Return to Video

35C3 - Internet of Dongs

  • 0:00 - 0:18
    35C3 preroll music
  • 0:18 - 0:23
    Herald: And I have one last announcement before
    we begin this talk. This is a personal
  • 0:23 - 0:28
    announcement to whoever slapped this
    sticker saying "for rectal use only" onto
  • 0:28 - 0:31
    my microphone.
    loud laughing
  • 0:31 - 0:34
    Microphones are not supposed to be used
    this way.
  • 0:34 - 0:42
    applause
  • 0:42 - 0:46
    Please trust me. I am very familiar with
    microphones.
  • 0:46 - 0:52
    laughing
    I know how they are supposed to be used.
  • 0:52 - 0:58
    However our next speaker is going to tell
    you about things that are supposed to be
  • 0:58 - 1:06
    used this way and about how to secure and
    protect those things. So please welcome
  • 1:06 - 1:12
    the honor and the talk you all came here
    to see. The Internet of dongs. A round of
  • 1:12 - 1:22
    applause.
    applause
  • 1:22 - 1:27
    Okay so hello everyone. My name is Werner.
    I'm working for a SEC consult as an IT
  • 1:27 - 1:33
    security consultant. And besides
    penetrating all the things at the SEC
  • 1:33 - 1:38
    consult's vulnerability lab, I have been
    studying information security for the last
  • 1:38 - 1:44
    five years at the University of Applied
    Sciences St. Pölten back in Austria and
  • 1:44 - 1:50
    about a year ago I was facing a massive
    challenge. Some people might know this
  • 1:50 - 1:55
    challenge This challenge was to select a
    proper topic for my master's thesis.
  • 1:55 - 2:02
    loud laughing
    You might know there are always those
  • 2:02 - 2:07
    predefined topics by the universities.
    Some of them are quite interesting. They
  • 2:07 - 2:11
    are taken - yeah - most of the time quite
    fast by the other students and you are
  • 2:11 - 2:16
    left with the boring topics and I thought
    to myself, I don't want to stress myself I
  • 2:16 - 2:21
    just want to define a topic by myself. And
    that was the challenge. So the first thing
  • 2:21 - 2:26
    I did to get a better overview of the
    topics was to take a look at the topics my
  • 2:26 - 2:30
    colleagues have chosen and created a word
    cloud out of that. So we have basically
  • 2:30 - 2:35
    all the interesting topics there we have
    bitcoins, we have GDPR, we have cyber
  • 2:35 - 2:41
    cyber cyber, we have DevOps management,
    malware. But some of you might have
  • 2:41 - 2:47
    allready noticed it. There is one topic
    missing at my colleagues thesises which is
  • 2:47 - 2:54
    very very important in the year 2018 and
    that's the Internet of Things. So I guess
  • 2:54 - 2:58
    I don't have to explain here at the
    Congress what the Internet of Things is.
  • 2:58 - 3:02
    It's basically the interconnection of all
    the devices which were analog a few years
  • 3:02 - 3:09
    ago, with each other and even worse over
    the Internet. I thought maybe I can
  • 3:09 - 3:14
    combine the knowledge gathered at SEC
    consult and conduct a penetration test in
  • 3:14 - 3:18
    this Internet of Things. The problem here
    is still there are like millions of
  • 3:18 - 3:22
    products and I just have to write one
    thesis, so I have to select one
  • 3:22 - 3:28
    subcategory in this Internet of Things to
    conduct a penetration test on. Of course
  • 3:28 - 3:33
    the first thing which came to my mind
    where smart home devices we already had a
  • 3:33 - 3:37
    lot of interesting talks about smart home
    devices. There are like smart coffee
  • 3:37 - 3:46
    machines, smart lawnmowers, light bulbs,
    thermometers and stuff like that. But this
  • 3:46 - 3:51
    category has two problems. So, first of
    all there is already a lot of research
  • 3:51 - 3:57
    done. And the other problem is the impact.
