Matheus-Garbelini / braktooth_esp32_bluetooth_classic_attacks

A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers
https://braktooth.com
448 stars 85 forks source link

Getting "Segmentation fault" while scanning device #5

Open Patidar1307 opened 2 years ago

Patidar1307 commented 2 years ago

Hi Team,

I would like to check the BrakTooth vulnerability in my metering product before launching to market. I have followed the provided steps in Ubuntu 18.04 VM machine and ESP32 Wrover kit.

While scanning for devices using the following command, getting segmentation fault in ESP32 and also taking too much time to open port /dev/ttyUSB1:

$ sudo bin/bt_exploiter --scan

Output is attached here for reference.

segfault

I have tried multiple options like updated configs file (/bt_config.json ), erased ESP32 flash and programmed again, flashed using idf.py (default ESP32 flashing script), validated "Hello world" example code and much more.

Can you please share your inputs on priority to resolve this issue.

Please let me know if any further information is required Thanks and regards, Patidar

Matheus-Garbelini commented 2 years ago

Hi @Patidar1307 thanks for reaching out. Note that the PoC reports the following concerning result: Measuring UART Latency.... USB Latency:2348 us

PS: Also, what esp32 board are you using? Is it the ESP-WROVER-KIT?

Anything else please let us know.

Patidar1307 commented 2 years ago

Hi Matheus-Garbelini,

Please find the response for your suggested points: 1. USB latency:

2. The taking too much time to respond can be solved by disabling "SerialAutoDiscovery":false::

3. segmentation fault:

Further information: 4. Platform:

5. Firmware Version:

Thanks and regards, Patidar

Matheus-Garbelini commented 2 years ago

@Patidar1307 the firmware version should be ok. The difference in version is just some internal changes of baudrate between this repo and the sniffer repo.

Patidar1307 commented 2 years ago

Hi Matheus-Garbelini,

An ESP32 is responding after disabling "SerialAutoDiscovery":false in configs/bt_config.json file. We can scan and target our device. Thank you for the inputs.

Further, we have validated our device but we have not observed any remarkable activity after targeting it using following command: sudo bin/bt_exploiter --host-port=/dev/ttyUSB1 --target=<target bdaddress> --exploit=<exploit name>

Attached herewith the test logs (from /braktooth/braktooth_esp32_bluetooth_classic_attacks/wdexploiter/logs/ directory) for the reference: Bluetooth.zip

Can you please do some favor and confirm our observation by reviewing attached logs? Thanks again for the continuous support.

Best regards, Patidar

Matheus-Garbelini commented 2 years ago

Hi @Patidar1307 by looking the logs, everything seems normal. Note that the logs folder only contain the last execution you've made. So I can only see the logs for au_rand_flooding.

Patidar1307 commented 2 years ago

Hi Matheus-Garbelini,

Thank you for the quick response and log review. Yes, the attached log was for "_au_randflooding" exploit only.

We have quick questions on your previous response: To verify the BrakTooth vulnerability, do we need to test all available exploits, or only "_au_randflooding" exploit test is sufficient?

Thanks and regards, Patidar

Matheus-Garbelini commented 2 years ago

@Patidar1307 if you are testing Texas Instruments CC2564C, au_rand_flooding should be sufficient. But if it's not the exact chipset we have tested before, it is worth to test all the exploits.

Patidar1307 commented 2 years ago

Hi Matheus-Garbelini,

Thank you for the quick response and log review. We have tested the device with all the exploits and the device is remain connected and responding to ping requests to another device.

It will be great if you quick look the following logs, and check if any discipline is available.

braktooth_test_logs.zip

Thanks again for the quick response and your time. We can close this topic after your comments on the attached log review.

best regards, Patidar Technologist

Patidar1307 commented 2 years ago

Hi Matheus-Garbelini,

Have you got a chance to walk through the logs? Please quick look at the logs, and check if any discipline is available.

We can close this topic after your comments on the attached log review.

best regards, Patidar Technologist

Securee commented 2 weeks ago

I have met the Segmenttation fault: Chromium Embedded Framework Initialized [CEF] WebView Document Ready WebView Module Loaded GUI Thread Running Assigned CPUSET: 0, 1, 2, 3, 4, 5, /proc/sys/kernel/sched_rt_runtime_us = -1 Enabling Core dump for this process: ulimit -c unlimited Access Documentation: https://asset-sutd.gitlab.io/software/wireless-deep-fuzzer/ UART Latency reduced to 125 us Process already started, stopping now... Segmentation fault

I don't know why it say:Process already started, stopping now... When I want to check the source code in:https://asset-sutd.gitlab.io/software/wireless-deep-fuzzer/, it get me an 404 error. May be the code have been moved? @Matheus-Garbelini