STB OS Security failed

After a bigger research for STB firmware we found out that the firmware over the air is absolute not secured and easy to unpack.

Grabbing the Kernel code and enter the STB filesystem is easier by using the internal lan or use USB for an exploit.

Sofiane Talma from IO/Active released a nice report about it. You can read the article here: http://hackaday.com/2015/08/09/millions-of-satellite-receivers-are-low-hanging-fruit-for-botnets/

or the grab the PDF: https://www.blackhat.com/docs/us-15/materials/us-15-Talmat-Subverting-Satellite-Receivers-For-Botnet-And-Profit.pdf

STM FILESYSTEM:

7105-ST-not-embedded-1

BROADCOM FILESYTEM:

bcm-1

Possible to infect the STB or Trojan it for leaking any information out of it.

 

Dieser Beitrag wurde unter Allgemein veröffentlicht. Setze ein Lesezeichen auf den Permalink.