    So, I don't want to downplay the
  • 3:57 - 4:01
    vulnerabilities which were found there,
    but when there are vulnerabilities found I
  • 4:01 - 4:08
    mean, yeah, if there is a DDoS on your
    lawnmower you can just go out through your
  • 4:08 - 4:12
    garden and mowe the lawn yourself. It's
    not that big of a deal. So I thought I
  • 4:12 - 4:18
    have to select a subcategory where the
    impact is a little bit more critical. And
  • 4:18 - 4:25
    I came up with the following devices. So,
    for example: Smart dolls. There was this
  • 4:25 - 4:30
    doll Kyla. Some of you might know it.
    Someone found out that it has a built in
  • 4:30 - 4:35
    microphone and the data was sent to some
    dubious service in some dubious countries
  • 4:35 - 4:39
    and it was even declared as an illegal
    telecommunication device. It had to be
  • 4:39 - 4:43
    destroyed. Or there is a lot of
    interesting research at baby monitors. A
  • 4:43 - 4:47
    colleague of mine wrote a very interesting
    blog post, you should take a look at it.
  • 4:47 - 4:54
    Or devices which affect our body. So, for
    example smart pacemakers. They were
  • 4:54 - 4:58
    developed by St. Jude Medical, that's the
    biggest manufacturer of pacemakers in the
  • 4:58 - 5:04
    world. And they built a pacemaker which is
    programmable via Bluetooth. But yeah, they
  • 5:04 - 5:08
    forgot authentication, which is quite a
    big of a problem when everyone is able to
  • 5:08 - 5:17
    reprogram your pacemaker. So as we can
    see, at this categories the impact would
  • 5:17 - 5:22
    be quite critical but there is again a lot
    of research done. So the deadline was
  • 5:22 - 5:28
    coming closer and closer. I had to hand in
    some kind of topic for my master thesis. I
  • 5:28 - 5:32
    was doing a lot of brainstorming with
    myself and then suddenly it came to my
  • 5:32 - 5:38
    mind. There is one category out there
    where the impact would be very critical.
  • 5:38 - 5:42
    And there is not a lot of research done
    and that's the Internet of dildos. So
  • 5:42 - 5:49
    that's basically the integration of sex
    toys into the Internet of Things where we
  • 5:49 - 5:56
    interconnect the dildos with each other
    and over the Internet. But before I'm
  • 5:56 - 6:02
    going to show you what I've found in this
    internet of dildos, we have to talk about
  • 6:02 - 6:07
    history, because you might think now
    that's something new. But that's not true
  • 6:07 - 6:13
    because the Internet of dildos as we know
    it is existing for about 50 to 60 years.
  • 6:13 - 6:18
    And as always when there are new
    inventions or interesting ideas, they
  • 6:18 - 6:24
    first appear in movies and that also
    applies to the Internet of dildos. So,
  • 6:24 - 6:28
    those are quite old movies, we have for
    example Barbarella or Flash Gordon or
  • 6:28 - 6:34
    Orgazmo. And in those movies, those are
    real movies - it's not a joke.
  • 6:34 - 6:39
    laughing
    The Internet of dildos appeared first in
  • 6:39 - 6:44
    this movies. So for example at Barbarella
    the evil guy used a device called the
  • 6:44 - 6:50
    Orgasmotron to cause so high levels of
    arousal in humanity, to kill people. So
  • 6:50 - 6:55
    basically the Internet to dildos was in
    the 60s and 70s a weapon of mass
  • 6:55 - 6:59
    destruction
    loud laughing
  • 6:59 - 7:09
    and not the weapon of mass pleasure, as it
    should be. So a few years later a whole
  • 7:09 - 7:15
    research area was formed. This research
    area is called teledildonics and that's
  • 7:15 - 7:19
    also not a joke again.
    laughing
  • 7:19 - 7:26
    And it was first mentioned by Ted Nelson.
    He is a technical philosopher and he coins
  • 7:26 - 7:32
    quite well-known terms like Transclusion,
    Virtuality and Intertwingularity and
  • 7:32 - 7:36
    Teledildonics. And he mentioned this term
    at first in a book called Computer
  • 7:36 - 7:41
    Lib/Dream Machines. Very interesting book
    by the way. You should read it. And in
  • 7:41 - 7:49
    this book he did interviews with people
    who had yeah innovative and interesting
  • 7:49 - 7:54
    ideas for the time but the technology was
    not just ready yet. He did an interview
  • 7:54 - 8:01
    with a guy called How Wachspress and How
    Wachspress developed a device or had the
  • 8:01 - 8:05
    idea for a device called auditac. When you
    Google for auditac you find quite an
  • 8:05 - 8:11
    ancient website called auditac.com. And
    when you dig a little bit deeper you can
  • 8:11 - 8:16
    find out that he's still looking to find a
    manufacturer to sell his sonic stimulator.
