ChaosCommunicationConference

Latest

  • Hackers obtain PS3 private cryptography key due to epic programming fail? (update)

    by 
    Sean Hollister
    Sean Hollister
    12.29.2010

    The 27th annual Chaos Communication Conference already hacked encrypted GSM calls with a $15 cellphone, but there was a second surprise in store this morn -- the souls who unlocked the Nintendo Wii's homebrew potential (and defended it time and again) claim to have broken into the PlayStation 3 as well. Last we left the black monolith, Sony had won a round, forcing the community to downgrade their firmware for any hope at hacking into the console. Well, the newly formed fail0verflow hacking squad says that won't be a problem any longer, because they've found a way to get the PS3 to reveal its own private cryptography key -- the magic password that could let the community sign its very own code. So far, the team hasn't provided any proof that the deed's been done, but they have provided quite an extensive explanation of how they managed the feat: apparently, Sony didn't bother generating any random numbers to secure the blasted thing. (We don't really know how it works, but we have it on good authority that dead cryptography professors are rapidly spinning in their graves.) The group intends to generate a proof-of-concept video tomorrow, and release the tools sometime next month, which they claim should eventually enable the installation of Linux on every PS3 ever sold. Catch the whole presentation after the break in video form, or skip to 33:00 for the good stuff. Update: The proof-of-concept vid is a bit underwhelming -- fail0verflow had to SSH into a PS3 over ethernet -- but it's here nonetheless. See it after the break, and find the team's full set of presentation slides at our more coverage link. [Thanks, Paolo S.]

  • Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds

    by 
    Darren Murph
    Darren Murph
    12.29.2010

    It's hardly a fresh idea -- researchers have claimed that GSM calls could be cracked and listened in on for years. But there's a difference between being able to do something with a $50,000 machine and a warrant, and being able to do the same thing with a few $15 Motorola phones, a laptop, open source software and 180 seconds of spare time. Security Research Labs researcher Karsten Nohl and OsmocomBB project programmer Sylvain Munaut recently spoke about a new GSM hack at the Chaos Communication Conference in Berlin, and they were able to walk the audience through the eavesdropping process in a matter of minutes. According to them, it's not terribly difficult to use a $15 handset to "sniff out" location data used to correctly route calls and texts, and once you've nailed that down, you could use modified firmware to feed raw data into a laptop for decryption. Using a 2TB table of precomputed encryption keys, a cracking program was able to break in within 20 seconds -- after that, you're just moments away from recording a live GSM call between two phones. Of course, speeches like these are made to encourage security officials to beef up the layers between you and ill-willed individuals, but it's hard to say what (if anything) will change. For now, we'd recommend just flying to each and every person you'd like to speak with. Unless you live in the Greater New York area -- you're probably better off risking a hacked conversation than heading out to LGA / JFK / EWR.