Difference between revisions of "Attify Badge IoT Hacking Device"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 1: Line 1:
{{Device|device_name=Attify Badge IoT Hacking Device|manufacturer=Attify Inc.|link=https://www.attify-store.com/collections/frontpage/products/attify-badge-uart-jtag-spi-i2c-pre-soldered-headers|image_link=https://stuff.elvis.science/uploads/models/attifybadgejpg.jpg|description=Das Attify Badge ist ein von Attify erstelltes Tool zur Bewertung der Hardwaresicherheit, mit dem über verschiedene Hardwarekommunikationsprotokolle zwischen einem PC und einem eingebetteten Gerät kommuniziert wird. Das Gerät wurde zunächst so gebaut, dass es bei Pentests für IoT-Geräte hilft, aber bald wurde das immense Potenzial erkannt.
{{Device|device_name=Attify Badge IoT Hacking Device|manufacturer=Attify Inc.|link=https://www.attify-store.com/collections/frontpage/products/attify-badge-uart-jtag-spi-i2c-pre-soldered-headers|image_link=https://stuff.elvis.science/uploads/models/attifybadgejpg.jpg|description=The Attify Badge is a hardware security assessment tool created by Attify that is used to communicate between a PC and an embedded device using various hardware communication protocols. The device was initially built to aid in pentests for IoT devices, but the immense potential was soon recognized. The Attify Badge uses an FTDI chip that can speak a wide variety of communication protocols and standards such as UART, SPI, I2C, 1-Wire and JTAG. This way one can interact with any IoT / embedded device for which one or more hardware communication ports are available. It supports both 3.3V and 5V, making it suitable for a large number of target devices. You don't need any special connection wires or cables to use the Attify Badge, but the standard Dupont jumper wires (also included in all Attify Badges). Attify Badge has a micro-USB port that allows it to be easily connected to your PC using a micro-USB cable. This is also included when you order an Attify Badge.
Das Attify Badge verwendet einen FTDI-Chip, mit dem eine Vielzahl von Kommunikationsprotokollen und -standards wie UART, SPI, I2C, 1-Wire und JTAG gesprochen werden können. Auf diese Weise kann man mit jedem IoT / Embedded-Gerät interagieren, für das ein oder mehrere Hardware-Kommunikationsports verfügbar sind. Es unterstützt sowohl 3,3 V als auch 5 V und ist daher für eine große Anzahl von Zielgeräten geeignet.
The Attify Badge uses an FTDI chip that can speak a wide variety of communication protocols and standards such as UART, SPI, I2C, 1-Wire and JTAG. This way one can interact with any IoT / embedded device for which one or more hardware communication ports are available. It supports both 3.3V and 5V, making it suitable for a large number of target devices.
Sie benötigen keine speziellen Anschlussdrähte oder -kabel, um Attify Badge zu verwenden, sondern die Standard-Dupont-Überbrückungsdrähte (auch in allen Attify Badges enthalten). Attify Badge verfügt über einen Micro-USB-Anschluss, über den es problemlos über ein Micro-USB-Kabel mit Ihrem PC verbunden werden kann. Dies ist auch im Lieferumfang enthalten, wenn Sie ein Attify Badge bestellen.|technicalSpecification=supportedTechnologies: UART, SPI, I2C, JTAG, GPIO|supportedTechnologies=UART, SPI, I2C, JTAG, GPIO|includedEquipment=1x Badge, 10x pin cables, 1x micro USB cable}}
You don't need any special connection wires or cables to use the Attify Badge, but the standard Dupont jumper wires (also included in all Attify Badges). Attify Badge has a micro-USB port that allows it to be easily connected to your PC using a micro-USB cable. This is also included when you order an Attify Badge.|technicalSpecification=supportedTechnologies: UART, SPI, I2C, JTAG, GPIO|supportedTechnologies=UART, SPI, I2C, JTAG, GPIO|includedEquipment=1x Badge, 10x pin cables, 1x micro USB cable}}
== Firmware ==
Firmware is software that is embedded in electronic devices and performs basic functions there. It occupies an intermediate position between hardware (i.e. the physical components of a device) and the application software (the possibly exchangeable programs of a device). It is mostly stored in a flash memory, an EPROM, EEPROM or ROM and cannot be exchanged by the user or can only be exchanged with special means or functions. The term is derived from the fact that firmware is functionally permanently connected to the hardware, which means that one cannot be used without the other.


