33
Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices Presented by: Andrew David UNITEC Research Symposium 2020 Programme Day 2 07 th December 2020 Session 2 – 1.10pm to 2.30pm

Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

Exploiting The

Vulnerabilities of LTE

Wi-Fi Sharing Devices

Presented by: Andrew David

UNITEC Research Symposium 2020 ProgrammeDay 2

07th December 2020Session 2 – 1.10pm to 2.30pm

Page 2: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

Overview

1. Introduction 2. Our Focus 3. Analysis 4. Technical Details

5. Demonstration 6. Threats 7. Impact 8. Discussion

9. Conclusion10.

Recommendations11. Questions and

Answers

Page 3: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

1. Introduction

Page 4: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

2. Our Focus

USB 4G LTE modem router

instead of smartphones

Careless usage approach

towards other devices

Provide more insight into the vulnerabilities

of Huawei E8372

Physical attack and exploitationof Huawei E8372

Backdoor and rooting

of Huawei E8372

Page 5: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

3. Analysis

Source: https://gs.statcounter.com/os-market-share/mobile/worldwide

3.1 Mobile Operating System Market Share - WOLRDWIDE

Page 6: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

3. Analysis

Source: https://gs.statcounter.com/os-market-share/mobile/new-zealand/#monthly-201911-202011

3.2 Mobile Operating System Market Share – NEW ZEALAND

Page 7: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

3. Analysis

Source: https://www.ericsson.com/4adc87/assets/local/mobility-report/documents/2020/november-2020-ericsson-mobility-report.pdf

3.3 Subscription and Subscribers – WORLDWIDE

7.9b

8.8b

91%

Page 8: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

3. Analysis

Source: https://www.statista.com/statistics/653680/volume-of-detected-mobile-malware-packages/

3.4 Detected Malicious Installation Packages on Mobile Devices – WORDLWIDE

Page 9: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

3. Analysis

Source: https://securelist.com/it-threat-evolution-q1-2020-statistics/96959/

3.5 Map of infection attempts by mobile malware – WORDLWIDE

Page 10: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

4. Technical Details4.1 Huawei E8372 USB 4G LTE Wi-Fi Modem Routerand Skinny 4G Mobile Broadband SIM card

Page 11: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

4. Technical Details

4.2 Extension USB cable, tweezer and mobile device screwdriver

Page 12: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.1 Device is network locked to Telstra Australia

Page 13: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.2 Disassemble the device from its casing

Page 14: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.3 Disassemble complete

Page 15: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.4 Boot pins are exposed

Page 16: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.5 Unlocking bootloader via USB connection using boot shot technique

Page 17: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.6 Access to bootloader port is now possible

Page 18: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.7 Applying patched bootloader, bypassing bootloader security and unlocking it

Page 19: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.8 Flashing custom ROMs/firmware is now possible with interface ports open

Page 20: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.9 Flashing custom ROM/firmware to network unlock and root the device

Page 21: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.10 Custom ROM/firmware erased all sensitive device information

Page 22: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.11 Issuing AT (attention) commands to modify device’s sensitive information

Page 23: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.12 Using PuTTY as client to a backdoor of the device, connecting via Telnet

Page 24: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.13 Rooting is successful

Page 25: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.14 Network unlocking is successful

Page 26: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

5. Demonstration

5.14 Successful speed evaluation done via speedtest.net

Page 27: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

Attacks

• Man in The Middle

• Rouge DHCP

• Evil Twin

• Botnet

• Denial of service

Vulnerabilities

• Backdoor

• Remote Access Tool

• Malware

• Privacy

• Impersonation

6. Threats

Page 28: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

7. Impact

Page 29: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

8. Discussion

Reality • Most brands and devices have some vulnerability

Advantage• Some manufacturers and network providers are

locking bootloaders

Disadvantage• Some unhappy customers

• Telnet vulnerabilities

Opportunity

• Politicized USA and Huawei trade-war

• Innovation of Harmony OS by Huawei

Comparison work of other

researchers

• Firmware acquisition and bypassing authentication

• Generate network unlock code using IMEI

Page 30: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

9. Conclusion

Page 31: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

10. Recommendation

Check &Don’t use custom

firmware

Don’t root mobile devices

Don’t install unknown apps

Use VPN or encryption for sensitive data transmission

Use anti-virusUse strong password

Update latest official firmware

for mobile devices

Page 32: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices

11. Questions and Answers

Page 33: Exploiting The Vulnerabilities of LTE Wi-Fi Sharing Devices