As a software developer I would have liked to hear what could have been done to prevent this. Obviously not running everything as root to start with.
@FlashbackTeam2 жыл бұрын
Several mistakes were committed: - running everything as root - mounting the root file system as read-write - hardcoding the encryption key - enabling a network service when it's not necessary (we hadn't configured this feature, it is enabled by default) But most importantly, input wasn't sanitised. Notice that it expects a MAC address, which has a very strict and well known format: aa:bb:cc:dd:ee:ff After copying to an intermediate buffer with a limited size (as they did correctly), they should have validated the MAC address before proceeding. This could have easily been done with a regex, such as: ^[a-fA-F0-9]{2}(:[a-fA-F0-9]{2}){5}$ In addition, they could have introduced additional security controls, such as a properly configured firewall, sandboxing, etc.
@supermaster20122 жыл бұрын
@Ralph Reilly there's a reason for this, it saves manufacturing costs as they can just flash the same exact image over and over and let the device bootstrap when it's booted up for the first time.
@itzurabhi2 жыл бұрын
for the C, C++ devs : -Wall -Wextra -Wconversion -Werror
@TonyLee_windsurf2 жыл бұрын
@@supermaster2012 One can use public key encryption, at lease hide the private key. Harder for hacker to create diff encrypted pkt.
@thoriumbr2 жыл бұрын
@@TonyLee_windsurf You can't "hide" the private key, as the software will need it to decrypt the packet. Hard coding the key is terrible because every single router using the same firmware uses the same key. If the key was saved on a file, and checked and generated if the file was missing, it would not be possible to hack every router without physical access to it first.
@HritikV4 жыл бұрын
It wasn't rushed at all. A perfect explanation at a perfect pace.
@jaimedpcaus12 жыл бұрын
What was "connected pin to line" what was that? What did he say?
@logicalness4 жыл бұрын
Great work guys! Pedro’s explanation of the team’s process of auditing system calls is exceptional. This kind of breakdown is something I rarely see covered in detail.
@myname-mz3lo Жыл бұрын
the way you created a file one character at a time is so smart . i would have felt so stuck with the 13 characters .
@ryanduke67849 ай бұрын
My god. I think this is the best channel ive seen so far. These dudes are legit
@TheGrimSniper144 жыл бұрын
We absolutely love these kinds of detailed breakdown of your thought process while looking at a target. Definitely continue doing these types of videos
@ProfessorRainman7 ай бұрын
This is my new favorite KZbin channel full stop. Excellent work guys!
@Raintiger882 жыл бұрын
I just found your channel yesterday and I'm really enjoying your videos. The information and quality is unmatched!
@paramatus35312 жыл бұрын
I like what you have done there. Very straight forward explenation, and I have to slightly disagree with you saying it was rushed. It was perfect. Longer videos are harder to follow and the amount you put in and the little backstories like being in Laos spiced it up a little. I am looking forward to more of your exploits.
@Barqi4 жыл бұрын
You guys did an amazing job in explaining the exploitation process. For a next video I would love to see more on how you reverse engineer/decrypt the code and the process of analyzing it. Thanks for giving back to the community! You rock!
@FlashbackTeam4 жыл бұрын
Thanks for the feedback! We will show that in detail in future videos. Bear in mind there was a serious reverse engineering effort behind all of this. Most functions in the binary were not even defined, and all symbols are our names (the binary had few symbols).
@Barqi4 жыл бұрын
@@FlashbackTeam I understand. But what for me personally would be super interesting to see, is how to start turning that binary code into code. I think that there are not that many videos on hardware > code > recognising exploitable functions. Again, thanks for giving back to the community!
@RafaelKarosuo Жыл бұрын
@@FlashbackTeam I was thinking "how on earth you got all those symbols if the code wasn't compiled for debugging", thanks for the clarification, a lot of effort indeed.
@VladimirJog3 ай бұрын
I went from trying to find a work around to remove ISP limitation to Getting full control of the device. Your videos were a big help.
@ninoivanov2 жыл бұрын
... fiiiiinally an actually GOOD channel on such topics...