  • 8:16 - 8:21
    Sounds already quite interesting and even
    has a patent and a small graphic for it.
  • 8:21 - 8:27
    So it's basically a radio with one input
    and two outputs. One input of course the
  • 8:27 - 8:32
    antenna and the two outputs are one for
    the headphones and the other output is for
  • 8:32 - 8:36
    this sonic stimulator, which is inserted
    from below in the human life-form.
  • 8:36 - 8:42
    laughing
    You even can find the patent on Google
  • 8:42 - 8:45
    Patents and he writes there in his
    abstract: Random or controlled
  • 8:45 - 8:49
    electronically synthesized signals are
    converted to sound waves that are directly
  • 8:49 - 8:54
    coupled to the skin of a life form, yeah
    such as a human body for example, to
  • 8:54 - 9:02
    stimulate the skin or internal portions of
    the life-form. So as we can see the ideas
  • 9:02 - 9:07
    were there, but the technology was just
    not ready in the 1970s and 1980s, but now
  • 9:07 - 9:13
    we're in the year 2018 and we are
    definitely ready for a penetration testing
  • 9:13 - 9:20
    the Internet of dildos. And before I'm
    going to talk about the test devices and
  • 9:20 - 9:24
    the vulnerabilities, I'm going to make a
    promise now. I will try to keep this as
  • 9:24 - 9:30
    serious as possible. I will try to keep
    the, I will call it the IPM stimulendous
  • 9:30 - 9:37
    per minutes as low as possible. Yeah, and
    now I just want to talk about the test
  • 9:37 - 9:41
    devices because those are very important.
    So I selected three test devices for my
  • 9:41 - 9:46
    master's thesis. On the right side we have
    the - that's not a joke again -
  • 9:46 - 9:49
    Vibratissimo Panty Buster. That's the real
    name.
  • 9:49 - 9:54
    laughing
    In the middle we have the MagicMotion
  • 9:54 - 10:01
    Flamingo and on the left side we have the
    RealLove Lydia. So the devices on the left
  • 10:01 - 10:05
    side and in the middle have one thing in
    common. They are manufactured in China.
  • 10:05 - 10:10
    The device in the red right side is
    manufactured in Germany. So, I have to
  • 10:10 - 10:15
    admit I was a little bit biased because I
    thought I am going to take a look at the
  • 10:15 - 10:20
    Chinese devices first, because there will
    be a lot of low hanging fruits. Question
  • 10:20 - 10:24
    to the audience now: Who believes that I
    found most of the vulnerabilities in the
  • 10:24 - 10:30
    Chinese devices? Raise your hand.
    laughing
  • 10:30 - 10:37
    Who believes that have found most of the
    vulnerabilities in the german device? Who
  • 10:37 - 10:40
    believes that have found vulnerabilities
    everywhere?
  • 10:40 - 10:45
    loud laughing
    Yeah you're basically all right. But when
  • 10:45 - 10:50
    I took a look at the German device, I
    found so many really really critical
  • 10:50 - 10:54
    vulnerabilities that I immediately stopped
    there and wrote my whole thesis about the
  • 10:54 - 10:58
    Panty Buster.
    laughing
  • 10:58 - 11:04
    Okay, so the Panty Buster itself is just
    one product out of a whole product line. I
  • 11:04 - 11:08
    just bought the Panty Buster because it
    was the cheapest one. They are basically
  • 11:08 - 11:13
    using all the same backends, the same iOS
    and Android apps. And yeah, the Panty
  • 11:13 - 11:19
    Buster is basically a device which is
    connected via Bluetooth to a smartphone
  • 11:19 - 11:24
    and it can be used for example for long
    distance relationships. But there is way
  • 11:24 - 11:29
    more behind those apps, because there's
    like a whole social media network built
  • 11:29 - 11:35
    in. You can make group chats
    laughing
  • 11:35 - 11:40
    You can create image galleries, you can
    maintain friends lists.
