The popular cyber security expert Luca Bongiorni demonstrated how to hack an X-Ray Machine using his WHIDelite tool.
Recently I bought a X-RAY machine from China to have some ghetto-style desktop setup in order to inspect/reverse engineer some PCBs and hardware implants.
The first thing striked my curiosity, even before purchasing it, was its remote. Which were the odds that the little teeny-tiny remote was just using an ASK/OOK modulation with no replay-attack protection whatsoever?! Very high of course.
Nonetheless, I ordered it anyway and used it as an excuse to try again my WHIDelite and the new toy that Joel sent me over (EvilCrowRF).
But first let’s follow a more-systematic approach with HackRF and URH:
- Frequency is confirmed being set around 315MHz
After recording a packet we can confirm that it is using an ASK/OOK modulation.
After creating a simple substitution decoding, we get exactly the same values that both EvilCrowRF & WHIDelite showed during the initial tests.
Just for the sake of confirmation, I did replay the packet with both HackRF, WHIDelite & EvilCrowRF. In all cases, the forged packet was successfully received and decoded by the unit, which fired X-RAYs like it was a Marie Curie’s party
Here a quick video review of the whole replay attack:
https://youtu.be/RIdf2yIPB84
Some resources related to the tools and devices used:https://github.com/whid-injector/whid-31337https://github.com/joelsernamoreno/EvilCrow-RFhttps://github.com/eried/portapack-mayhemhttps://github.com/jopohl/urh/
P.S. Disclaimer, if you are planning to buy this model of Dental X-ray Machine… keep in mind that is NOT considered safe in Europe. The Health Protection Agency from UK, even released a report regarding these devices coming from China. Be prepared to use sheets of lead, dosimeters and protective vests.
[출처 : SecurityAffairs / 4.20.]
댓글을 남겨주세요
로그인 후 댓글을 작성할 수 있습니다.