@kltr0072 жыл бұрын
Thank for sharing this. I like the no-nonsense style. For your first video this is a great piece of work. Like your graphics - a picture says more than thousand words. Must have been a lot of work but it pays back.
@kshitijnalawade85544 жыл бұрын
idk what I should comment now.. Everything I wanted to say like 'this is awesome' and stuff has been said by everyone.. But I'm still commenting to let you guys know that we really need more of this great content from you guys!! Really appreciate it!!
@JK-pb3vj3 жыл бұрын
Blyat, this is the best router exploit video on KZbin by a long way! More of this guys ✌️
@danielmonzon73964 жыл бұрын
Wow, impressive work guys, learnt so much in a single video. As feedback I would say that it would be cool to have a quick look on the exploiting writing process ;)
@FlashbackTeam4 жыл бұрын
Thank you for your feedback! We will go into depth on that in the next videos!
@danielmonzon73964 жыл бұрын
@@FlashbackTeam u are welcome, can't wait to watch them :P
@KaleshwarVhKaleshwarVh4 жыл бұрын
@@FlashbackTeam yes, I guess, the length of the video doesn't matter for people who will wanna learn. So go for it.
@wowimoldaf2 жыл бұрын
This is very, very well graphiced exploit explanation. Huge thanks, there are million exploit explanations but i never seen like this one.
@NetworkITguy2 жыл бұрын
I never get tired of your voice ;)
@tehnics-optics45608 ай бұрын
Hi , Great work guys!!!!!! I just found your channel yesterday and I'm really enjoying your videos !!!!!!!! Everything I wanted to say like 'this is awesome' !!!!!!! Please make longer video about setup your environment and witch program use for exploit for router !
@prox57844 жыл бұрын
That was fantastic and very well put together. Very educational. So excited to see more of this!
@brotatobrosaurus5411 Жыл бұрын
Nice exploit, even better explanation! Great work.
@Harshitshukla882 жыл бұрын
You guys rocked🔥 lot of learning in a single video from hardware to binary, reverse engineering to maintaining access .....😃
@thefastjojo4 жыл бұрын
explanation in the state of art! Brilliant, and waiting for more, congratulations!
@surferbum6184 жыл бұрын
This was awesome, and thanks for showing your thought process when discovering this vuln. Hope to learn more from you guys in the future
@DursunX2 жыл бұрын
non-programmer here i love this breakdown. i get to witness the mindset of successfully exploiting a vulnerability (within a 13 character limitation). i actually got it. most of it made sense even to an 'illiterate' bystander like myself. pwn bounty well deserved!
@jacoblpeterson3 жыл бұрын
Excellent video. I couldn't stop laughing at the `echo urmom>d` hahaha
@flinkiklug66662 жыл бұрын
Verry nice job. I don’t understand what you exactly does but it is so a nice idea. I want to learn this. Sooo nice
@nsknyc3 жыл бұрын
ah so late for this, but absolutely worth the watch. Congrats guys on this fantastic job. "Looks juicy" my new favorite phrase :p
@Leftism112 жыл бұрын
Thanks!
@FlashbackTeam2 жыл бұрын
Thank you for supporting our channel!
@pincombe2 жыл бұрын
Great video, first time I've been aware of a reverse shell before really interesting stuff!
@karolinajoachimczyk31682 жыл бұрын
Panowie, super robota, jako początkujący embeddeddev bardzo dziękuję za content!
@localman93414 жыл бұрын
Amazing content guys. Waiting for more🙃
@sombramurk7932 жыл бұрын
Awesome guys! What a video... very clear and objective. The exploit sending one char at a time was really dope
@JBarszczu3 жыл бұрын
This is the best hardware hacking video I have seen in my life. Thank you!
@rdarkmind2 жыл бұрын
Money well deserved! This was just beautiful. Thanks for sharing guys. I'd have to re-watch the reverse engineering part of the system calls a few times to understand what's happening though 😅
@EJohnson6884 жыл бұрын
Nice work, thanks for the great deep dive! Keep up the great work on developing that specialty education platform :)
@FlashbackTeam4 жыл бұрын
Thanks, will do!