  • 11:40 - 11:45
    loud laughing
    Yeah, that's real. That's real. It's not a
  • 11:45 - 11:50
    joke.
    applause
  • 11:50 - 11:56
    Yeah. And now we're going to analyze this
    Panty Buster and take it down to the last
  • 11:56 - 12:01
    parts. Yeah we're going to analyze the
    software. I'm going to tell you a little
  • 12:01 - 12:06
    bit about the transport layer and the
    hardware of course. So I'd like to start
  • 12:06 - 12:09
    with the software. So, the first
    vulnerability we have to talk about this
  • 12:09 - 12:13
    is so-called information disclosure. So
    you might think nah boring, just some
  • 12:13 - 12:18
    random version numbers. Yeah that's true
    most of the time information disclosures
  • 12:18 - 12:25
    are boring. But in this case it's really
    critical because I found a so-called
  • 12:25 - 12:30
    .DS_STORE file the web root. A .DS_STORE
    file is basically a meta data file which
  • 12:30 - 12:36
    is created by the MacOS finder and it
    contains a lot of metadata, like files and
  • 12:36 - 12:41
    folder names. So when you find such a file
    in a web root you have basically a side
  • 12:41 - 12:46
    channel directory listing. This .DS_STORE
    file has a proprietary format but as for
  • 12:46 - 12:52
    all problems in life, there is a Python
    module to decode it. Yeah. And I decoded
  • 12:52 - 12:56
    that .DS_STORE file and I was presented
    with the following contents. So it's
  • 12:56 - 12:59
    basically a side channel directory listing
    of the web root. There are a lot of
  • 12:59 - 13:05
    interesting files and folders so for
    example: old page example, I have no idea
  • 13:05 - 13:09
    why it's there in the productive
    environment. There is a database folder
  • 13:09 - 13:14
    but the most interesting folder is the
    config folder. So whenever we get to the
  • 13:14 - 13:20
    config folder, there was real directory
    listing enabled and there was one file in
  • 13:20 - 13:32
    there and it was called config.php.inc
    with the following contents. So basically
  • 13:32 - 13:38
    I had now access to the database hostname,
    the database names usernames and
  • 13:38 - 13:43
    passwords. The problem now was that as we
    can see the database host is just
  • 13:43 - 13:48
    localhost, there might be a chance that
    it's not directly reachable via the
  • 13:48 - 13:52
    Internet. And we have to find the so-
    called exposed administrative interface to
  • 13:52 - 13:58
    connect to the database. Yeah of course
    the first thing I did was to do a
  • 13:58 - 14:05
    portscan.
    laughing
  • 14:05 - 14:17
    applause
    A lot of interesting ports. Sadly no SQL
  • 14:17 - 14:25
    ports. But some of you might remember
    this, let's call it weird brown orange web
  • 14:25 - 14:33
    application, called phpMyAdmin and I found
    a subdomain which contained the phpMyAdmin
  • 14:33 - 14:36
    installation and I was able to use those
    credentials to connect directly to the
  • 14:36 - 14:52
    database and get access to all the data.
    applause
  • 14:52 - 14:57
    So I basically had access now to the real
    life addresses, to messages in clear text
  • 14:57 - 15:05
    which were exchanged, images, videos and a
    lot of other stuff. So, yeah. And what
  • 15:05 - 15:10
    hurt me the most was the following slide,
    because the passwords were stored in clear
  • 15:10 - 15:20
    text and that's really not necessary in
    the 21st century. Okay. So in real life
  • 15:20 - 15:28
    about 30 minutes have passed by
    loud laughing
  • 15:28 - 15:33
    and I tried to do a write up as fast as
    possible and submitted to the german CERT-
  • 15:33 - 15:38
    Bund. And yeah a few minutes later, I got
    a really interesting call from the german
  • 15:38 - 15:42
    CERT-Bund. They told me that the already
    informed the manufacturer and they're
  • 15:42 - 15:48
    already trying to fix those problems. So
    my problem was now that I still had to
  • 15:48 - 15:53
    write my master thesis and I just have
    content for about 30 pages now and I need
  • 15:53 - 15:58
    like hundred pages. So I did a little bit
    of more research and found way more
  • 15:58 - 16:02
    vulnerabilities of course. And the next
    vulnerability I'm going to talk about is
  • 16:02 - 16:07
    the so-called insecure Direct Object
    reference. Sounds cryptic, but it isn't.
