Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

Поділитися
Вставка
  • Опубліковано 25 лип 2024
  • Meet Broadpwn, a vulnerability in Broadcom's Wi-Fi chipsets which affects millions of Android and iOS devices, and can be triggered remotely, without user interaction. The Broadcom BCM43xx family of Wi-Fi chips is found in an extraordinarily wide range of mobile devices - from various iPhone models, to HTC, LG, Nexus and practically the full range of Samsung flagship devices.
    By Nitay Artenstein
    Full Abstract & Presentation Materials:
    www.blackhat.com/us-17/briefi...

КОМЕНТАРІ • 88

  • @sent4dc
    @sent4dc 6 років тому +126

    Pretty cool. But one suggestion: watch on 1.5 or 1.25 speed.

  • @maximalgamingnl9954
    @maximalgamingnl9954 4 роки тому +8

    just imagine sitting in a Software Engineering class, and just 2 people there having macs, then you say 'Your laptops will crash in 10 seconds', and then you do something like this: 31:00 xD

  • @ZarkowsWorld
    @ZarkowsWorld 4 роки тому +8

    And NSA and China's 'Cyber warefare' divisions have used this and not notified Broadcom as it is very useful for them.

  • @TurboWindex
    @TurboWindex 2 роки тому

    The only time I like to hear "Game Over" is at a black hat presentation.

  • @changdi2042
    @changdi2042 6 років тому +16

    Mark at: 28:58 (Auto-Join a new & untrusted Wifi) 46:00 (the Demo starts)

  • @SeoKungFu
    @SeoKungFu 6 років тому +2

    Lovely #PWNAGE !

  • @bitcode_
    @bitcode_ 6 років тому +10

    Repository unavailable due to DMCA takedown.

  • @blackneos940
    @blackneos940 5 років тому +1

    The OpenBSD Devs would LOVE this video..... (:

  • @johnnyprimavera2
    @johnnyprimavera2 6 років тому +60

    One of the slowest talks I've ever seen. Really interesting though.

    • @ColtonBs
      @ColtonBs 6 років тому +1

      Joan Montserrat so slow that I’m already bored from watching it. How many times can someone repeat what they’re saying in a different way before you’re tired of hearing them? Less than 10 minutes in and I’m already over it.

    • @Adam-eb3rs
      @Adam-eb3rs 6 років тому +3

      Colton B ummmm aarrrrrrmmmm ummmmmmmm ummmmmmm jesus

    • @nullablebool
      @nullablebool 6 років тому +7

      I just watch it with a 2x playback speed.

    • @judgeomega
      @judgeomega 6 років тому +6

      I keep my speed at least at 1.25, often at 1.5. Time is the most valuable commodity in the world.

    • @ColtonBs
      @ColtonBs 6 років тому +2

      Could have been half the length if he had a full presentation ready, instead of long periods of silence and “um” being used almost every other phrase. He spent more time on his slides than figuring out what to say with the slides. Very disappointed with this speaker, and I hope that Black Hat refuses any of his future talks unless he is actually prepared.

  • @ak_as_gamer942
    @ak_as_gamer942 6 років тому +25

    owesome attack really helpful

  • @RalphInRalphWorld
    @RalphInRalphWorld 6 років тому +46

    Good thing the firmware is closed source to prevent this sort of thing...

    • @firefly618
      @firefly618 6 років тому +8

      lol

    • @yurigeinish3018
      @yurigeinish3018 6 років тому +31

      Security by obscurity doesn't work.

    • @SkyGodKing
      @SkyGodKing 6 років тому +2

      Well you could argue if they stopped the source code from being leaked then this exploit wouldn't have been discovered

    • @BibendiYT
      @BibendiYT 6 років тому +5

      It wouldn't been discovered YET

    • @MultiClittle
      @MultiClittle 6 років тому +4

      Yuri Geinish - is joke

  • @bencesarosi7718
    @bencesarosi7718 5 років тому +4

    This is a very interesting project. Thing is, however, he/they didn't ever compromise Android, nor iOS, thus the title is absolutely misleading. The content is still very worthy and thought-inducing IMHO, but indeed doesn't justify the full hour presentation time people are complaining about.

    • @gradertfamilymakes
      @gradertfamilymakes 5 років тому +1

      It's not apparent to you that access in this memory could allow for code to be executed within the OS of the phone correct?

    • @bencesarosi7718
      @bencesarosi7718 5 років тому +2

      Didn't really delve more into it than what is already presented here, but as far as my understanding goes, the code you get to run here runs on a dedicated ARM unit, in dedicated memory, belonging exclusively to the WiFi chipset. That is, you'll need at least one other vulnerability concerning the interface between this chipset and the OS in order to get the main CPU running the system to execute your payload in the context of the OS.
      It's a really interesting possibility, but apparently it is just as far from compromising Android/iOS as is an SQL injection from hijacking the whole system the website is hosted on. Nevertheless it opens up some new perspectives...