@ui4lh2 жыл бұрын
Pure genius the writing to a shell script and then executing lol
@iikon692 жыл бұрын
Great work, love the thought behind constructing the final final in chunks due to the character limitation.
@anitsh4 жыл бұрын
Loved the experience watching the video. As a n00b, I'm thankful for the details presented and would request that even more videos with even more details would be much appreciated. And wish both of you the very best.Cheers,
@th3p1tbulll2 жыл бұрын
Very nice job! Congratulations boys!!!
@HK-sw3vi3 жыл бұрын
mad respect for you guys, what's better than learning from the bests.
@murrij2 жыл бұрын
Wow! Thank you so much for your work on this video. Explanations are great for someone starting out like me.
@thebrotherhood16754 жыл бұрын
brilliant waiting for more!
@gauravhksharma57604 жыл бұрын
Congratulations guys. Looking forward to learning more. Thank you for starting this channel 👍🏼👌🏽
@0xbitbybit2 жыл бұрын
Loved it, great explanation with the reversing, thanks guys!
@neroux7122 жыл бұрын
From a developer sight of view, it makes me now think twice about validation of strings from not trust able sources, as the exploit would break if any function in the call chain would check the input values fully also for injection. Very interesting how "easy" it is to gain access when you reach a specific level of knowledge, very nice video and remote Injection method of the remote shell!
@somsiri93194 жыл бұрын
Great work! Looking forward to the next video.
@neuronwave2 жыл бұрын
Absolutely fantastic explanation. Really enjoyed it and understood it!
@saketsrv90682 жыл бұрын
You guy's are insane, please release nore videos. Highly appreciated
@geraldamasi15593 жыл бұрын
The explanation is quite good and making it seem easy. Good guys
@kevinnyawakira46004 жыл бұрын
That was pretty cool. I will like to see more videos like this one. Also a video of how someone can get started in hardware hacking, tools required will be appreciated
@davidbristoll1952 жыл бұрын
Very cleverly done. I really enjoyed watching 👍
@NCMilVet Жыл бұрын
Great job guys. And great video.
@markooo44294 жыл бұрын
Amazing, cant wait for next video
@sven56662 жыл бұрын
Thank you guys. Absolutely awesome video! Really well structured and presented.
@cq_YT4 жыл бұрын
Awesome work! Wait for more and learn from you.
@hanshansli2238 Жыл бұрын
thank you guys, great video!
@rizkvn2 жыл бұрын
even this video is more than 10 minutes, I'm take a break from my workload to watch this video nice education video bro, from me who interest on vulnerability hardware
@jesseopjescherm2 жыл бұрын
Awesome video! Great pace and explanation. The file buildup within the 13 char limit is genius haha. Well done!
@depth5322 Жыл бұрын
It’s awesome guys. It’s very interesting. Thank you for explanation
@thatguyinelnorte4 жыл бұрын
Well done Flashback Team!
@13DarkWolf4 жыл бұрын
Really nice and clear breakdown guys and congrats on the bounty!
@orenishay41754 жыл бұрын
This video was amazing! Right to the point and I understood everything! thank you!
@DefconUnicorn2 жыл бұрын
Really nice work dudes, love the idea of building it one char at a time.
@MagicPlants2 жыл бұрын
Printing one char at a time to a file due to the charlimit then executing the file was genius!
@alanavella86402 жыл бұрын
Great job guys! Does that mean that us, the users, are vulnerable through the network just by having one of these at home?. Or would I be in trouble just if I invite you for a cup of coffee?🤣🤣🤣 Keep it up!