  • 16:07 - 16:11
    It's basically always a vulnerability
    which is consisting of two sub problems.
  • 16:11 - 16:17
    So the first problem is, when someone
    uploads resources to a backend those
  • 16:17 - 16:23
    resources are most of the time renamed, to
    like a random string which shouldn't be
  • 16:23 - 16:28
    guessable. The first problem would be if
    it would be guessable. But the second
  • 16:28 - 16:32
    thing is, there should be authorization
    checks in place. So if someone is able to
  • 16:32 - 16:40
    guess those unique identifiers, there
    should still be some like process which
  • 16:40 - 16:48
    should check if the user should even be
    able to download these resources. And in
  • 16:48 - 16:55
    this case, yeah, it was just really easy
    to guess the identifiers and there was no
  • 16:55 - 17:04
    authorization whatsoever. And I had to
    learn this the hard way, literally. There
  • 17:04 - 17:09
    is a feature in the smartphone apps,
    called galleries. So you can create
  • 17:09 - 17:13
    galleries, you can set the visibility to
    no one is able to see it, just your
  • 17:13 - 17:17
    friends are able to see it , everyone is
    able to see it. You can even set a
  • 17:17 - 17:24
    password on those galleries. Yeah. And
    just for a test I created a gallery with a
  • 17:24 - 17:28
    few cats and when you request the gallery,
    you see the following request. It's
  • 17:28 - 17:35
    userManager.php blah blah blah username
    password and some ID. And I thought maybe
  • 17:35 - 17:39
    I should change this ID. And I was
    presented with a dick pic.
  • 17:39 - 17:43
    laughing
    Yeah, the problem behind this is quite
  • 17:43 - 17:48
    easy. Everything which is stored on the
    server is renamed to a global counter. The
  • 17:48 - 17:53
    global counter is incremented by one after
    every upload. And there are no
  • 17:53 - 17:58
    authorization checks whatsoever, because
    the images are just stored in a server, so
  • 17:58 - 18:02
    it doesn't matter if you set a password or
    set the visibility. That's just nonsense
  • 18:02 - 18:10
    to do. OK. So the next vulnerability. Yeah
    I call it improper authentication. To be
  • 18:10 - 18:16
    honest it was just a weird authentication.
    At SEC consult I saw already a lot of
  • 18:16 - 18:21
    different ways of implementing
    authentication. Some are good some are
  • 18:21 - 18:24
    bad, but it can be fixed. But in this case
    it was just weird, I've never seen
  • 18:24 - 18:29
    something like that. It's basically like
    HTTP basic authentication but a little bit
  • 18:29 - 18:33
    worse.
    laughing
  • 18:33 - 18:37
    So normally authentication works as
    follows. You're sending a username and
  • 18:37 - 18:42
    password to a server and if this process
    is successful you get some kind of
  • 18:42 - 18:46
    authorization information like a cookie or
    an API token. You can use this cookie or
  • 18:46 - 18:54
    API token to authorize all the other
    requests. In this case every request
  • 18:54 - 18:57
    contains just username and password and
    clear text to authenticate through
  • 18:57 - 19:05
    requests. That's just weird to be honest.
    And also if your password is compromised,
  • 19:05 - 19:08
    it will also mean that you have to change
    your username because it's part of the
  • 19:08 - 19:14
    authentication information. So weird,
    weird implementation. Okay the next
  • 19:14 - 19:20
    vulnerability is called the remote
    pleasure version 1.0. It's 1.0 because
  • 19:20 - 19:26
    there is a 2.0 .
    laughing
  • 19:26 - 19:31
    There is a feature in those apps where you
    can create remote control links. They can
  • 19:31 - 19:36
    be sent via SMS or email and everyone who
    is in possession of those links can
  • 19:36 - 19:43
    directly control the devices. There is no
    extra confirmation needed. We'll take a
  • 19:43 - 19:53
    look at the email now. There is a button
    in the email called Quick Control and
  • 19:53 - 20:03
    there is an ID again. Yeah the thing is
    it's just a global counter again. And what
  • 20:03 - 20:07
    an attacker can do now is download the
    app, create his own quick control link,
  • 20:07 - 20:11
    decrement the ID and pleasure just random
    strangers on the Internet.
