Runa A. Sandvik is a privacy and security researcher, working at the intersection of technology, law and policy.
Michael Auger is an experienced IT security specialist with extensive
experience in integrating and leveraging IT security tools.
Runa and Mike spent the last year researching the Trackingpoint 338TP. When CNN asked Runa why attack a rifle? She replied, because "cars are boring".
The base rifle is Remington 700 .308 bolt-action rifle. Hardware platorm is called "cascade, runs modified Angstrom Linux.
It uses Tag Track Xact (TTX) .
The wifi is off by default, and you cannot fire the rifle remotely. The gun still works even if the scope/targeting system is broken - it is a gun, after all.
The first thing that they did was run a port scan on the rifle. It runs a webserver and rtsp server.
The more interesting side is the TrackingPont App - you can adjust settings for wind, media, and do software updates.
The mobile app was using encryption, etc.
When they got stuck ... they just tried ALL THE THINGS! :-)
After round 1, found that the SSI contains the serial number, and it can't be changed. Guessable WPA2 key, and it also cannot be changed. Any RTSP client can stream the scope vie.
The API is unauthenticated, but it does validate input.
There is a 4 digit pin that locks advanced mode - you can brute-force. /set_factory_defualts" resets the lock. Updates to the rifle are GPG encrypted and signed.
Fortunately Tracking Point's website has an excellent diagram of what the rifle would look like, before tearing it a part. They actually used their CAD drawings in their marketing material. Though, the website has a lot of 2D things, in reality the circuit board is round :-)
To get the circuit board out, you have to desolder at least 60-pins.
So excited to see it booting Linux!
But, alas, it did not auto-login as root.
Console access is at least password protected and the kernels and filesystem are on separate chips.
the filesystem chip was hidden under a big capacitor - missed it the first few times.
Some of the folks they were working with recognized the silk screening on the board and recommended an EMC to USB converter. Then got to see what was on the filesystem.
The webserver had a lot of interesting APIS, like ssh_accept - that could be fun!
The system backend requires unpublished API call to open port. The API validates input, backend does not. You can make temporary changes to the system. Can change wind, temperature, ballistics valus and control the solenoid, etc. They could even lock the trigger, crash the gun, make the scope think it is attached to a different firearm, or make this one command segfault (which triggers reboot).
The changes are temporary, if the user reboots, the changes will be lost.
Now time for demos!
Watched a change in the ballistics screw up the calculation so that the shot hit the target next to the one you were aiming at.
TrackingPoint operates with two GPG keys for updates, one of which is on the scope. Update script accepts packages signed by either of the two keys. This will allow you to make persistent changes to the system AND get root access.
Successfully able to login with no password as root!
Round 3 findings: the Admin API is also unauthenticated, the system backend is unauthenticated and does not validate input. GPG key on the scope can encrpt and sign updates.
Did have to have previous access to the rifle for all of the attacks.
But, there are ways to do remote code execution - if you can get on the wifi.
it's not all that bad... USB ports are disabled during boot, media is deleted from scope once downloaded, SPQ2 is in use, even if key cannot be changed. The API does validate user input, console access is password protected and software updates are GPG encrypted and signed.
Will this get better? Have been calling them since April, zero replies, until Wired called... since have received two calls. TrackingPoint is working on a patch. They have been easy to work with, once the connection was made.
"You can continue to use WiFi (to download photos or connect to ShotView) if you are confident no hackers are within 100 feet" - note on TrackingPoint's website. :-)
They had done security work (better than most people doing embedded work).
You Want Vagina Cakes? I'LL GIVE YOU VAGINA CAKES. - *WARNING: * This post is so *completely* not-safe-for-work that I advise waiting til you get home, clearing the area of innocents, and then blinding your...