  • @nosimpingnocap
    @nosimpingnocap 2 роки тому +1

    He talking about Pegasus

  • @kuqezi8081
    @kuqezi8081 4 роки тому +2

    I had to grin when I saw the whoami at the beginning 00:30 :)

  • @AmeerHamza-cy6km
    @AmeerHamza-cy6km 6 років тому +3

    thanks for speaking this way , so people who do not speak English can easily understand .

  • @zedeleyici.1337
    @zedeleyici.1337 2 роки тому

    mükemmel

  • @SilverPaladin
    @SilverPaladin 6 років тому +8

    skip to the demo: ua-cam.com/video/TDk2RId8LFo/v-deo.htmlm35s

    • @Adam-eb3rs
      @Adam-eb3rs 6 років тому +14

      Steve Lawrence 45:35 for anyone who doesnt want to reload

  • @abdelrahmangamalmahdy
    @abdelrahmangamalmahdy 5 років тому +4

    I am just wondering why he didn't inject any system calls to compromise the android/ios system itself.. All I'm seeing is just taking over the wireless chip but not the application system itself. I think it is very possible to use the trust-relationship between the wifi software and other system resources to hack the application software.. so this seems like an incomplete project or maybe he has already sold such attack privately to a company or possibly a government!

    • @TopherSnags
      @TopherSnags 5 років тому

      Truth Seeker I was wondering this as well.

    • @Atomkukac1
      @Atomkukac1 4 роки тому +4

      Probalby 24 bytes are not enough and you need to at least dupicate potential system calls to cover both iOS and Android. Rule2: No assumptions of the system.

  • @Baigle1
    @Baigle1 6 років тому +8

    could this brick the broadcom chip if done wrong or purposely?

    • @Baigle1
      @Baigle1 6 років тому

      i can definitely see a firmware attack used out of this if its even possible... like the hdd firmware patching modules that were unfinished in stuxnet back when it was running around with 0-days
      and who knows what is in intel amt/me or amd psp/secure processor to flash.. the intel amt memory region on motherboard is the same as smm code
      the ultimate persistence would be hardware or firmware..

    • @Ratzzo
      @Ratzzo 6 років тому +1

      maybe. if you inject code in ram and call flashing facilities

    • @statinskill
      @statinskill 6 років тому

      Sure. If you can find
      something important you can overwrite, a flash or a serial eeprom maybe. It probably won't work without a proper config. That said, why would you? There's nothing to be gained from this, all it means is they will ditch the phone they're using and get a new one. Maybe one where this doesn't work.

  • @blackfoxshooter
    @blackfoxshooter 4 роки тому

    cool jacket

  • @coprice94
    @coprice94 4 роки тому +3

    Glad I use flip phone

  • @LostArchivist
    @LostArchivist 5 років тому +3

    So they are spooks basically. And they play by old-school rules.

  • @pubcollize
    @pubcollize 6 років тому +6

    It's not even 3 minutes in and he said "remote exploit" at least over 9000 times.

  • @jakubrichnavsky
    @jakubrichnavsky 6 років тому +1

    50000 against milions

  • @localhost9993
    @localhost9993 5 років тому +1

    exploit link............./

    • @RahilKhan-ym9ej
      @RahilKhan-ym9ej 3 роки тому

      @ChillSakura yaa 😂😂he need the link?? how

  • @remusomega
    @remusomega 6 років тому +1

    Wasn't this exploit already patched by apple?

    • @Tjalian
      @Tjalian 6 років тому +8

      Probably. A lot of these exploits that are released at Blackhat after the time of reasonable disclosure has past, which gives plenty of time for developers to patch the exploits. If you're dragging your heels on patching the exploit, that's their problem, not his.

    • @coprice94
      @coprice94 4 роки тому +1

      No

  • @thekaiser4333
    @thekaiser4333 5 років тому

    Sad.

  • @EAGEEYE321
    @EAGEEYE321 3 роки тому

    aaahhhh

  • @livefreeprintguns
    @livefreeprintguns 6 років тому +18

    Save yourself the 40 minutes and jog straight to 40m00s. Unless you want a lecture on what a "remote exploit" is (which I always thought was inherent) and in case you missed out on the past 20 years, a 30 minute tutorial on how WiFi works. It's literally a 10 minute demo stretched out to an hour of mostly yawnzzzzz.

  • @Carambolero
    @Carambolero 5 років тому +3

    Nice talk. Please stop sniffing and drink some water.