Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ก.ย. 2024

ความคิดเห็น • 88

  • @sent4dc
    @sent4dc 7 ปีที่แล้ว +125

    Pretty cool. But one suggestion: watch on 1.5 or 1.25 speed.

    • @einsteinx2
      @einsteinx2 6 ปีที่แล้ว +4

      sent4dc not only was it way better to watch that way, but I had no idea until now that you could increase playback speed in the TH-cam app! Thanks!!

    • @easyappscompany
      @easyappscompany 5 ปีที่แล้ว

      SHIT MAN YES ITS SO SLOW

    • @easyappscompany
      @easyappscompany 5 ปีที่แล้ว

      The worst thing cannot see on 1.25

    • @Miawgician
      @Miawgician 5 ปีที่แล้ว

      now he rapping hahaha

    • @tayloro_o6448
      @tayloro_o6448 4 ปีที่แล้ว

      thanks much appreciated

  • @ZarkowsWorld
    @ZarkowsWorld 5 ปีที่แล้ว +8

    And NSA and China's 'Cyber warefare' divisions have used this and not notified Broadcom as it is very useful for them.

  • @maximalgamingnl9954
    @maximalgamingnl9954 5 ปีที่แล้ว +8

    just imagine sitting in a Software Engineering class, and just 2 people there having macs, then you say 'Your laptops will crash in 10 seconds', and then you do something like this: 31:00 xD

  • @TurboWindex
    @TurboWindex 3 ปีที่แล้ว

    The only time I like to hear "Game Over" is at a black hat presentation.

  • @bitcode_
    @bitcode_ 6 ปีที่แล้ว +10

    Repository unavailable due to DMCA takedown.

  • @changdi2042
    @changdi2042 6 ปีที่แล้ว +16

    Mark at: 28:58 (Auto-Join a new & untrusted Wifi) 46:00 (the Demo starts)

  • @johnnyprimavera2
    @johnnyprimavera2 7 ปีที่แล้ว +60

    One of the slowest talks I've ever seen. Really interesting though.

    • @ColtonBs
      @ColtonBs 7 ปีที่แล้ว +1

      Joan Montserrat so slow that I’m already bored from watching it. How many times can someone repeat what they’re saying in a different way before you’re tired of hearing them? Less than 10 minutes in and I’m already over it.

    • @Adam-eb3rs
      @Adam-eb3rs 7 ปีที่แล้ว +3

      Colton B ummmm aarrrrrrmmmm ummmmmmmm ummmmmmm jesus

    • @nullablebool
      @nullablebool 7 ปีที่แล้ว +7

      I just watch it with a 2x playback speed.

    • @judgeomega
      @judgeomega 7 ปีที่แล้ว +6

      I keep my speed at least at 1.25, often at 1.5. Time is the most valuable commodity in the world.

    • @ColtonBs
      @ColtonBs 7 ปีที่แล้ว +2

      Could have been half the length if he had a full presentation ready, instead of long periods of silence and “um” being used almost every other phrase. He spent more time on his slides than figuring out what to say with the slides. Very disappointed with this speaker, and I hope that Black Hat refuses any of his future talks unless he is actually prepared.

  • @blackneos940
    @blackneos940 6 ปีที่แล้ว +1

    The OpenBSD Devs would LOVE this video..... (:

  • @ak_as_gamer942
    @ak_as_gamer942 7 ปีที่แล้ว +25

    owesome attack really helpful

  • @RalphInRalphWorld
    @RalphInRalphWorld 7 ปีที่แล้ว +46

    Good thing the firmware is closed source to prevent this sort of thing...

    • @firefly618
      @firefly618 7 ปีที่แล้ว +8

      lol

    • @yurigeinish3018
      @yurigeinish3018 6 ปีที่แล้ว +31

      Security by obscurity doesn't work.

    • @SkyGodKing
      @SkyGodKing 6 ปีที่แล้ว +2

      Well you could argue if they stopped the source code from being leaked then this exploit wouldn't have been discovered

    • @BibendiYT
      @BibendiYT 6 ปีที่แล้ว +5

      It wouldn't been discovered YET

    • @MultiClittle
      @MultiClittle 6 ปีที่แล้ว +4

      Yuri Geinish - is joke

  • @bencesarosi7718
    @bencesarosi7718 6 ปีที่แล้ว +4

    This is a very interesting project. Thing is, however, he/they didn't ever compromise Android, nor iOS, thus the title is absolutely misleading. The content is still very worthy and thought-inducing IMHO, but indeed doesn't justify the full hour presentation time people are complaining about.

    • @gradertfamilymakes
      @gradertfamilymakes 5 ปีที่แล้ว +1

      It's not apparent to you that access in this memory could allow for code to be executed within the OS of the phone correct?

    • @bencesarosi7718
      @bencesarosi7718 5 ปีที่แล้ว +2

      Didn't really delve more into it than what is already presented here, but as far as my understanding goes, the code you get to run here runs on a dedicated ARM unit, in dedicated memory, belonging exclusively to the WiFi chipset. That is, you'll need at least one other vulnerability concerning the interface between this chipset and the OS in order to get the main CPU running the system to execute your payload in the context of the OS.
      It's a really interesting possibility, but apparently it is just as far from compromising Android/iOS as is an SQL injection from hijacking the whole system the website is hosted on. Nevertheless it opens up some new perspectives...

