Aerosol Posted December 1, 2014 Report Posted December 1, 2014 (edited) So, plug everything in, attach an external power supply to the graphics card, power it up, and. . . nothing.Or so it would seem. But, we’ve got a serial console on the Galileo, so we can check it out by running lspci.And there we have it! An Nvidia 0x10de standing out in a sea of Intel 0x8086. Our graphics card isconnected, enumerated, and waiting for drivers.7.3 Solemnization through SoftwareOn a normal desktop, the BIOS starts up, runs the video BIOS that initializes the display, and gets on withthings. But this is supposed to be a tiny embedded system. While it does boot via EFI, it doesn’t run videoBIOS or any option ROMs. We’ll have to that by hand.There’s already great instructions by Sergey Kiselev on how to build your own Linux for Galileo available.11I mostly followed those to get a standard install working, but I had to make two changes betweensteps 7 and 8 of Kiselev’s tutorial. We need to add all the X11 related packages, and we need to enablenouveau, the open-source Nvidia drivers, in our kernel configuration.7 . 1 . Add ‘ ‘ x11 ’ ’ t o the DISTRO\_FEATURES l i n e i n2 meta?cl a n t o n \_vxxxx/meta?cl an t on?d i s t r o / c o n f / d i s t r o / cl an t on ?ti n y . c o n f7 . 2 . C o n fi g u r e the k e r n el by runnin g ‘ ‘ bi t b a k e li n u x ?yocto?cl a n t o n ?c4 menucon fig ’ ’ and e n a bli n g nouveau under d ri v e r s ?>g r a p hi c s ?>nouveauCopy the resulting files to a MicroSD card, pop it in your Galileo, and you are a modprobe nouveau&& startx away from what might be the most inefficient way to drive a display ever devised. Of course,there’s no window manager or input devices yet configured, so you can’t do much, but that’s just a softwareproblem, right?Read more to PoC || GTFO 0x051 Sacrament of Communion with the Weird MachinesNeighbors, please join me in reading this seventh release of the International Journal ofProof of Concept or Get the Fuck Out, a friendly little collection of articles for ladies andgentlemen of distinguished ability and taste in the field of software exploitation and theworship of weird machines. If you are missing the first six issues, we the editors suggestpirating them from the usual locations, or on paper from a neighbor who picked up a copyof the first in Vegas, the second in S˜ao Paulo, the third in Hamburg, the fourth in Heidelberg,or the fifth in Montr´eal, or the sixth in Las Vegas.This release is dedicated to Jean Serri`ere, F8CW, who used his technical knowledge andan illegal shortwave transceiver to fight against the Nazi occupation of France. His wifeAlice Serri`ere once, when asked “Where are the tubes?” showed occupying soldiers the leakypipes in their basement.In Section 2, the Pastor reminds us that there are things that we must be thankful for,with a parable freshly drawn from the Intertubes.In Section 3, Fiora shares with us a collection of nifty tricks necessary to emulate modernNintendo Gamecube and Wii hardware both quickly and correctly. Tricks involve fancyMMU emulation, ways to emulate PowerPC’s bl/blr calling convention without confusingan X86 branch predictor, and subtle bugs that must be accounted for accurate floating pointemulation.Continuing the tradition of getting Adobe to blacklist our fine journal, pocorgtfo06.pdfis a TAR polyglot, which contains two valid PoC, as in both Pictures of Cats and Proofs ofConcept. In Section 4, Ange Albertini explains how this sleight of hand is performed.In Section 5, Micah Elizabeth Scott shares the story of the Pong Easter Egg that hidesin VMWare and the Pride Easter Egg that hides inside that!In Section 6, Craig Heffner shares two effective tricks for detecting that MIPS code isrunning inside of an emulator. From kernel mode, he identifies special function registers thathave values distinct to Qemu. From user mode, he flushes cache just before overwriting andthen executing shellcode. Only on a real machine—with unsynchronized I and D caches—doesthe older copy of the code execute.In Section 7, Philippe Teuwen extends his coloring book scripts from PoCkGTFO 5:3 toexploit the AngeCryption trick that first appeared in PoCkGTFO 3:11.In Section 8, Joe Grand presents some tricks for reverse engineering printed circuit boardswith sand paper and a flatbed scanner.Continuing this issue’s theme of tricks that allow or frustrate debugging and emulation,Ryan O’Neill in Section 9 describes the internals of his Davinci self-extracting executables inLinux. Here you’ll learn how to prevent your process from being easily debugged, sidesteppingLD_PRELOAD and ptrace().In Section 10, Don A. Bailey treats us to a fine bit of Vuln Fiction, describing a frighteningInternet of All Things run by a company not so different from one that shipped a maliciousdriver last month.Finally, in Section 11 we pass around the old collection plate, because—in the immortalwords of St. Herbert—the PoC must flow!Read more to PoC || GTFO 0x06 Edited December 1, 2014 by Aerosol 1 Quote