TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hard drive hack provides root access, even after reinstall

472 pointsby pd0wmalmost 12 years ago

19 comments

ChuckMcMalmost 12 years ago
This was a great read. One of the things we've done in the past is to modify the firmware of the drive to be able to give errors on command. The purpose was for testing RAID systems in real life scenarios. One can include a 'unit test' drive in a RAID array which will run through a series of known bad disk behaviours. From the simple like returning read failure, to the more complex like returning the wrong block or returning a block that has been silently corrupted (both things NetApp observed in the wild on 'real' drives), and my personal favourite acknowledging a write but not actually writing the data (nearly killed the Cisco relationship they had at the time)
评论 #6150245 未加载
评论 #6152648 未加载
WestCoastJustinalmost 12 years ago
If you liked this, then you might like Travis Goodspeed&#x27;s really cool talk about &quot;Writing a Thumbdrive from Scratch&quot; (for antiforensics) [1] at the 29th Chaos Communication Congress [29c3].<p>[1] <a href="http://www.youtube.com/watch?v=D8Im0_KUEf8" rel="nofollow">http:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=D8Im0_KUEf8</a>
评论 #6150139 未加载
评论 #6149921 未加载
lscalmost 12 years ago
The thing that interests me, though, is the idea of modifying your hard drive firmware for better performance.<p>My understanding is that the effective width of the write head is 10x the width of the read head... E.g. with the right firmware, it should be possible, if you are okay with a write-once medium, to write the outermost track, move the write head in 1&#x2F;10th what you&#x27;d normally move it, then write the next track, etc... and get 10x the space out of the drive you normally would. In theory, the read head wouldn&#x27;t have trouble. (of course, this would be write once storage, as the effective width of your write head is still pretty huge; but for a bunch of things? I can totally work with that... if more than X% of a drive was garbage data, I copy the good data to a new drive and reformat the old one. Done.)<p>I hear rumors that both the major drive manufacturers are actually shipping drives with this technology, but are only selling those drives to really big players, for some reason.<p>Here&#x27;s a reasonable reference to the &#x27;shingle&#x27; technology, and he roadmap for the rest of us:<p><a href="http://www.theregister.co.uk/2013/06/25/wd_shingles_hamr_roadmap/" rel="nofollow">http:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2013&#x2F;06&#x2F;25&#x2F;wd_shingles_hamr_roa...</a><p>but that&#x27;s the thing, with the datasheets (and, well, a lot more skill than I personally have) we should be able to setup something like shingling on the cheap disks we have today.<p>Of course, from reading the article, I&#x27;m not sure I&#x27;m any closer to that particular dream.
评论 #6150407 未加载
kabdibalmost 12 years ago
My knee-jerk reaction was, why didn&#x27;t WD sign the code and use on-chip fuses and a secure boot path to verify the code before transferring control to anything outside their boot ROM? (Many ARM-based systems-on-a-chip are capable of doing this).<p>Adds cost, for one thing. But you can arrange for the unit to never run a byte of code (even one loaded from the platter) that didn&#x27;t come from WD.
评论 #6149367 未加载
评论 #6150006 未加载
评论 #6149296 未加载
评论 #6149346 未加载
muninalmost 12 years ago
something I hadn&#x27;t really considered about hard disk encryption, before reading this, is how it could protect against compromised disk controllers. if the OS encrypts the data stored on the disk, it would be a lot harder (perhaps, with the right composition, impossible) for a malicious disk controller to insert&#x2F;change&#x2F;modify important data (like code, or password files) stored on the computer.<p>we think of the system as a holistic entity, but turned on its head, you can see how the inside of a computer is just a network...
评论 #6149605 未加载
评论 #6149487 未加载
gabriel34almost 12 years ago
Could this attack compromisse dedicated&#x2F;rent servers? If so, the attacker could rent, install the exploit on the hardware and terminate the contract. What about cloud servers? Sure there are virtualization layers, but can&#x27;t those be breached? If so that would pose imense danger given the distributed nature the hardware exploit could render the entire farm vulnerable
评论 #6149844 未加载
wiredfoolalmost 12 years ago
Installing linux on a hard drive never sounded impressive before.
评论 #6149012 未加载
batistealmost 12 years ago
The first hack read on hacker new I have seen for a long time.
评论 #6152671 未加载
评论 #6150009 未加载
评论 #6149609 未加载
评论 #6149787 未加载
quasquealmost 12 years ago
A fascinating read, and an excellent piece of work.<p>It reminds me of a similar proof-of-concept hack on a common network card firmware: <a href="http://esec-lab.sogeti.com/post/2010/11/21/Presentation-at-Hack.lu-:-Reversing-the-Broacom-NetExtreme-s-firmware" rel="nofollow">http:&#x2F;&#x2F;esec-lab.sogeti.com&#x2F;post&#x2F;2010&#x2F;11&#x2F;21&#x2F;Presentation-at-H...</a> (the slides linked from that page have a good more technical overview that the blog post).
yuhongalmost 12 years ago
I think some hard drives like some Seagates has a serial console in the firmware that provides low level access that data recovery companies for example use.
评论 #6149238 未加载
swangalmost 12 years ago
Does a jellybean part just mean its very common?
评论 #6149068 未加载
wereHamsteralmost 12 years ago
&gt; Because Linux caches the shadow file (like all files recently accessed), I have to generate a lot of disk activity for the file to be &#x27;pushed out&#x27; of the cache<p><a href="http://linux-mm.org/Drop_Caches" rel="nofollow">http:&#x2F;&#x2F;linux-mm.org&#x2F;Drop_Caches</a><p>$ echo 3 &gt; &#x2F;proc&#x2F;sys&#x2F;vm&#x2F;drop_caches<p>or as non-root<p>$ echo 3 | sudo tee &#x2F;proc&#x2F;sys&#x2F;vm&#x2F;drop_caches
评论 #6149191 未加载
评论 #6149478 未加载
评论 #6154810 未加载
brudgersalmost 12 years ago
Great article. But what I came away from it thinking was about how much money is spent by state security institutions to prevent this sort of thing, and yet secrecy breeches at scale are the Walkers, Mannings, and Snowdens using USB sticks and DVD&#x27;s and copiers.
x0054almost 12 years ago
This is some hard core hacking! Love it! First, as others mentioned, this is why you should always encrypt your os drives. Second, it also got me thinking, how many other devices are open to this kind of attack. Like a network switch, perhaps? Say you buy 100 network switches, alter the firmware to call home and maybe even load a Linux instance, and then resell them on amazon, eBay, or even better, give a &quot;good&quot; cash deal to some local IT company. Then you just seat back and wait for your 100 bots to call home for their new business class Internet homes.
0x0almost 12 years ago
This is incredibly scary. Will HD vendors start implementing firmware code signing anytime soon? Or will some enterprising hackers start working on an open source firmware implementation?
b0rsukalmost 12 years ago
That&#x27;s a whole world of spying opportunities. A government could make secret deals with hard drive manufacturers. Perhaps not US government, but Taiwan government, if it makes you happier... (I&#x27;m from neither country)
评论 #6150596 未加载
korethralmost 12 years ago
This is very cool. I have a pile of dead and old hard drives. I should see if my local hackerspace has something that can connect to JTAG, and if so, see what secrets the old drives contain.
vlralmost 12 years ago
I remember Dejan Kalijevik from them nokia s&#x2F;w. Is he talking of the same Dejan?
dnauticsalmost 12 years ago
what is that cortex-M3 chip doing? Did the NSA put it there?