  • @nosimpingnocap
    @nosimpingnocap 3 ปีที่แล้ว +1

    He talking about Pegasus

  • @Baigle1
    @Baigle1 7 ปีที่แล้ว +8

    could this brick the broadcom chip if done wrong or purposely?

    • @Baigle1
      @Baigle1 7 ปีที่แล้ว

      i can definitely see a firmware attack used out of this if its even possible... like the hdd firmware patching modules that were unfinished in stuxnet back when it was running around with 0-days
      and who knows what is in intel amt/me or amd psp/secure processor to flash.. the intel amt memory region on motherboard is the same as smm code
      the ultimate persistence would be hardware or firmware..

    • @Ratzzo
      @Ratzzo 7 ปีที่แล้ว +1

      maybe. if you inject code in ram and call flashing facilities

    • @statinskill
      @statinskill 6 ปีที่แล้ว

      Sure. If you can find
      something important you can overwrite, a flash or a serial eeprom maybe. It probably won't work without a proper config. That said, why would you? There's nothing to be gained from this, all it means is they will ditch the phone they're using and get a new one. Maybe one where this doesn't work.

  • @abdelrahmangamalmahdy
    @abdelrahmangamalmahdy 5 ปีที่แล้ว +4

    I am just wondering why he didn't inject any system calls to compromise the android/ios system itself.. All I'm seeing is just taking over the wireless chip but not the application system itself. I think it is very possible to use the trust-relationship between the wifi software and other system resources to hack the application software.. so this seems like an incomplete project or maybe he has already sold such attack privately to a company or possibly a government!

    • @TopherSnags
      @TopherSnags 5 ปีที่แล้ว

      Truth Seeker I was wondering this as well.

    • @Atomkukac1
      @Atomkukac1 4 ปีที่แล้ว +4

      Probalby 24 bytes are not enough and you need to at least dupicate potential system calls to cover both iOS and Android. Rule2: No assumptions of the system.

  • @AmeerHamza-cy6km
    @AmeerHamza-cy6km 6 ปีที่แล้ว +3

    thanks for speaking this way , so people who do not speak English can easily understand .

  • @SeoKungFu
    @SeoKungFu 7 ปีที่แล้ว +2

    Lovely #PWNAGE !

  • @coprice94
    @coprice94 5 ปีที่แล้ว +3

    Glad I use flip phone

  • @LostArchivist
    @LostArchivist 5 ปีที่แล้ว +3

    So they are spooks basically. And they play by old-school rules.

  • @kuqezi8081
    @kuqezi8081 5 ปีที่แล้ว +2

    I had to grin when I saw the whoami at the beginning 00:30 :)

  • @pubcollize
    @pubcollize 6 ปีที่แล้ว +6

    It's not even 3 minutes in and he said "remote exploit" at least over 9000 times.

  • @zedeleyici.1337
    @zedeleyici.1337 2 ปีที่แล้ว

    mükemmel

  • @SilverPaladin
    @SilverPaladin 7 ปีที่แล้ว +8

    skip to the demo: th-cam.com/video/TDk2RId8LFo/w-d-xo.htmlm35s

    • @Adam-eb3rs
      @Adam-eb3rs 7 ปีที่แล้ว +14

      Steve Lawrence 45:35 for anyone who doesnt want to reload

  • @blackfoxshooter
    @blackfoxshooter 4 ปีที่แล้ว

    cool jacket

  • @jakubrichnavsky
    @jakubrichnavsky 7 ปีที่แล้ว +1

    50000 against milions

  • @livefreeprintguns
    @livefreeprintguns 6 ปีที่แล้ว +18

    Save yourself the 40 minutes and jog straight to 40m00s. Unless you want a lecture on what a "remote exploit" is (which I always thought was inherent) and in case you missed out on the past 20 years, a 30 minute tutorial on how WiFi works. It's literally a 10 minute demo stretched out to an hour of mostly yawnzzzzz.

  • @remusomega
    @remusomega 7 ปีที่แล้ว +1

    Wasn't this exploit already patched by apple?

    • @Tjalian
      @Tjalian 7 ปีที่แล้ว +8

      Probably. A lot of these exploits that are released at Blackhat after the time of reasonable disclosure has past, which gives plenty of time for developers to patch the exploits. If you're dragging your heels on patching the exploit, that's their problem, not his.

    • @coprice94
      @coprice94 5 ปีที่แล้ว +1

      No

  • @localhost9993
    @localhost9993 6 ปีที่แล้ว +1

    exploit link............./

    • @RahilKhan-ym9ej
      @RahilKhan-ym9ej 3 ปีที่แล้ว

      @ChillSakura yaa 😂😂he need the link?? how

  • @thekaiser4333
    @thekaiser4333 6 ปีที่แล้ว

    Sad.

  • @EAGEEYE321
    @EAGEEYE321 3 ปีที่แล้ว

    aaahhhh

  • @Carambolero
    @Carambolero 6 ปีที่แล้ว +3

    Nice talk. Please stop sniffing and drink some water.