SlideShare a Scribd company logo
1 of 57
Download to read offline
BROADCAST
SIGNAL
INTRUSION
Hacking radio stations
(ɔ) 2023
Gjoko Krstic
• Founder of Zero Science Lab2
• Offensive security research lead at ING
• Member of g00g00tka group
• Cybernetics student ☺
2
AGENDA
• Introduction
• Radio Station Components
• Broadcast Signal Intrusion
• ZSL Method
• Conclusion
• End of Transmission
3
4
Guglielmo Marconi, an Italian inventor and
electrical engineer, is credited with the invention
of the radio in 1894 and demonstrated in 1895.
He continued to develop and improve his system,
and in 1901 he successfully transmitted the first
transatlantic radio signal.
Alexander Graham Bell, an American inventor,
scientist, and teacher of the deaf, is also
considered one of the pioneers of radio
technology. He developed an early version of the
radio, which he called the "photophone," that
used light waves to transmit sound.
BRIEF HISTORY
5
BROADCAST TYPES
STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB
Internet radio, which allows
listeners to stream audio
over the internet.
AM (Amplitude Modulation)
radio, which is the traditional
type of radio broadcasting and
uses variations in the amplitude
(or strength) of a radio wave to
transmit sound.
FM (Frequency Modulation)
radio, which uses variations in
the frequency of a radio wave
to transmit sound. FM radio
generally provides better sound
quality than AM radio.
Satellite radio, which is a
subscription-based service
that uses a network of
satellites to transmit radio
signals.
HD Radio, which is a digital
technology that allows FM
and AM stations to
broadcast additional
channels and data
alongside their traditional
analog signals.
1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT
COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE.
2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO
SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION.
3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS
ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM.
4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT
VIA AN ANTENNA.
5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR.
6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S
THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO
RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE.
7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND
PLAYS THE SOUND VIA SPEAKERS.
6
TYPICAL RADIO COMPONENTS
7
8
9
10
ANALOG DIGITAL
FM TRANSMITTERS
11
12
13
14
15
BROADCAST SIGNAL INTRUSION
Broadcast signal intrusion is the unauthorized alteration
or takeover of a broadcast signal. This can occur on
television or radio broadcasts and can take many forms.
Digital intrusion is more sophisticated and can include
hacking into a station's computer systems to gain
control of the signal, or intercepting and modifying the
signal as it is being transmitted.
16
17
PUBLIC INCIDENTS
18
PUBLIC INCIDENTS
19
PUBLIC INCIDENTS
20
PUBLIC INCIDENTS
21
PUBLIC INCIDENTS
22
PUBLIC INCIDENTS
23
PUBLIC INCIDENTS
24
PUBLIC INCIDENTS
25
PUBLIC INCIDENTS
26
PUBLIC INCIDENTS
27
WHAT IS DAB?
WHAT IS RDS?
DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different
modulation method compared to FM and AM. DAB uses a technique called
COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the
audio signals onto a carrier frequency. DAB also can transmit additional data,
such as station information, song titles and traffic reports, but it uses a different
method to transmit this data, it uses the DAB EPG (Electronic Program Guide)
that allows for the transmission of more advanced information than RDS.
RDS (Radio Data System) is a technology that is primarily used for FM radio, it
allows for the transmission of additional data, such as song titles, station
information, and traffic reports, over FM radio waves.
