< Return to Video

37C3 - Breaking "DRM" in Polish trains

  • 0:14 - 0:20
    Give a warm welcome to Redford (@redford@infosec.exchange)
  • 0:30 - 0:39
    Q3K (@Q3K@social.hackerspace.pl)
  • 0:39 - 0:45
    and Mr. Trick (@mrtick@infosec.exchange)
  • 0:48 - 0:51
    and it's an honour to announce the talk
  • 0:51 - 0:54
    "Breaking DRM in Polish trains"
  • 0:55 - 1:00
    Reverse engineering a train
    to analyze a suspicious malfunction
  • 1:00 - 1:09
    (Applause)
  • 1:10 - 1:16
    Hi, I'm Redford, this is Q3K and
    MrTick (not Trick)
  • 1:17 - 1:19
    and we'll talk today about trains.
  • 1:19 - 1:21
    We'll do a quick intro,
    tell the story and
  • 1:21 - 1:23
    then go into technical details.
  • 1:24 - 1:30
    So, we sometimes play CTF's together
    with Dragon Sector and Poland Can into space
  • 1:31 - 1:33
    I work for invisible things lab
  • 1:34 - 1:36
    I mostly do low level security and reverse engineering
  • 1:37 - 1:41
    And [the others] will introduce themselves in a few slides
  • 1:41 - 1:44
    Let's start with the story
  • 1:44 - 1:47
    As you already know, the story is about trains
  • 1:48 - 1:53
    and the story actually starts a long time ago, in 2016
  • 1:53 - 1:58
    when Koleje Dolnoslaskie , a local polish train operator
  • 1:59 - 2:04
    bought eleven Impulse trains
    (of which one of them is on the photo)
  • 2:06 - 2:07
    Then after some time,
  • 2:08 - 2:12
    the train started reaching one million kilometer on the odometers
  • 2:13 - 2:20
    and by this amount, you must do a big maintaince
  • 2:20 - 2:25
    and because the manufacturers warranty already expired
  • 2:25 - 2:28
    they started a tender
  • 2:28 - 2:31
    so to select the best offer for servicing
  • 2:32 - 2:34
    and the offer was won by SPS
  • 2:34 - 2:37
    it's an independent train workshop in Poland
  • 2:37 - 2:41
    And in the first quarter of 2022
  • 2:41 - 2:44
    the first train reached the workshop
  • 2:44 - 2:51
    So, let's see the public timeline
  • 2:51 - 2:57
    The servicing started with train #24
  • 2:57 - 3:03
    Their workshop took apart the whole train
  • 3:03 - 3:06
    sent the parts to the manufacturers
  • 3:06 - 3:08
    and then assembled the train back
  • 3:09 - 3:11
    But the problem was that
  • 3:11 - 3:14
    the train didn't start afterwards.
  • 3:14 - 3:17
    And, then, they took another train for servicing,
  • 3:17 - 3:19
    and it was the same:
  • 3:19 - 3:21
    the trains didn't want to start
  • 3:21 - 3:23
    after servicing.
  • 3:23 - 3:25
    And, what's even more interesting
  • 3:25 - 3:27
    is that in the meantime
  • 3:27 - 3:29
    another workshop
  • 3:29 - 3:32
    started servicing trains for different train operator
  • 3:32 - 3:35
    and they run into exact the same problem
  • 3:35 - 3:38
    So, it's getting a bit suspicious
  • 3:38 - 3:42
    and the story got noticed by media in Poland
  • 3:43 - 3:46
    because you had like less trains running
  • 3:46 - 3:51
    So, the manufacturer issued a public press release
  • 3:51 - 3:52
    and they said that
  • 3:52 - 3:55
    among many other accusations
  • 3:55 - 4:00
    they said that "someone interfered with the security system"
  • 4:00 - 4:01
    whatever that is
  • 4:02 - 4:06
    And, something happened in between
  • 4:06 - 4:10
    And the workshop (SPS)
    started returning the trains
  • 4:10 - 4:12
    which worked.
  • 4:12 - 4:14
    So, what happened?
  • 4:14 - 4:15
    And what happened in the meantime?
  • 4:15 - 4:19
    After the workshop got into trouble
  • 4:20 - 4:25
    the issues didn't look like normal issues
  • 4:26 - 4:28
    because the competitor was saying
    that everything is fine
  • 4:28 - 4:32
    and they had some pointers
  • 4:32 - 4:34
    into the direction of
  • 4:34 - 4:35
    the manufacturers involvement
  • 4:35 - 4:38
    but they didn't have any idea what to do.
  • 4:38 - 4:42
    So they googled "Polish Hackers"
  • 4:42 - 4:43
    and found us
  • 4:43 - 4:52
    (Laughter+Applause)
  • 4:52 - 4:55
    So, we got in contact
  • 4:55 - 4:58
    we got the trains,
    but about that later
  • 4:58 - 5:03
    In august, we managed to unlock the first train
  • 5:03 - 5:06
    and a few months later
  • 5:06 - 5:11
    we gathered enough evidence to
    notify authorities about
  • 5:11 - 5:13
    and that is what we will talk about today.
  • 5:15 - 5:17
    (Laughter)
  • 5:17 - 5:19
    Allright, I think it is my turn
  • 5:19 - 5:21
    So, hi, I'm Mister Tick
  • 5:22 - 5:24
    Known in Poland as <????>
  • 5:24 - 5:26
    In Germany as <????>
  • 5:26 - 5:29
    Ich bin ein grosser Bahnfan
    (I'm a big railway fanatic)
  • 5:29 - 5:32
    So, Redford, briefly introduce you
  • 5:33 - 5:39
    (Applause)
  • 5:39 - 5:44
    I want to walk you through some initial terms here
  • 5:44 - 5:45
    So, before I tell you how to
  • 5:45 - 5:46
    unlock a train
  • 5:46 - 5:49
    let's define what a "locked train" is.
  • 5:49 - 5:50
    So, we have basically a train
  • 5:51 - 5:52
    you enter a cabin
  • 5:52 - 5:54
    All the system reports says that the train is
    ready to roll
  • 5:55 - 5:58
    There is this device combined throttle and brake lever
  • 5:58 - 6:00
    So you push it forward
  • 6:00 - 6:02
    the train loses all the brakes
  • 6:02 - 6:03
    and then it should accelerate
  • 6:03 - 6:05
    but it doesn't.
  • 6:08 - 6:10
    That's the brakes
  • 6:12 - 6:14
    Nothing happens
  • 6:15 - 6:17
    You can see the "zero" on the screen
  • 6:21 - 6:23
    So, we had a locked train
  • 6:24 - 6:27
    the workshop bought additional two CPUs
    of the
  • Not Synced
    Jup, that's one of them
  • Not Synced
    and got access to all service documents
Title:
37C3 - Breaking "DRM" in Polish trains
Description:

more » « less
Video Language:
English
Duration:
01:01:46

English, British subtitles

Incomplete

Revisions Compare revisions