Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

Поделиться
HTML-код
  • Опубликовано: 4 окт 2024

Комментарии • 88

  • @sent4dc
    @sent4dc 7 лет назад +125

    Pretty cool. But one suggestion: watch on 1.5 or 1.25 speed.

    • @einsteinx2
      @einsteinx2 6 лет назад +4

      sent4dc not only was it way better to watch that way, but I had no idea until now that you could increase playback speed in the RUclips app! Thanks!!

    • @easyappscompany
      @easyappscompany 5 лет назад

      SHIT MAN YES ITS SO SLOW

    • @easyappscompany
      @easyappscompany 5 лет назад

      The worst thing cannot see on 1.25

    • @Miawgician
      @Miawgician 5 лет назад

      now he rapping hahaha

    • @tayloro_o6448
      @tayloro_o6448 5 лет назад

      thanks much appreciated

  • @ZarkowsWorld
    @ZarkowsWorld 5 лет назад +8

    And NSA and China's 'Cyber warefare' divisions have used this and not notified Broadcom as it is very useful for them.

  • @maximalgamingnl9954
    @maximalgamingnl9954 5 лет назад +8

    just imagine sitting in a Software Engineering class, and just 2 people there having macs, then you say 'Your laptops will crash in 10 seconds', and then you do something like this: 31:00 xD

  • @TurboWindex
    @TurboWindex 3 года назад

    The only time I like to hear "Game Over" is at a black hat presentation.

  • @bitcode_
    @bitcode_ 6 лет назад +10

    Repository unavailable due to DMCA takedown.

  • @changdi2042
    @changdi2042 6 лет назад +16

    Mark at: 28:58 (Auto-Join a new & untrusted Wifi) 46:00 (the Demo starts)

  • @blackneos940
    @blackneos940 6 лет назад +1

    The OpenBSD Devs would LOVE this video..... (:

  • @johnnyprimavera2
    @johnnyprimavera2 7 лет назад +60

    One of the slowest talks I've ever seen. Really interesting though.

    • @ColtonBs
      @ColtonBs 7 лет назад +1

      Joan Montserrat so slow that I’m already bored from watching it. How many times can someone repeat what they’re saying in a different way before you’re tired of hearing them? Less than 10 minutes in and I’m already over it.

    • @Adam-eb3rs
      @Adam-eb3rs 7 лет назад +3

      Colton B ummmm aarrrrrrmmmm ummmmmmmm ummmmmmm jesus

    • @nullablebool
      @nullablebool 7 лет назад +7

      I just watch it with a 2x playback speed.

    • @judgeomega
      @judgeomega 7 лет назад +6

      I keep my speed at least at 1.25, often at 1.5. Time is the most valuable commodity in the world.

    • @ColtonBs
      @ColtonBs 7 лет назад +2

      Could have been half the length if he had a full presentation ready, instead of long periods of silence and “um” being used almost every other phrase. He spent more time on his slides than figuring out what to say with the slides. Very disappointed with this speaker, and I hope that Black Hat refuses any of his future talks unless he is actually prepared.

  • @RalphInRalphWorld
    @RalphInRalphWorld 7 лет назад +46

    Good thing the firmware is closed source to prevent this sort of thing...

    • @firefly618
      @firefly618 7 лет назад +8

      lol

    • @yurigeinish3018
      @yurigeinish3018 6 лет назад +31

      Security by obscurity doesn't work.

    • @SkyGodKing
      @SkyGodKing 6 лет назад +2

      Well you could argue if they stopped the source code from being leaked then this exploit wouldn't have been discovered

    • @BibendiYT
      @BibendiYT 6 лет назад +5

      It wouldn't been discovered YET

    • @MultiClittle
      @MultiClittle 6 лет назад +4

      Yuri Geinish - is joke

  • @ak_as_gamer942
    @ak_as_gamer942 7 лет назад +25

    owesome attack really helpful

  • @bencesarosi7718
    @bencesarosi7718 6 лет назад +4

    This is a very interesting project. Thing is, however, he/they didn't ever compromise Android, nor iOS, thus the title is absolutely misleading. The content is still very worthy and thought-inducing IMHO, but indeed doesn't justify the full hour presentation time people are complaining about.

    • @gradertfamilymakes
      @gradertfamilymakes 6 лет назад +1

      It's not apparent to you that access in this memory could allow for code to be executed within the OS of the phone correct?

    • @bencesarosi7718
      @bencesarosi7718 6 лет назад +2

      Didn't really delve more into it than what is already presented here, but as far as my understanding goes, the code you get to run here runs on a dedicated ARM unit, in dedicated memory, belonging exclusively to the WiFi chipset. That is, you'll need at least one other vulnerability concerning the interface between this chipset and the OS in order to get the main CPU running the system to execute your payload in the context of the OS.
      It's a really interesting possibility, but apparently it is just as far from compromising Android/iOS as is an SQL injection from hijacking the whole system the website is hosted on. Nevertheless it opens up some new perspectives...