Case #13 – Adtec Digital
Digital Video Broadcasting (DVB)
Flexible and powerful, it ensures perfect sound
quality and full compatibility with radio
broadcasting standards and can be used
simultaneously for FM and HD, DAB, DRM or
streaming.
29
RADIO PROCESSING
30
INPUT/OUTPUT
Many audio processors and other IoT
devices come with built-in web
interfaces or APIs that allow for
remote management and control, and
software such as "Remote Control"
can be used to access these
interfaces. This can be useful for
adjusting settings, monitoring the
performance of the equipment, and
troubleshooting problems remotely.
VECTORS [BLACKBOX]
• The network-connected device
- Web interface (PHP, CGI, Shell scripts), HTTP
- Telnet: Link&Share terminal server
- ELF32 binaries (Linux/ARM)
- Firmware?
• The software (thick client), Windows 10
- SOUND4 Server.exe (64bit)
- SOUND4 Remote Control.exe (32bit)
- LinkAndShare Transmitter.exe (32bit)
32
INVESTIGATION
• DuckDuckGo, Documentation, OpenAI, YouTube
• Penetration test
-> Manual analysis + scan/map
• Coverage-guided fuzzing
• Source code review
• OSINT + exposure
-> Shodan, BinaryEdge
33
RESULTS
34
RESULTS
• 25 0-days and counting 
• 107 radio stations affected
• No response from the vendor(s) 
• Collab with national CERTs and VINCE (CISA)
• CVEs pending… but we don’t care about that
35
36
FORMAT STRING IN USERNAME ENV
(LinkAndShareTransmitter.exe)
37
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
38
> set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
> echo %username%
> AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
39
40
JACKALOPE + WINAFL
SOUND4 Remote Control.exe (vc_s4client.dll)
41
MAIN INTERFACE
SOUND4 Remote Control.exe
42
MAIN INTERFACE
SOUND4 Remote Control.exe
43
44
ADDING USERS
45
COMMUNICATION
46
RDS ENCODER
47
OUTPUTS
48
TELNET
49
TELNET
50
INTERNET
STREAMING
IP CONNECT
NEWS FLASH FROM THE AI
WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E
HACKER TAKE OVER A BROADCAST SIGNAL ?
“If an audio processor is hacked, it is possible that the hacker could
take over the broadcast signal. Depending on the specific device and
the level of access gained by the hacker, they could potentially modify
the audio content, disrupt the transmission, or even gain control over
the entire broadcast system.
However, it's important to note that these kind of hacks are not easy to
carry out and would require a high level of technical knowledge and
skill. Additionally, most IoT devices have some form of security
measures in place to prevent unauthorized access, such as firewalls,
encryption and authentication.”
51
…
if (isset($_POST['username']) && isset($_POST['password'])) {
$ret = -1;
exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server
_check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret);
…
52
FIRMWARE GLIMPSE: WEB GI
(login.php)
VULNERABILITIES!
Privilege Escalation
Cross-Site Request Forgery
Authorization Bypass
Denial of Service
Authentication Bypass
ICMP Flood Attack
Information Disclosure
Command Injection
SQL Injection
Cross-Site Scripting
Directory Traversal
Pre-auth Factory Reset
Stack-based Buffer Overflow
Default Credentials
Hard-coded Credentials
Cleartext Storage and Communication
Vulnerable Libraries/Binaries
Broadcast Signal Hijacking
54
DEMO::RCE
55
JUST ANOTHER SHOUTOUT
• Radio and broadcast signal intrusion is a serious security
concern that can disrupt communications and cause
confusion and panic among the public.
• Security is often overlooked in the radio and
broadcast industry, leaving exposed devices and
components online and vulnerable to attack.
• IoT vendors need to have more awareness about
security and include security in their software
development life cycle (SDLC) pipeline to
prevent vulnerabilities from being introduced in
their products.
THANK YOU
HEK.SI - 2023
@zeroscience
www.zeroscience.mk
56
57

