<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; reverse</title>
	<atom:link href="http://labs.p1sec.com/tag/reverse/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>[Hackito Ergo Sum 2014] Hacking Telco Equipment: The HLR/HSS</title>
		<link>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/</link>
		<comments>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/#comments</comments>
		<pubDate>Wed, 07 May 2014 18:11:57 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hlr]]></category>
		<category><![CDATA[hss]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[virtualization]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=529</guid>
		<description><![CDATA[P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment. Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis from P1Security Download slides here. Abstract: HLR...]]></description>
				<content:encoded><![CDATA[<p style="color: #b30f25;"><span style="color: #505050;">P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (</span><a style="color: #ea6315;" href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a><span style="color: #505050;">) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment.</span></p>
<p><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34291135" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"> </iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis" href="https://www.slideshare.net/p1sec/day1-hacking-telcoequipmentthehlrhsslaurentghigonisp1sec" target="_blank">Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security</a></strong></div>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf">here</a>.</p>
<p>Abstract:</p>
<p>HLR and HSS are the most important Telecom Equipment in an Operator Core Network.<br />
We are going to see that this so-called “Critical Infrastructure” is not as robust as you could think, by exploring the some weaknesses of the HLR/HSS equipment.</p>
<p>Plan:<br />
* Virtualization of HLR/HSS, for instrumentation purposes<br />
* HLR/HSS system analysis<br />
* SS7/Diameter network fuzzing<br />
* HLR/HSS binaries reverse</p>
<p>We also did another presentation on <a style="color: #ea6315;" href="http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/">Worldwide attacks on SS7/SIGTRAN network</a> at HES.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Huawei reverse engineering: legacy and new network elements surprises</title>
		<link>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/</link>
		<comments>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/#comments</comments>
		<pubDate>Thu, 23 May 2013 09:44:58 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Huawei Core]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[ppc]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[vkb]]></category>
		<category><![CDATA[vulndev]]></category>
		<category><![CDATA[vulnres]]></category>
		<category><![CDATA[vxworks]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=170</guid>
		<description><![CDATA[Sometime, reverse engineering for bug hunting reveals some fun stuff. So of course, when you&#8217;re dealing with Core Network elements such as Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!): We ca...]]></description>
				<content:encoded><![CDATA[<p>Sometime, reverse engineering for bug hunting reveals some fun stuff.</p>
<p>So of course, when you&#8217;re dealing with Core Network elements such as <a href="http://www.huawei.com/en/products/core-network/singlecore/fixed-softswitch/index.htm">Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000</a>, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png"><img class="alignnone size-full wp-image-173" alt="Screen Shot 2013-05-23 at 11.33.39 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png" width="576" height="454" /></a></p>
<p>We can see that internally, this is called &#8220;Cool Beauty System 1.0.3&#8243; build (?) 35808001, by HuaWei R&amp;D CN (Research and Development Core Network).</p>
<p>We see also that this design dates back from when Huawei was spelled internally HuaWei, that is probably from the 1980s even if the build time of this firmware image (VxWorks Tornado based) is from 2010.</p>
<p>&nbsp;</p>
<p>and even less usual but more interesting to find the PCB schematics in ASCII art (!!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png"><img class="alignnone size-full wp-image-172" alt="Screen Shot 2013-05-23 at 11.33.57 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png" width="556" height="486" /></a></p>
<p>That reveals it&#8217;s running (well&#8230; we saw that earlier) on PowerPC RISC processor MPC750 by Freescale Semiconductor, Inc. Here is the datasheet <a href="http://labs.p1sec.com/wp-content/uploads/2013/05/MPC750.pdf">MPC750 RISC Processor by Freescale</a>. Please note the JTAG interface on page 15.</p>
<p>By googling the other components, you will find the pinout of the JTAG interfaces of each chip as well as the UART and the way to to In-Circuit debugging (and dumping) of the bootrom.</p>
<p>Thanks to Huawei engineers for this moments of fun and education. Is it best practice to teach reverse engineers what your hardware architecture looks like?</p>
<p>Oh&#8230; and thanks for the 4 new vulnerabilities added in the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a> based on this reverse engineering and bug hunting session.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