== Benutzung ==
Firmware is both the operating software of various devices or components (e.g. mobile phone, game console, remote control, hard drive, printer) and the basic software of a computer (e.g. the BIOS anchored in a flash memory in personal computers), which is necessary to load and operate the operating system kernel of the actual operating system
Das Attify Badge Tool besteht aus 5 Hauptmodulen, die den 5 vom Attify Badge unterstützten Protokollen entsprechen:
== Usage ==
The Attify Badge Tool consists of 5 main modules that correspond to the 5 protocols supported by the Attify Badge:
<ul>
<ul>
<li>UART</li>
<li>UART</li>
Line 12: Line 15:
<li>GPIO</li>
<li>GPIO</li>
</ul>
</ul>
Wenn das Zielgerät, das man testen bzw. exploiten möchte, über eine dieser Schnittstellen verfügt, sollte Attify Badge das bevorzugte Tool für diesen Zweck sein.
If the target device you want to test or exploit has one of these interfaces, Attify Badge should be the tool of choice for this purpose.
== Was damit möglich ist ==
== What's possible ==
Mithilfe der UART-Kommunikation kann man einen seriellen Root-Zugriff auf das Zielsystem bekommen, man kann debugging Protokolle, U-Boot-Zugriff und Bootprotokolle holen. Weiters ist es möglich Firmware, API-Schlüssel oder andere vertrauliche Informationen, die auf dem Flash Chip gespeichert sind, über SPI oder I2C zu speichern. Man kann auch eine eigene Firmware per Flash Write auf das Gerät schreiben oder ein JTAG-Debugging mit OpenOCD und GDB durchführen.
With the help of UART communication you can get a serial root access to the target system, you can get debugging logs, U-Boot access and boot logs. It is also possible to save firmware, API keys or other confidential information stored on the flash chip via SPI or I2C. You can also write your own firmware to the device using Flash Write or perform JTAG debugging with OpenOCD and GDB.
Attify stellt auf Ihrer eigenen Website mehrere Tutorials zur Verfügung und verkauft auch ein eigenes [https://blog.attify.com/hack-iot-devices-embedded-exploitation/ IoT Exploitation Learning Kit], welches aber nicht für jeden Hobby Pentester leistbar ist. Weiters stellen sie ein [https://github.com/attify/attify-badge GitHub Repository] mit Beispiel Code zur Verfügung.
Attify provides several tutorials on its own website and also sells its own [https://blog.attify.com/hack-iot-devices-embedded-exploitation/ IoT Exploitation Learning Kit], which is not affordable for every hobby pentester is. They also provide a [https://github.com/attify/attify-badge GitHub Repository] with sample code.


== IoT Schwachstellen ==
== IoT Vulnerabilities ==
IoT Geräte befinden sich heutzutage überall, auch bei uns zuhause, um z.B. Lampen oder die Heizung mit dem Handy steuern zu können. Viele diese Geräte sind aber sehr unsicher, weil lange kein Wert auf die Sicherheit dieser Dinge gelegt wurde. Schwachstellen sind zum Beispiel:
Nowadays, IoT devices are everywhere, including at home, e.g. To be able to control lamps or the heating with the mobile phone. However, many of these devices are very unsafe because for a long time no value was placed on the security of these things. Weak points are for example:
<ul>
<ul>
<li>Schwache, leicht erratbare oder hartgecodete Passwörter. Oft werden auch einfach die Standard Passwörter verwendet.</li>
<li>Weak, easy to guess, or hard-coded passwords. Often the standard passwords are simply used.</li>
<li>Unsichere Netzwerk Services</li>
<li>Insecure network services</li>
<li>Fehlender sicherer Aktualisierungsmechanismus</li>
<li>Lack of a secure update mechanism</li>
<li>Unsichere Datenübertragung und Speicherung</li>
<li>Insecure data transmission and storage</li>
<li>u.v.m</li>
<li>and many more</li>
</ul>
</ul>