  • 20:11 - 20:25
    applause
    Okay I will show you guys a video now,
  • 20:25 - 20:32
    where I'm doing exactly that.
    laughing
  • 20:32 - 20:36
    So when the video is going to start...
    It's going to start, perfect. On the right
  • 20:36 - 20:41
    side we're going to see an attacker device
    which is just connected to the normal
  • 20:41 - 20:46
    mobile network. And the attacker creates
    his own quick control link and decrements
  • 20:46 - 20:51
    the ID. On the left side we can see
    another smartphone which is connected to
  • 20:51 - 20:59
    Wi-Fi, to have Internet access and via
    Bluetooth, to the smart sex toy. This
  • 20:59 - 21:05
    attacker device should now be able to
    control - yeah, you can see that now, in a
  • 21:05 - 21:23
    few seconds. That's just what I explained.
    silence
  • 21:23 - 21:26
    laughing
    There is no confirmation whatsoever so you
  • 21:26 - 21:33
    can directly control all the devices.
    Okay, I have to stop talking about
  • 21:33 - 21:37
    software now. There is a lot more like
    cross-scripting, HTTPs problems, outdated
  • 21:37 - 21:41
    software, but there is not enough time
    left now so we have to talk about the
  • 21:41 - 21:45
    transport layer. Before I'm going to tell
    you something about the vulnerabilities I
  • 21:45 - 21:52
    have identified, I will tell you something
    about Bluetooth low energy in general, the
  • 21:52 - 21:58
    security basics and how authentication and
    encryption works on a very high level. So
  • 21:58 - 22:03
    you can imagine that Bluetooth Low Energy
    basically works like a web API. So it's
  • 22:03 - 22:08
    very high level explanation. You have API
    endpoints. Those are the service
  • 22:08 - 22:12
    characteristics and you have properties
    where you can read and write to. So for
  • 22:12 - 22:18
    example the device name can be read or
    written to change the device name. There's
  • 22:18 - 22:22
    also a lot of other characteristics which
    will be very important when it comes to
  • 22:22 - 22:28
    remote pleasure version 2.0 a little bit
    later. So that's a very high level
  • 22:28 - 22:32
    explanation, i know, but we don't have
    enough time left. Talking about the
  • 22:32 - 22:39
    security basics Bluetooth Low Energy is
    using AES-CCM that's counter CBC with Mac.
  • 22:39 - 22:45
    That's basically considered secure but as
    we know, security also depends on the key
  • 22:45 - 22:50
    material and the key exchange. At
    Bluetooth Low Energy the key exchanged is
  • 22:50 - 22:54
    defined as the pairing methods. For
    Bluetooth Low Energy we have five pairing
  • 22:54 - 23:00
    methods. We have just "No Pairing". So
    yeah we basically throw packets into the
  • 23:00 - 23:06
    air and if a device is nearby it tries to
    do something with those packets. We have
  • 23:06 - 23:09
    "Just Works", we have "Out of Band
    Pairing", "Passkey" and "Numeric
  • 23:09 - 23:16
    Comparison". I don't have to tell you the
    details now. You all know those. It's
  • 23:16 - 23:19
    numeric comparison, where we compare
    numbers to exchange the key material. You
  • 23:19 - 23:25
    have the Passkey, which is yeah like
    always 0000 or 1234. We have Out of Band
  • 23:25 - 23:30
    Pairing, where the key material is
    exchanged via NFC for example and we have
  • 23:30 - 23:34
    just works, that's really secure, where
    the keys just set to zero and can be of
  • 23:34 - 23:42
    course be brute forced with ease, but it
    just works of course. So out of those five
  • 23:42 - 23:51
    methods, what does the audience think the
    sex toy is using? Is it using no pairing?
  • 23:51 - 23:59
    Raise your hands. Is it using any of the
    other more or less secure methods? Yeah.