More Related Content

What's hot

Transforming Adversary Emulation Into a Data Analysis Question
Transforming Adversary Emulation Into a Data Analysis QuestionTransforming Adversary Emulation Into a Data Analysis Question
Transforming Adversary Emulation Into a Data Analysis QuestionMITRE - ATT&CKcon
 
Παιδιά με διάσπαση προσοχής - υπερκινητικότητα
Παιδιά με διάσπαση προσοχής - υπερκινητικότηταΠαιδιά με διάσπαση προσοχής - υπερκινητικότητα
Παιδιά με διάσπαση προσοχής - υπερκινητικότηταEleni Georgiopoulou
 
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)Ηλιάδης Ηλίας
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)Emil Tan
 

What's hot (6)

Transforming Adversary Emulation Into a Data Analysis Question
Transforming Adversary Emulation Into a Data Analysis QuestionTransforming Adversary Emulation Into a Data Analysis Question
Transforming Adversary Emulation Into a Data Analysis Question
 
Παιδιά με διάσπαση προσοχής - υπερκινητικότητα
Παιδιά με διάσπαση προσοχής - υπερκινητικότηταΠαιδιά με διάσπαση προσοχής - υπερκινητικότητα
Παιδιά με διάσπαση προσοχής - υπερκινητικότητα
 
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)
Φύλλα εργασίας για τη Συναισθηματική Αγωγή (1)
 
prodaja profesionalnim kupcima
prodaja profesionalnim kupcimaprodaja profesionalnim kupcima
prodaja profesionalnim kupcima
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 

Similar to BROADCAST SIGNAL INTRUSION Hacking radio stations

Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated RobotAniket Bhor
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Vikas Mehta
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomAndrew Trickett
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)Craig Bayliss
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technologykp12 buniel
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan Himanshu Gupta
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system pptNilgiri publicity
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...IRJET Journal
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentationapral
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericssonsamudra28th
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky FannyCarl Ford
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building ControlsWayne Caswell
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)Rahul Phulwariya
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technologyTanvir Taj
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolutionAJAL A J
 

Similar to BROADCAST SIGNAL INTRUSION Hacking radio stations (20)

Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
Mototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine TelecomMototrbo Overview Dec 2014-Pennine Telecom
Mototrbo Overview Dec 2014-Pennine Telecom
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Andromeda Brochure (1)
Andromeda Brochure (1)Andromeda Brochure (1)
Andromeda Brochure (1)
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
 
Summer Training At Doordarshan
Summer Training At Doordarshan Summer Training At Doordarshan
Summer Training At Doordarshan
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
 
Apral main presentation
Apral main presentationApral main presentation
Apral main presentation
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
IEEE Home & Building Controls
IEEE Home & Building ControlsIEEE Home & Building Controls
IEEE Home & Building Controls
 
AAI Report on CNS (winter training)
AAI Report on CNS (winter training)AAI Report on CNS (winter training)
AAI Report on CNS (winter training)
 
VHF Communication Basics Part 3
VHF Communication  Basics Part 3VHF Communication  Basics Part 3
VHF Communication Basics Part 3
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
 

More from Zero Science Lab

Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Zero Science Lab
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелZero Science Lab
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Zero Science Lab
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsZero Science Lab
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebZero Science Lab
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2Zero Science Lab
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityZero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTZero Science Lab
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаZero Science Lab
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Zero Science Lab
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)Zero Science Lab
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)Zero Science Lab
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Zero Science Lab
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationZero Science Lab
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With GoogleZero Science Lab
 

More from Zero Science Lab (18)

Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
Пенетрациско тестирање на биометриски систем за контрола на пристап - Кратка ...
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Анализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернелАнализа на оддалечена експлоатациjа во Linux кернел
Анализа на оддалечена експлоатациjа во Linux кернел
 
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
Изучување на случај: Иницијална безбедносна анализа на изворен код кај систем...
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2CloudFlare vs Incapsula: Round 2
CloudFlare vs Incapsula: Round 2
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
 
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPTПреоптоварување на баферот и безбедносни механизми на меморијата PPT
Преоптоварување на баферот и безбедносни механизми на меморијата PPT
 
Преоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијатаПреоптоварување на баферот и безбедносни механизми на меморијата
Преоптоварување на баферот и безбедносни механизми на меморијата
 