Revision as of 12:44, 21 December 2020

Information
Name Attify Badge IoT Hacking Device
Manufacturer Attify Inc.
Link https://www.attify-store.com/collections/frontpage/products/attify-badge-uart-jtag-spi-i2c-pre-soldered-headers
Specification supportedTechnologies: UART, SPI, I2C, JTAG, GPIO
Technologies UART, SPI, I2C, JTAG, GPIO
Included equipment 1x Badge, 10x pin cables, 1x micro USB cable
attifybadgejpg.jpg

Description

The Attify Badge is a hardware security assessment tool created by Attify that is used to communicate between a PC and an embedded device using various hardware communication protocols. The device was initially built to aid in pentests for IoT devices, but the immense potential was soon recognized. The Attify Badge uses an FTDI chip that can speak a wide variety of communication protocols and standards such as UART, SPI, I2C, 1-Wire and JTAG. This way one can interact with any IoT / embedded device for which one or more hardware communication ports are available. It supports both 3.3V and 5V, making it suitable for a large number of target devices. You don't need any special connection wires or cables to use the Attify Badge, but the standard Dupont jumper wires (also included in all Attify Badges). Attify Badge has a micro-USB port that allows it to be easily connected to your PC using a micro-USB cable. This is also included when you order an Attify Badge. The Attify Badge uses an FTDI chip that can speak a wide variety of communication protocols and standards such as UART, SPI, I2C, 1-Wire and JTAG. This way one can interact with any IoT / embedded device for which one or more hardware communication ports are available. It supports both 3.3V and 5V, making it suitable for a large number of target devices. You don't need any special connection wires or cables to use the Attify Badge, but the standard Dupont jumper wires (also included in all Attify Badges). Attify Badge has a micro-USB port that allows it to be easily connected to your PC using a micro-USB cable. This is also included when you order an Attify Badge.

Documentations

[[Category:{{{elviscategory}}}]]

Firmware

Firmware is software that is embedded in electronic devices and performs basic functions there. It occupies an intermediate position between hardware (i.e. the physical components of a device) and the application software (the possibly exchangeable programs of a device). It is mostly stored in a flash memory, an EPROM, EEPROM or ROM and cannot be exchanged by the user or can only be exchanged with special means or functions. The term is derived from the fact that firmware is functionally permanently connected to the hardware, which means that one cannot be used without the other.

Firmware is both the operating software of various devices or components (e.g. mobile phone, game console, remote control, hard drive, printer) and the basic software of a computer (e.g. the BIOS anchored in a flash memory in personal computers), which is necessary to load and operate the operating system kernel of the actual operating system

Usage

The Attify Badge Tool consists of 5 main modules that correspond to the 5 protocols supported by the Attify Badge:

  • UART
  • SPI
  • JTAG
  • I2C
  • GPIO

If the target device you want to test or exploit has one of these interfaces, Attify Badge should be the tool of choice for this purpose.

What's possible

With the help of UART communication you can get a serial root access to the target system, you can get debugging logs, U-Boot access and boot logs. It is also possible to save firmware, API keys or other confidential information stored on the flash chip via SPI or I2C. You can also write your own firmware to the device using Flash Write or perform JTAG debugging with OpenOCD and GDB. Attify provides several tutorials on its own website and also sells its own IoT Exploitation Learning Kit, which is not affordable for every hobby pentester is. They also provide a GitHub Repository with sample code.

IoT Vulnerabilities

Nowadays, IoT devices are everywhere, including at home, e.g. To be able to control lamps or the heating with the mobile phone. However, many of these devices are very unsafe because for a long time no value was placed on the security of these things. Weak points are for example:

  • Weak, easy to guess, or hard-coded passwords. Often the standard passwords are simply used.
  • Insecure network services
  • Lack of a secure update mechanism
  • Insecure data transmission and storage
  • and many more