  • @AmeerHamza-cy6km
    @AmeerHamza-cy6km 6 лет назад +3

    thanks for speaking this way , so people who do not speak English can easily understand .

  • @abdelrahmangamalmahdy
    @abdelrahmangamalmahdy 5 лет назад +4

    I am just wondering why he didn't inject any system calls to compromise the android/ios system itself.. All I'm seeing is just taking over the wireless chip but not the application system itself. I think it is very possible to use the trust-relationship between the wifi software and other system resources to hack the application software.. so this seems like an incomplete project or maybe he has already sold such attack privately to a company or possibly a government!

    • @TopherSnags
      @TopherSnags 5 лет назад

      Truth Seeker I was wondering this as well.

    • @Atomkukac1
      @Atomkukac1 4 года назад +4

      Probalby 24 bytes are not enough and you need to at least dupicate potential system calls to cover both iOS and Android. Rule2: No assumptions of the system.

  • @kuqezi8081
    @kuqezi8081 5 лет назад +2

    I had to grin when I saw the whoami at the beginning 00:30 :)

  • @SeoKungFu
    @SeoKungFu 7 лет назад +2

    Lovely #PWNAGE !

  • @coprice94
    @coprice94 5 лет назад +3

    Glad I use flip phone

  • @LostArchivist
    @LostArchivist 5 лет назад +3

    So they are spooks basically. And they play by old-school rules.

  • @Baigle1
    @Baigle1 7 лет назад +8

    could this brick the broadcom chip if done wrong or purposely?

    • @Baigle1
      @Baigle1 7 лет назад

      i can definitely see a firmware attack used out of this if its even possible... like the hdd firmware patching modules that were unfinished in stuxnet back when it was running around with 0-days
      and who knows what is in intel amt/me or amd psp/secure processor to flash.. the intel amt memory region on motherboard is the same as smm code
      the ultimate persistence would be hardware or firmware..

    • @Ratzzo
      @Ratzzo 7 лет назад +1

      maybe. if you inject code in ram and call flashing facilities

    • @statinskill
      @statinskill 6 лет назад

      Sure. If you can find
      something important you can overwrite, a flash or a serial eeprom maybe. It probably won't work without a proper config. That said, why would you? There's nothing to be gained from this, all it means is they will ditch the phone they're using and get a new one. Maybe one where this doesn't work.

  • @pubcollize
    @pubcollize 7 лет назад +6

    It's not even 3 minutes in and he said "remote exploit" at least over 9000 times.

  • @blackfoxshooter
    @blackfoxshooter 4 года назад

    cool jacket

  • @zedeleyici.1337
    @zedeleyici.1337 2 года назад

    mükemmel

  • @jakubrichnavsky
    @jakubrichnavsky 7 лет назад +1

    50000 against milions

  • @livefreeprintguns
    @livefreeprintguns 6 лет назад +18

    Save yourself the 40 minutes and jog straight to 40m00s. Unless you want a lecture on what a "remote exploit" is (which I always thought was inherent) and in case you missed out on the past 20 years, a 30 minute tutorial on how WiFi works. It's literally a 10 minute demo stretched out to an hour of mostly yawnzzzzz.

  • @remusomega
    @remusomega 7 лет назад +1

    Wasn't this exploit already patched by apple?

    • @Tjalian
      @Tjalian 7 лет назад +8

      Probably. A lot of these exploits that are released at Blackhat after the time of reasonable disclosure has past, which gives plenty of time for developers to patch the exploits. If you're dragging your heels on patching the exploit, that's their problem, not his.

    • @coprice94
      @coprice94 5 лет назад +1

      No

  • @localhost9993
    @localhost9993 6 лет назад +1

    exploit link............./

    • @RahilKhan-ym9ej
      @RahilKhan-ym9ej 3 года назад

      @ChillSakura yaa 😂😂he need the link?? how

  • @EAGEEYE321
    @EAGEEYE321 3 года назад

    aaahhhh

  • @SilverPaladin
    @SilverPaladin 7 лет назад +8

    skip to the demo: ruclips.net/video/TDk2RId8LFo/видео.htmlm35s

    • @Adam-eb3rs
      @Adam-eb3rs 7 лет назад +14

      Steve Lawrence 45:35 for anyone who doesnt want to reload

  • @Carambolero
    @Carambolero 6 лет назад +3

    Nice talk. Please stop sniffing and drink some water.

  • @thekaiser4333
    @thekaiser4333 6 лет назад

    Sad.

  • @nosimpingnocap
    @nosimpingnocap 3 года назад +1

    He talking about Pegasus