@FlashbackTeam2 жыл бұрын
If you use it at home, you would only be vulnerable if you invited us for a cup of coffee... but it's not that simple, let us explain! Routers like these are used in small businesses to provide Internet service to the business' customers, which would be connected to the LAN interfaces (Wi-Fi or Ethernet). As a small business customer (let's say in a cafe, hotel or hospital), you could abuse this vulnerability, take control of the router, and attack the other customers. LAN style attacks are also relevant in large businesses, where for example you connect to a segregated Wi-Fi network, but are still connected to the LAN-side of a router, and could then execute similar attacks. In the same competition we actually hacked the same router over the WAN interface (where the router connects to the Internet), we will put a video up describing the attack in the future. This last phrase means that if you use this router, you are still vulnerable from the outside of your local network (outside of the coffee cup zone), NOT due to this specific vulnerability, but due to others we found in the same competition :D
@teslastellar2 жыл бұрын
Thank you so much for explaining the process.
@florianmaetschke90542 жыл бұрын
Great Job! Super good video! keep on
@ruslanshuster91242 жыл бұрын
Great video, enjoyed a lot! Clever exploit:)
@loocatme67792 жыл бұрын
You, Sir, are a scholar and a certified badass.
@JoshDavidLevy4 жыл бұрын
Really enjoyed this explanation. Great job guys
@1337BR3AK3 жыл бұрын
Great video and explanation!
@davidraber-radakovits15722 жыл бұрын
GND pins are usually easy to find by eye since they're most often connected to a GND plane instead of a line.
@aaryanbhagat48523 жыл бұрын
Excellent explanation, super cool method of exploit!
@ogiogi27144 жыл бұрын
Got damn it congrats flashback team !!!!
@AtreidaeChibiko2 жыл бұрын
Didn't expect to see Dashie in this video. But I'll take it!
@crazyhacker24372 жыл бұрын
you guys are awesome. Love from India 😍🙏🏻
@leonvolq61792 жыл бұрын
Perfect explanation, I'm going to copy the part where you go in motorcycles 😄
@jamesrussell-ui6gd Жыл бұрын
great breakdown!
@MarKac90904 жыл бұрын
awesome video! very interesting to watch because you explain it VERY well
@aracystic284 жыл бұрын
This is amazing. Good job guys!
@recepyoldas98944 жыл бұрын
was perfect exploit and explaning
@DrewMarold2 жыл бұрын
Very cool, nice job, guys.
@smitcher3 ай бұрын
Not checking the format of the payload basically. If you are expecting a Mac address then at least check that the payload is a valid Mac address before you append it to a string and execute it (as root too duh!)... Great work guys, this is genius, the tracing of where the data came in, the print 'x'>>a to built up the file was clever and the script to send that over as TPDP packets was great. Then you have the paperclip! A great masterclass... Lots of examples of hacking embedded devices that are online involve getting a firmware update, using binwalk to break it down and look for vulnerabilities in software or hardcoded passwords and that's about it. Actual "hardware" hacking though is a very different beast.
@electrowizard26589 ай бұрын
great video loved it !!
@alreadyputitup2 жыл бұрын
great presentation, very clearly communicated
@josephseed3393 Жыл бұрын
Amazing video! You guys are convincing me to get into IoT and hardware hacking
@marcos2513 жыл бұрын
This is amazing! Great work
@der-andy24072 жыл бұрын
Great work guys
@helmutzollner54962 жыл бұрын
Great stuff! Thank you for sharing.
@renify_2 жыл бұрын
wow pretty straight forward explaination
@ivanprincipato2 жыл бұрын
Thank you so much for sharing , I learned a lot from this video 🙏
@tyaprak2 жыл бұрын
A perfect explanation. Great.
@romankolesnikov43732 жыл бұрын
only after this vid i understood purpose for all those exercises with "draw piramid with numbers using C lang"))))))))) thanks a lot!
@trevorsmith59912 жыл бұрын
Worked , thanks a lot!
@LaroTayoGaming2 жыл бұрын
Congrats!
@seiv-3 жыл бұрын
This is a fucking masterpiece ! Great job guys ! You totally worth it !
@giomke4 жыл бұрын
Can't wait ❤️
@akashsxo3 жыл бұрын
Now i am going to try this on my own router.Amazing Amazing Amazing !
@Ragekillen2 жыл бұрын
Your getting a sub from me I love how you go into full detail although I wish you told us what disassembler you used