Vulnerability Discovery (MK)
Vulnerability Discovery (MK)Vulnerability Discovery (MK)
Vulnerability Discovery (MK)
 
M3t4splo1t
M3t4splo1tM3t4splo1t
M3t4splo1t
 
The Metasploit Framework (MK)
The Metasploit Framework (MK)The Metasploit Framework (MK)
The Metasploit Framework (MK)
 
IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)IDS - Intrusion Detection Systems (MK)
IDS - Intrusion Detection Systems (MK)
 
OWASP Bulgaria
OWASP BulgariaOWASP Bulgaria
OWASP Bulgaria
 
Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)Информациско безбедносна проценка на веб апликации (изучување на случај)
Информациско безбедносна проценка на веб апликации (изучување на случај)
 
Grsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical ApplicationGrsecurity - Theoretical and Practical Application
Grsecurity - Theoretical and Practical Application
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 

Recently uploaded

Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...nagunakhan
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一zul5vf0pq
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service LucknowAlambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service Lucknowmakika9823
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...ur8mqw8e
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一ga6c6bdl
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfchapmanellie27
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一ss ss
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaUnited Arab Emirates
 
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样qaffana
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Pooja Nehwal
 

Recently uploaded (20)

Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565
 
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service LucknowAlambagh Call Girl 9548273370 , Call Girls Service Lucknow
Alambagh Call Girl 9548273370 , Call Girls Service Lucknow
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
 
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样
原版制作美国天普大学毕业证(本硕)tu毕业证明原版一模一样
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
 

