Traditional Culture Encyclopedia - Traditional festivals - Do you know that?/You know what? Do you know that?/You know what? Four Attacking Methods of Smart TV Hackers

Do you know that?/You know what? Do you know that?/You know what? Four Attacking Methods of Smart TV Hackers

Hacking methods of smart TV can be roughly divided into four types: 1. WiFi network attacks Smart TV should work in a WiFi environment with sufficient bandwidth, and WiFi is the first security checkpoint for Smart TV. If WiFi is cracked, all devices including smart TV, mobile phone, Pad, PC and so on are very dangerous. The attacker uses the wireless network cracking tool to crack the WiFi password to connect to the intranet, and then scans the LAN port. If there is an open port 5555 (the default remote debugging port for Android), a remote debugging port is set for AndroidTV factory, through which the smart TV system can be installed, uninstalled and modified. Then connect to the smart TV through the remote root of local area network to install malicious software or other operations: (1) adbconnect192.168.0.11:5555 (2) adbpushu/system/xbinpmset. There is no interface displayed on the screen) (3)adb install superuser.apk (super user authorization tool) (4)adb install busybox.apk (system command execution toolbox) (5) adbinstall androrat.apk (Android remote control Trojan) (6) By controlling the server and attacking the WiFi network, Attackers can do anything on the smart TV, such as changing channels, maliciously popping up windows, installing malicious software, turning off the smart TV, and even upgrading the firmware of the smart TV, which may cause the TV to become a brick. From the screenshot of the question, the other party (neighbor? You have to crack the password of this classmate's WiFi first, and then you can control the TV display content at will. There is not much technical content. What she needs to do is to change the complicated WiFi password as soon as possible and turn off the WPS/QSS function. 2. Intranet spoofing attack is similar to other PC attacks. Through intranet DNS attack and ARP spoofing, the APK played by smart TV is packaged for the second time, and the manufacturer's startup advertisement is tampered with. Generally, when advertising is placed, the JS code of the remote server is called through the webpage, and the JS code is modified by hijacking or caching poisoning. 3. The remote server of smart TV application was attacked, resulting in the modification of display advertisements, the free use of paid columns and the infiltration of enterprise networks. This is also one of the traditional attack methods. After scanning the remote server and finding the vulnerability, control the server with the corresponding vulnerability. Usually, there are multiple web applications on remote servers to provide services. When Android Smart TV loads a web page, it uses the webview component of Android native browser to load the page. This component has many problems, such as code injection, remote code execution and so on. Therefore, the attacker will embed a well-constructed malicious script in the loaded page, and execute malicious code when the smart TV loads the webpage of the application, resulting in the androrat remote control Trojan being silently installed in the smart TV system in root superuser mode. Some applications use Android webkit module to remotely load web pages, so there are the same vulnerabilities as traditional web applications, such as remote code execution, SQL injection attacks, and other cross-site scripts, uploading files, and local or remote inclusion vulnerabilities. In the background of ordinary paying users, adding and deleting attacks remote servers, which can be easily modified through the database, and it is not a problem to change free users into VIP users. In addition, the vulnerability of native browser in Android system leads to fatal remote code execution vulnerability, which will infect the whole smart TV, and the smart TV will launch a springboard attack on the whole LAN after infection. At this time, traditional anti-virus software can't play a role in smart TV, and the virus will break out. If the smart TV works in the intranet, there will be great security risks. The infected smart TV can be forwarded to a remote server through NC (Hacker Swiss Army Knife), and then infiltrated into the TV set used for advertising or delivery in the enterprise from the external network, and roamed in the enterprise internal network for a long time, so as to achieve the purpose of further attack. This is no longer a hypothetical attack idea, but a deadly threat that can endanger the security of enterprises in the real environment. 4. Other attack methods Smart TVs can be connected with many ancillary products, such as camera control (mic), and most smart TVs support USB interfaces. By infecting USB and writing portable devices such as autorun, it is possible to attack other Windows hosts. Although it is a small probability event, it does not rule out that it will not happen at all. In addition to these functions, the rom of smart TV may also be inserted into the back door of Troy, similar to the situation that some fake Android smartphones preset oldboot Troy. The security problems that have occurred in smart phones may reappear on smart TVs.