  • 23:59 - 24:03
    It's using no pairing.
    laughing
  • 24:03 - 24:07
    That means that the Android and iOS apps
    just throw the packets into the air and if
  • 24:07 - 24:13
    a device is nearby, it starts to vibrate
    laughing
  • 24:13 - 24:17
    and that's of course easily exploitable
    you can just sniff the real traffic and
  • 24:17 - 24:22
    repeat it. I did exactly that using a so-
    called Bluetooth Low Energy sniffer. I
  • 24:22 - 24:27
    used a bluefruit device, it works very
    well and I placed it between the sex toy
  • 24:27 - 24:32
    and the smartphone app. I sniffed the
    traffic using wireshark and I found some
  • 24:32 - 24:39
    interesting end points or handles. There
    is the 1F handle which is like an
  • 24:39 - 24:45
    initialization handle and there is the
    handle 25, where you can send values from
  • 24:45 - 24:52
    00 to FF to set the vibration intensity.
    Yeah and now it's time for a little bit of
  • 24:52 - 25:03
    War-dildoing. I wrote a small Python proof
    of concept which basically scans the air
  • 25:03 - 25:08
    for Bluetooth low energy devices. If it
    finds a device. It tries to or tries to
  • 25:08 - 25:15
    find out if it is a sex toy and if yes.
    Yeah it basically turns it on to 100%, to
  • 25:15 - 25:18
    FF.
    laughing
  • 25:18 - 25:26
    So the next thing I want to talk about is
    not that funny. So please don't laugh now
  • 25:26 - 25:32
    because when we released this, a lot of
    people on Twitter asked "Is this rape?",
  • 25:32 - 25:39
    so serious topic. For example the evil
    attacker is using my War-dildoing script
  • 25:39 - 25:46
    in the metro, in the U-Bahn in Vienna. And
    he would just pleasure random strangers.
  • 25:46 - 25:53
    Is this rape? In Austria we have two
    different things. We have rape and sexual
  • 25:53 - 25:58
    assault and they have two preconditions.
    So that's violence - eh three
  • 25:58 - 26:03
    preconditions. We have violence, threats
    or deprivation of liberty, which is just
  • 26:03 - 26:08
    not the case in this scenario. But we have
    a special paragraph called, phew that's
  • 26:08 - 26:12
    really hard to translate that. It's called
    the Po-Grapsch paragraph. I know that's a
  • 26:12 - 26:16
    little bit different in Germany and I'm
    not a law expert so it just kept the
  • 26:16 - 26:22
    Austrian laws which could be verified by
    tourists. According to this paragraph this
  • 26:22 - 26:27
    would be an unwanted sexual act, via a
    third party object. So it's not rape, but
  • 26:27 - 26:35
    it's an unwanted sexual act. Okay. The
    hardware. Last but not least. The biggest
  • 26:35 - 26:40
    problem is that firmware updates are not
    possible. That was confirmed by the
  • 26:40 - 26:47
    manufacturer. The problem here is a lot of
    vulnerabilities can just be fixed by doing
  • 26:47 - 26:54
    firmware updates and the manufacturer came
    up with the idea, that the end users can
  • 26:54 - 26:59
    send in their smart sex toys to do a
    firmware update and I'm quite sure that
  • 26:59 - 27:05
    nobody's sending in their used devices to
    conduct a firmware update. The other
  • 27:05 - 27:09
    problems are debug interfaces. They just
    forgot to remove it or deactivate their
  • 27:09 - 27:16
    serial interfaces on the sex toys. It's
    just really easy to extract the firmware
  • 27:16 - 27:22
    and do a little bit of more research on
    the firmware. Okay. So you might now think
  • 27:22 - 27:27
    I still want to use smart sex toys. What
    can I do? Yeah the tin foil is not
  • 27:27 - 27:31
    working.
    loud laughing
  • 27:31 - 27:41
    applause
    But there are a lot of interesting open
  • 27:41 - 27:47
    source projects out there. So first of all
    the most famous project is the Internet of
  • 27:47 - 27:52
    Dongs project. There is a really
    interesting person behind that. He's
  • 27:52 - 27:57
    called RenderMan. You can find him on
    Twitter. He invented this project to make
  • 27:57 - 28:01
    this whole Internet of Dongs a little bit
    safer. And he's doing like penetration
  • 28:01 - 28:07
    tests and stuff like that and he's even
    handing out DVS. So that's the equivalent
  • 28:07 - 28:14
    to CVS. Then we have buttplug.io and
    metafetish. They are developing open
  • 28:14 - 28:19
    source firmwares for a lot of different
    sex toys and they're independent from all
  • 28:19 - 28:22
    the manufacturers. And there is also
    something called Onion Dildonics
  • 28:22 - 28:30
    laughing
    which has the goal of rerouting all the
  • 28:30 - 28:36
    smart sex toy traffic over the TOR network
    to make it a little bit more safer.
