Exploiting the Obvious But Not the Trivial: Unencrypted NAND Flash Memory

In this SySS (www.syss.de/) proof-of-concept video, SySS IT security expert Matthias Deeg demonstrates a rather obvious attack exploiting unencrypted NAND flash memory for gaining unauthorized root access.
Usually, exploiting unencrypted persistent storage (data at rest) in the form of hard disk or solid state drives with a popular interface like SATA is not that difficult due to readily available tools for accessing those kind of storage devices. However, when targeting raw NAND flash memory chips, for instance used in embedded devices, gaining read or write access to the data of these storage devices is sometimes more complex and not trivially done.
The challenge regarding NAND flash memory is to understand the used error correction and data format of the target platform in order to both read error-free data from and correctly write data back to the chip.
BCH (Bose-Chaudhuri-Hocquenghem) codes [1], which are a class of cyclic error-correcting codes, are a popular choice for error correction in NAND flash memory technology.
Based on the open source tool PMECC Reader and Decoder [2] by Mickaël Walter, Matthias Deeg developed the open source NAND Dump Tools [3] which can be used for decoding and encoding NAND dumps/images for different target platforms.
Thus, our NAND Dump Tools can be used in chip-off/chip-on attacks in order to extract error-free data from and write modified data to the NAND memory chip of a targeted device.
In this proof-of-concept video, such a chip-off/chip-on attack is exemplarily demonstrated against a SAMA5D4 Xplained Ultra evaluation board [4] for gaining root access to the embedded Linux operating system in an unauthorized way.
[1] BCH codes, Wikipedia, 2020
en.wikipedia.org/wiki/BCH_code
[2] PMECC Reader and Decoder, Mickaël Walter, 2018
www.mickaelwalter.fr/2018/06/...
[3] SySS NAND Dump Tools, Matthias Deeg, SySS GmbH, 2020
github.com/SySS-Research/nand...
[4] SAMA5D4 Xplained Ultra, Microchip
www.microchip.com/Development...
#hack #nand #attack

Пікірлер: 8

  • @diegoporras7769
    @diegoporras77693 ай бұрын

    Cool video!

  • @abdulkaderjaghel9055
    @abdulkaderjaghel90553 жыл бұрын

    Its very nice ....how i can decript another this nand type like as winbond ,samsung, Toshiba meaning how i can get config fils for other types

  • @user-pk6fb6tv8y
    @user-pk6fb6tv8y Жыл бұрын

    أواجه مشكله في قرأة ناند رقم 29f64g08cbaba يعطى أخطاء فى مرحلة verify عن طريق مبرمجه t56 ما الحل وشكرا

  • @2000YG
    @2000YG4 жыл бұрын

    how do you get the cool shell, which shows the current git branch and stuff?

  • @SySSPentestTV

    @SySSPentestTV

    4 жыл бұрын

    The shell in the video is ZSH using powerline theme of Oh My Zsh (ohmyz.sh/).

  • @diegoporras7769
    @diegoporras77693 ай бұрын

    How did you know the first-fourth _id_byte?

  • @Segphalt

    @Segphalt

    Ай бұрын

    It's the ID specified by the manufacturer, it can generally be found in the datasheet. There are also tables available that will show some of the more common ones. (Not often updated but really only the first 2 seem to ever really matter.)

  • @fusca14tube
    @fusca14tube4 жыл бұрын

    Very good! Amazing hack!