2.jpg)
T T b. b P . T a
Abstract
• Hardware attack and defense tools.
• Master and implement a variety of hardware attack methods.
• Includes ultrasonic attacks, RFID attacks, power side channel attacks,
and radio defense etc.
• Design idea, design concept
![Page 3: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/3.jpg)
T T b. b P . T a
High frequency card reader and high frequency simulator
• ChameleonMini
• proxmark3
• HackNFC — designed by 360 Unicornteam
![Page 4: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/4.jpg)
T T b. b P . T a
![Page 5: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/5.jpg)
T T b. b P . T a
HACKNFC
• Man in the NFC• Chip — PN7462• Protocol—14443A• NRF24L01
������������
![Page 6: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/6.jpg)
T T b. b P . T a
Open source
• Arduino programming design• Simple,Practical
• Github : • Each function module will be made into Arduino library functions
![Page 7: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/7.jpg)
T T b. b P . T a
ChameleonMini — how to emulate a mifare card
![Page 8: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/8.jpg)
T T b. b P . T a
ChameleonMini
• Arduino programming design• Simple,Practical
• Github : • Each function module will be made into Arduino library functions
![Page 9: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/9.jpg)
T T b. b P . T a
Why there is an error in the original SCH?
• Parameter adjustment
• Hardware Bug?
• The values in yellow are wrong
![Page 10: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/10.jpg)
T T b. b P . T a
How to design a NFC hack tool ?
• How to get a long distance
• How to design more concealed
• What features do you want
![Page 11: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/11.jpg)
T T b. b P . T a
![Page 12: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/12.jpg)
T T b. b P . T a
How to achieve a long reading distance?
• PN532
• Demodulation circuit
![Page 13: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/13.jpg)
T T b. b P . T a
How to achieve a long reading distance?
• MFRC522
• Demodulation circuit
![Page 14: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/14.jpg)
T T b. b P . T a
How to achieve a long reading distance?
• Chip — CLRC663
• General method
• Current monitoring
![Page 15: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/15.jpg)
T T b. b P . T a
How to achieve a long reading distance?
• Current monitoring : 70mA - 100mA
![Page 16: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/16.jpg)
T T b. b P . T a
How to achieve a long reading distance?
• Chip — CLRC663
• General method
• Current monitoring
• Optimize parameters
![Page 17: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/17.jpg)
T T b. b P . T a
• Remain L0, C0; Change C1, C2
• Antenna value 1uH - 2uH
How to achieve a long reading distance?
![Page 18: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/18.jpg)
T T b. b P . T a
Simple Arduino Reader
![Page 19: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/19.jpg)
T T b. b P . T a
How to make the tool by yourself ?
• Electronic circuit design software ——EAGLE , Alitum Designer
![Page 20: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/20.jpg)
T T b. b P . T a
NFC defender and 125Khz defender
• How to block NFC communication
![Page 21: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/21.jpg)
T T b. b P . T a
![Page 22: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/22.jpg)
T T b. b P . T a
NFC defender and 125KHz defender• Detect and protect
![Page 23: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/23.jpg)
T T b. b P . T a
NFC defender and 125KHz defender• Detect and protect
![Page 24: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/24.jpg)
T T b. b P . T a
NFC defender and 125KHz defender• Detect and protect
![Page 25: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/25.jpg)
T T b. b P . T a
Ultrasound attacks smart hardware
• What could voice do?
![Page 26: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/26.jpg)
T T b. b P . T a
Ultrasound attacks smart hardware
• An electronic device with adjustable frequency
of sound wave
![Page 27: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/27.jpg)
T T b. b P . T a
Ultrasound attacks smart hardware
• An electronic device with adjustable frequency
of sound wave
• Physical resonance
• Be patient — Looking for the frequency of resonance
![Page 28: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/28.jpg)
T T b. b P . T a
Ultrasound attacks smart hardware
• Microprocessor control
• Simplified —No Amplifier
• Speaker — Characteristic
![Page 29: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/29.jpg)
T T b. b P . T a
Hardware Power glitch attack
• Power fluctuation
• Clock disorder, program to run error
• Program bypass, decryption
![Page 30: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/30.jpg)
T T b. b P . T a
Hardware Power glitch attack
• Power fluctuation
• Clock disorder, program to run error
• Program bypass, decryption
![Page 31: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/31.jpg)
T T b. b P . T a
Ultra strong electromagnetic field circuit system breaker
• To attack a circuit system, such as an access control system, and open the
![Page 32: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/32.jpg)
T T b. b P . T a
Ultra strong electromagnetic field circuit system breaker
• To attack a circuit system, such as an access control system, and open the
![Page 33: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/33.jpg)
T T b. b P . T a
Ultra strong electromagnetic field circuit system breaker
![Page 34: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/34.jpg)
T T b. b P . T a
Ultra strong electromagnetic field circuit system breaker
• How to make artificial lightning?
![Page 35: Hardware security multidimensional ... - Hack In The Box - A... · •Hardware attack and defense tools. •Master and implement a variety of hardware attack methods. •Includes](https://reader034.fdocuments.net/reader034/viewer/2022042110/5e8a98c74c59484275527338/html5/thumbnails/35.jpg)
T T b. b P . T a
Make amazing artificial lightning