  • 28:36 - 28:49
    applause
    OK. There is one more thing. I had a lot
  • 28:49 - 28:57
    of calls together with the manufacturer
    and the german CERT-Bund. And one call was
  • 28:57 - 29:02
    outstanding because we were discussing the
    remote pleasure vulnerabilities. And we
  • 29:02 - 29:08
    tried to explain the manufacturer that
    it's not good that you can basically out
  • 29:08 - 29:14
    of the box pleasure everyone on the
    Internet or if you're nearby. We told them
  • 29:14 - 29:17
    that it should be at least like an opt in
    feature, where you can switch on this
  • 29:17 - 29:24
    feature in the apps, but the manufacturer
    said no that's not possible because, at
  • 29:24 - 29:29
    least they believed that, most of our
    customers are in swinger clubs and you
  • 29:29 - 29:33
    don't know beforehand who is in the
    swinger club. So there is just no optin,
  • 29:33 - 29:39
    in a swing club, because you're basically
    always in. Thank you.
  • 29:39 - 29:57
    applause
    Herald Angel: Secretary of Education you
  • 29:57 - 30:01
    are now taking questions. We have five
    microphones two in the front and three in
  • 30:01 - 30:08
    the back. So please line up and ask
    whatever you want. So apparently people on
  • 30:08 - 30:12
    Twitter are engaged in a drinking game
    where they were drinking every time you
  • 30:12 - 30:15
    said penetration testing.
    loud laughing
  • 30:15 - 30:21
    applause
    Herald: In the meantime we have a question
  • 30:21 - 30:25
    from microphone number two.
    Question: Did you come across anything
  • 30:25 - 30:29
    with the patent trolls in teledildonics?
    Answer: I came across what sorry?
  • 30:29 - 30:35
    Q: patent trolls. There is a issue with
    the teledildonics patent and some
  • 30:35 - 30:40
    companies have been threatened to go out
    of business because of frivolous lawsuits.
  • 30:40 - 30:45
    A: Yes. Yes there was the I guess it was
    called the teledildonics appreciation day
  • 30:45 - 30:51
    in August because the patent ended. So you
    can basically use the term wherever you
  • 30:51 - 30:56
    want.
    Herald: Thank you. Microphone number three
  • 30:56 - 31:02
    please.
    Q: So this was very funny obviously. And
  • 31:02 - 31:09
    you showed us the really low hanging
    fruit. On the website in the database you
  • 31:09 - 31:15
    would have been able to see the social
    graph of the users. I don't know if you
  • 31:15 - 31:20
    have managed to look at other devices. Can
    you elaborate a little bit more on
  • 31:20 - 31:27
    something that I believe more serious.
    Which is the profiling of users behavior,
  • 31:27 - 31:34
    social networks and so on?
    A: So of course it didn't take a look of
  • 31:34 - 31:37
    all the data because it was so critical in
    my opinion, that I directly contacted the
  • 31:37 - 31:42
    CERT-Bund. So I can't give you any
    information about the data of course. I
  • 31:42 - 31:46
    also took a look at like things like
    tracking and stuff like that and in this
  • 31:46 - 31:52
    case there was not a lot of tracking going
    on at the german sex toys. But when you
  • 31:52 - 31:56
    compared it to the Chinese sex toys, there
    is way more tracking and stuff like that
  • 31:56 - 32:02
    going on. But I didn't took like a
    detailed look into that.
  • 32:02 - 32:09
    Herald: Thank you. Thank you again for
    the educational and entertaining talk
  • 32:09 - 32:15
    and hopefully a lot of rounds of applause.
  • 32:15 - 32:19
    applause
  • 32:19 - 32:24
    35c3 postroll music
  • 32:24 - 32:41
    subtitles created by c3subtitles.de
    in the year 2019. Join, and help us!
Title:
35C3 - Internet of Dongs
Description:

more » « less
Video Language:
English
Duration:
32:41

English subtitles

Revisions