mlns='http://www.w3.org/1999/xhtml'>
PLEASE JOIN US FOR THE NEXT INSTALLMENT IN THE BLACK HAT WEBCAST SERIES |
|
|
|
BLEEDINGBIT: Your APs Belong To Us |
|
|
|
Thursday, July 18, 2019 11:00AM - 12:00PM PDT // 60 MINUTES, INCLUDING Q&A | Connectivity drives innovation with good cause. Interacting with the world without wires attached is more convenient. To utilize such innovations, enterprise Wi-Fi access points are increasingly embedding BLE (Bluetooth Low Energy) chips. While these chips provide new features, they also introduce risks that create a network attack surface. We will demonstrate BLEEDINGBIT, two 0-day vulnerabilities in Texas Instruments (TI) BLE chips used in Cisco, Meraki, and Aruba wireless access points, that allow an unauthenticated attacker to penetrate an enterprise network. Using BLEEDINGBIT, an attacker achieves RCE on the BLE chip, then leverages their position to compromise the OS of the access point and gain control. Once an access point is compromised, an attacker can read all traffic going through the access point, distribute malware, and move between network segments. Vulnerabilities like BLEEDINGBIT have frightening potential, as use of BLE skyrockets, driven by the rise of IoT devices. Some recent examples are secure 2FA keys like Google’s Titan Security Key and Apple’s “Find My” feature. Even implanted medical devices, such as Pacemakers, use BLE as a channel for telemetry and control. A BLEEDINGBIT-type attack against these devices comes out of thin air, bypassing existing security and catching organizations unprotected.
| |
|
|
| |
|
|
|
Ben Seri Ben Seri is the VP of Research at Armis, responsible for vulnerability research and reverse engineering. His main interest is exploring the uncharted territories of a variety of wireless protocols to detect unknown anomalies. Prior to Armis, Ben spent almost a decade in the Israeli Defense Forces Intelligence as a researcher and security engineer. In his free time Ben enjoys composing and playing as many instruments as the wireless protocols he's researching. |
|
|
|
Dor Zusman Dor Zusman is a researcher at Armis, with rich real-world experience in cybersecurity research. Prior to Armis, Dor was a researcher, network security specialist and a developer in the Israeli Defense Forces intelligence. Dor specializes in reverse engineering, vulnerability research and network pentesting of large corporate networks. He is currently reversing IoT devices in search for novel ways to abuse them as bridgeheads into corporate networks. In his free time, Dor likes to self-construct his house, to compensate for walls he takes down in cyberspace. |
|
|
|
| Upcoming Black Hat Events |
|
|
|
|