37C3 - Breaking "DRM" in Polish trains - deutsche Übersetzung

Analyzing a malfunction in the DRM system of Polish trains, the presenter reveals a complex puzzle of proprietary language, cryptographic hash functions, and obfuscated code, exposing vulnerabilities and risks.

Key takeaways
  • The presenter analyzed a suspicious malfunction in the DRM system of Polish trains.
  • The system used an Infinium 3 core processor with RAM and Flash.
  • The firmware was written in a proprietary language and included a debugger.
  • The presenter used a PLynx programmer to load the firmware onto the device.
  • The presenter found that the system used a PL0521 microcontroller and a PL0530 microchip.
  • The system used a cryptographic hash function to verify the integrity of the firmware.
  • The presenter used a custom-built tool to analyze the firmware and extract the cryptographic key.
  • The key was used to decrypt the firmware and extract the program code.
  • The presenter found that the program code was obfuscated and difficult to analyze.
  • The presenter used a deobfuscation tool to reverse-engineer the program code and identify the critical parts of the system.
  • The presenter found that the system used a combination of symmetric and asymmetric encryption.
  • The presenter recognized the importance of rootkits and other malicious software in the system.
  • The presenter warned about the potential risks of using third-party software on the system.
  • The presenter suggested that the system should be updated with newer firmware to fix the vulnerabilities.