BROADCAST SIGNAL INTRUSION Hacking radio stations

  • 2. Gjoko Krstic • Founder of Zero Science Lab2 • Offensive security research lead at ING • Member of g00g00tka group • Cybernetics student ☺ 2
  • 3. AGENDA • Introduction • Radio Station Components • Broadcast Signal Intrusion • ZSL Method • Conclusion • End of Transmission 3
  • 4. 4 Guglielmo Marconi, an Italian inventor and electrical engineer, is credited with the invention of the radio in 1894 and demonstrated in 1895. He continued to develop and improve his system, and in 1901 he successfully transmitted the first transatlantic radio signal. Alexander Graham Bell, an American inventor, scientist, and teacher of the deaf, is also considered one of the pioneers of radio technology. He developed an early version of the radio, which he called the "photophone," that used light waves to transmit sound. BRIEF HISTORY
  • 5. 5 BROADCAST TYPES STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB Internet radio, which allows listeners to stream audio over the internet. AM (Amplitude Modulation) radio, which is the traditional type of radio broadcasting and uses variations in the amplitude (or strength) of a radio wave to transmit sound. FM (Frequency Modulation) radio, which uses variations in the frequency of a radio wave to transmit sound. FM radio generally provides better sound quality than AM radio. Satellite radio, which is a subscription-based service that uses a network of satellites to transmit radio signals. HD Radio, which is a digital technology that allows FM and AM stations to broadcast additional channels and data alongside their traditional analog signals.
  • 6. 1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE. 2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION. 3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM. 4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT VIA AN ANTENNA. 5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR. 6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE. 7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND PLAYS THE SOUND VIA SPEAKERS. 6 TYPICAL RADIO COMPONENTS
  • 7. 7
  • 8. 8
  • 9. 9
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. BROADCAST SIGNAL INTRUSION Broadcast signal intrusion is the unauthorized alteration or takeover of a broadcast signal. This can occur on television or radio broadcasts and can take many forms. Digital intrusion is more sophisticated and can include hacking into a station's computer systems to gain control of the signal, or intercepting and modifying the signal as it is being transmitted. 16
  • 27. 27 WHAT IS DAB? WHAT IS RDS? DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different modulation method compared to FM and AM. DAB uses a technique called COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the audio signals onto a carrier frequency. DAB also can transmit additional data, such as station information, song titles and traffic reports, but it uses a different method to transmit this data, it uses the DAB EPG (Electronic Program Guide) that allows for the transmission of more advanced information than RDS. RDS (Radio Data System) is a technology that is primarily used for FM radio, it allows for the transmission of additional data, such as song titles, station information, and traffic reports, over FM radio waves.
  • 28. Case #13 – Adtec Digital Digital Video Broadcasting (DVB)
  • 29. Flexible and powerful, it ensures perfect sound quality and full compatibility with radio broadcasting standards and can be used simultaneously for FM and HD, DAB, DRM or streaming. 29 RADIO PROCESSING
  • 31. Many audio processors and other IoT devices come with built-in web interfaces or APIs that allow for remote management and control, and software such as "Remote Control" can be used to access these interfaces. This can be useful for adjusting settings, monitoring the performance of the equipment, and troubleshooting problems remotely.
  • 32. VECTORS [BLACKBOX] • The network-connected device - Web interface (PHP, CGI, Shell scripts), HTTP - Telnet: Link&Share terminal server - ELF32 binaries (Linux/ARM) - Firmware? • The software (thick client), Windows 10 - SOUND4 Server.exe (64bit) - SOUND4 Remote Control.exe (32bit) - LinkAndShare Transmitter.exe (32bit) 32
  • 33. INVESTIGATION • DuckDuckGo, Documentation, OpenAI, YouTube • Penetration test -> Manual analysis + scan/map • Coverage-guided fuzzing • Source code review • OSINT + exposure -> Shodan, BinaryEdge 33
  • 35. RESULTS • 25 0-days and counting  • 107 radio stations affected • No response from the vendor(s)  • Collab with national CERTs and VINCE (CISA) • CVEs pending… but we don’t care about that 35
  • 36. 36 FORMAT STRING IN USERNAME ENV (LinkAndShareTransmitter.exe)
  • 37. 37 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 38. 38 > set username=AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n > echo %username% > AAAA_%x_%x_%x_%x_BBBB_%p_%p_%p_%p_CCCC_%n
  • 39. 39
  • 40. 40 JACKALOPE + WINAFL SOUND4 Remote Control.exe (vc_s4client.dll)
  • 43. 43
  • 51. NEWS FLASH FROM THE AI WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E HACKER TAKE OVER A BROADCAST SIGNAL ? “If an audio processor is hacked, it is possible that the hacker could take over the broadcast signal. Depending on the specific device and the level of access gained by the hacker, they could potentially modify the audio content, disrupt the transmission, or even gain control over the entire broadcast system. However, it's important to note that these kind of hacks are not easy to carry out and would require a high level of technical knowledge and skill. Additionally, most IoT devices have some form of security measures in place to prevent unauthorized access, such as firewalls, encryption and authentication.” 51
  • 52. … if (isset($_POST['username']) && isset($_POST['password'])) { $ret = -1; exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server _check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret); … 52 FIRMWARE GLIMPSE: WEB GI (login.php)
  • 53. VULNERABILITIES! Privilege Escalation Cross-Site Request Forgery Authorization Bypass Denial of Service Authentication Bypass ICMP Flood Attack Information Disclosure Command Injection SQL Injection Cross-Site Scripting Directory Traversal Pre-auth Factory Reset Stack-based Buffer Overflow Default Credentials Hard-coded Credentials Cleartext Storage and Communication Vulnerable Libraries/Binaries Broadcast Signal Hijacking
  • 55. 55 JUST ANOTHER SHOUTOUT • Radio and broadcast signal intrusion is a serious security concern that can disrupt communications and cause confusion and panic among the public. • Security is often overlooked in the radio and broadcast industry, leaving exposed devices and components online and vulnerable to attack. • IoT vendors need to have more awareness about security and include security in their software development life cycle (SDLC) pipeline to prevent vulnerabilities from being introduced in their products.
  • 56. THANK YOU HEK.SI - 2023 @zeroscience www.zeroscience.mk 56
  • 57. 57