A talk hosted on TASK

Notes:

  • Your Network Interface Card is a computer.
  • The issue is with PCIe direct memory aces. can directly write to RAM
  • You can exploit hardware, firmware vulnerabilities
  • We can tell by:
    • NMIC
    • Firmware verification (fwupd)
  • We dont see these attacks because nobody is looking if the firmware of your network card changes
  • These attacks are very advanced and hardware dependent
  • Direct memory access through PCIE. It is possible to perform these from:
  • If you have Wake-on-LAN, you can exploit an entire network remotely. Many chipset manufacturers or government agencies will be able to take over your entire network
  • Theoretical exploit chain:
    • Be the US government
    • Contract local network card chipset manufacturers
    • Mix hardware and software vulnerabilities
    • In network card memory exploits done ove the network
    • bypass OS level detection with PCIE point-to-point between network cards. Take over entire network
    • Compromise private keys or sensitive data with writes to arbitrary locations in RAM
    • Interface with UEFI/Bios to compromise other hardware
  • Wireless is vulnerable
  • Solution is to make this problem more visible, and make these exploits open source
  • The northbridge and the southbridge should seperate PCI components. Adding something to filter between them is vital
  • https://www.computerworld.com/article/1509757/jedi-packet-trick-punches-holes-in-firewalls.html