junior infosec: how could you even consider plugging in an SD card you found on the ground, it could be malicious!

senior infosec: if they can root my macbook m3 from plugging in an SD card then they deserve to run whatever the hell they want

@0xabad1dea I'd be really impressed by an SD card doing that! :D
@jorin @0xabad1dea If the reader is USB, this is fairly unlikely. If the reader is connected in a more direct way (SDIO), it's not that far-fetched (you can connect a lot of through SDIO; quite a few tablets have WiFi cards on the SDIO bus).
@jernej__s @jorin @0xabad1dea Or the much newer SD Express. It’s basically NVMe in the form of an SD card. Readers are about as rare as Thunderbolt thumb drives, though.
@bob_zim @jorin @0xabad1dea I've yet to see a SDExpress card or reader. SDIO readers at least used to be very common in laptops.
@jernej__s
Looks like SD Express is not only NVMe but also PCIe! Time to find some gear and port https://github.com/carmaa/inception
@bob_zim @jorin @0xabad1dea
GitHub - carmaa/inception: Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.

Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. - carm...

GitHub
@0xabad1dea sd-cards like this are much safer than usbs. because a usb can be a keyboard, without even using any exploits
@green @0xabad1dea a random thing that looks like an sd card could still contain USB killer like circuitry though. you can't root anything with that but you can still destroy it
@lis @green USB killers already only exist in electronics labs. A much thinner, more fragile SD card found on the ground is not, within a margin of error of one in a hundred billion, a USB killer
@0xabad1dea @lis what do you mean, only in labs? i thought the circuitry was pretty simple. just charge up a huge capacitor, and blast that back into the port. tho it's hard to fit a capacitor like that into an sd card
@green @lis I don't mean you need some special three million dollar piece of equipment. I mean normal godsdam human beings do not make USB killers, do not use USB killers, do not have USB killers lying around, all USB killers are rattling around inside drawers in electronics labs and not scattered around like landmines in public parking lots
@0xabad1dea @green @lis I disagree. I just looked around and saw that USB killer was on my desk, just under the oscilloscope between an RF attenuator and an amplifier. It was definitely not in the drawer.
@0xabad1dea InfoSec folk in OS development: If I can plug this in without a kernel panic it is such a plain and unadulterated piece of media it’s probably not even been formatted
@0xabad1dea when i was in high school i found an SD card on the ground in a parking lot and nobody was around it might belong to and SD cards were expensive back then so I took it. I put it in my Wii because that was the only thing I really needed an SD card for at the time and it was full of photos of a girl from my school that I didn't know that well. Just regular snapshots. And I was like well I should give this back to her but then I was like...fuck...how do I go up to a girl I don't really know and say HEY I FOUND A BUNCH OF PHOTOS OF YOU, especially as a kid riddled with social anxiety...so I never gave it back to her and it's probably still sitting in my Wii right now.
@lori @0xabad1dea wait for a high school reunion to come up and hand it to her then. 😭💀
@0xabad1dea i absolutely not put it into my built in sdcard reader, just for the chance someone felt funny putting a bunch of capacitors into it and teach someone a lesson.
@wese I am 99.999% confident that the micro sd card I found on the ground in a residential neighborhood did not have extremely precise surgery performed on it to turn it into an electrostatic bomb to "teach someone a lesson" for trying to return family photos
@0xabad1dea @wese it really is the tech 'razorblade in the apple' eh
@0xabad1dea
Given the size of microsd, they'd have to have seriously advanced the state of the art in capacitor density, right?
@wese

@0xabad1dea

For security reasons, you should only plug in random USB thumbdrives you found in the parking lot.

@stuxnet

#Stuxnet

@0xabad1dea if there's a persistence vector on there, then I want it!
@0xabad1dea Been there, done that.
It was but a bit of readings from the gas company. 😅
@0xabad1dea plot twist: it's a fancy-ass SD card with nvme and it immediately does ungodly things to the pci-e bus.
@0xabad1dea
Me when clicking the phishing link at work.
@0xabad1dea
s/macbook m3/Linux computer/
@PC_Fluesterer as the owner of the macbook m3 in question I assure you I did not misidentify it
@0xabad1dea Yes. Perhaps I have been too short. My message was intended be: #Linux makes you even safer than #Apple. Way safer!
@0xabad1dea if the attack is that fancy they probably also have some zero-interaction RCE in outlook or some other shit
@0xabad1dea virtual machine dedicated to plugging in random usb drives off of the side of the road
@ioletsgo @0xabad1dea QubesOS is almost literally doing this.

@0xabad1dea

Whitebeard says: Risky Business

@0xabad1dea interestkng challenge, actually. i'd try to build a non-storage SDIO device and hit one of the wifi drivers. there has got to be a lot of attack surface in those
@0xabad1dea basically accurate - you might even learn something and reverse the sandbox

@0xabad1dea usb is easy to attack compared to sd (since usb can be a lot of different device types whereas sd can only be storage)

like orders of magnitude difference

@CauseOfBSOD the SD slot on a MacBook has DMA and afaik the USB doesn’t. The implied attack has already been shown to work.
@0xabad1dea @CauseOfBSOD thunderbolt defo does, as far as I know apple has an internal whitelist of vendors and will automagically reject anything else but I don't think this is gonna stop someone dedicated enough to the cause.

on my personal device I run my system in always ask mode for approving wired devices but this isn't really relevant for the threat model in question...

@0xabad1dea On linux theres a package you can setup, USBGuard. It basically hides the usb ports from the kernel, so if a usb is malicious, it cant do harm as the kernel is being blindfolded :D

you config it by initializing it with stuff you want enabled already plugged in. then everything else you need to add manually x.x

usb storage ? doesnt exist according to lsusb, you have to kindly ask the package to allow it.

new mouse or keyboard ? same story x.x
its pretty neat :3

@0xabad1dea

Once found a USB flash drive half-buried in a university flower bed, inside a crumbling plastic bag.

Mounted it in Linux, found a Powerpoint with an absolutely bonkerballs screed.

Mostly it read as a mentally ill young man falling deep into some ugly racist paranoid delusions.

Poured /dev/urandom into it.

@0xabad1dea the SD card: *actually full of very angry capacitors*
the macbook: *POP*
@0xabad1dea (tbf this is more likely with USB sticks and if someone manages to cram that into a SD card that's also very impressive, but flat high power caps do exist so it is not impossible either, just very evil xD)