Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux



Similar documents
Cybersecurity of Buildings Workshop OT and IT Convergence A New Paradigm. Marriott Wardman Park January 6, 2014

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

IDS and Penetration Testing Lab ISA656 (Attacker)

Course Title: Penetration Testing: Security Analysis

Tk20 Network Infrastructure

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

It's All About HVAC Systems and Saving Big Bucks Using DDC Systems!

Security Issues with Integrated Smart Buildings

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Net AX Supervisor with 0 Niagara network connections - for. EC-Net AX Supervisor with 100 Niagara network connections. Includes

Cybersecuring DoD Industrial Control Systems One Year Later.

Niagara IT Manager s Guide

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cyber Threats in Physical Security Understanding and Mitigating the Risk

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Control System - Enterprise Integration HVAC Concepts, Inc. (2005)

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

INFORMATION SECURITY TRAINING CATALOG (2015)

Vulnerability Assessment and Penetration Testing

@arnaudsoullie. Windows Active Directory Can a Windows AD be secured? JSSI 2013 (French, sorry) SCADA stuff

Build Your Own Security Lab

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Penetration Testing with Kali Linux

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

VMware: Advanced Security

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

IT Security and OT Security. Understanding the Challenges

IDS and Penetration Testing Lab ISA 674

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Basics Value Next Steps

Configuring an APOGEE System on an IT Infrastructure White Paper

IBM. Vulnerability scanning and best practices

Missing the Obvious: Network Security Monitoring for ICS

Networks and Security Lab. Network Forensics

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Comprehensive Data Center Energy Management Solutions

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst (ECSA)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Network Traffic Analysis

CYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S.

WISE-4000 Series. WISE IoT Wireless I/O Modules

AutoLog ControlMan. Remote Monitoring & Controlling Service

Linux Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Cyber Security Implications of SIS Integration with Control Networks

Introduction to Network Discovery and Identity

securityprobe5es -X20

Automated Vulnerability Scan Results

Cyber Security for NERC CIP Version 5 Compliance

Holistic View of Industrial Control Cyber Security

Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, Washington, DC

Topics in Network Security

Reclamation Manual Directives and Standards

The Trend Toward Convergence of Physical and Logical (Cyber) Security

SECURING THE MOVE TO IP-BASED SCADA/PLC NETWORKS

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Networking Basics and Network Security

CompTIA Network+ (Exam N10-005)

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Securely Connect, Network, Access, and Visualize Your Data

Compatible with all of the Ravica range of Intelligent Sensors it provides a complete environmental, access control and security monitoring solution.

Monitoring & Control of Small-scale Renewable Energy Sources

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Windows Remote Access

Wireless Tools. Training materials for wireless trainers

securityprobe 5E Standard

Comprehensive Data Center Energy Management Solutions

CIT 380: Securing Computer Systems

Enterprise A Closer Look at Wireless Intrusion Detection:

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

Information Security. Training

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

Availability Digest. Redundant Load Balancing for High Availability July 2013

Facilitated Self-Evaluation v1.0

Virtual Learning Tools in Cyber Security Education

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

Wireless Security: Secure and Public Networks Kory Kirk


Securing EtherNet/IP Using DPI Firewall Technology

Potential Targets - Field Devices

Meeting the Cybersecurity Standards of ANSI/ISA with Data Diodes

Data Logger & Net Client Software (Windows, ipad, Android) Instant On. Touch. Drop & Drag Opera on. No more proprietary display equipment!

Keeping the Lights On

What you don t know about industrial GSM/GPRS modem communications

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Transcription:

Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux Michael Chipley, PhD GICSP PMP LEED AP President March 24, 2015 mchipley@pmcgroup.biz

Control Systems Definitions Industrial Control Systems (ICS) are physical equipment oriented technologies and systems that deal with the actual running of plants and equipment, include devices that ensure physical system integrity and meet technical constraints, and are event-driven and frequently realtime software applications or devices with embedded software. These types of specialized systems are pervasive throughout the infrastructure and are required to meet numerous and often conflicting safety, performance, security, reliability, and operational requirements. ICSs include Building Automation Systems (BAS), Building Management Systems (BMS), Energy Management Systems (EMS), Emergency Management Information Systems (EMIS), and Electronic Security Systems (ESS). Within the controls systems industry, ICS systems are often referred to as Operational Technology (OT) systems. Emerging Terms: Cyber-Physical Systems (CPS), Resilient Interdependent Infrastructure Processes and Systems (RIPS)

Types of Building Control Systems Advanced Metering Infrastructure Building Automation System Building Management Control System CCTV Surveillance System CO2 Monitoring Digital Signage Systems Electronic Security System Emergency Management System Energy Management System Exterior Lighting Control Systems Fire Alarm System Fire Sprinkler System Interior Lighting Control System Intrusion Detection Systems Physical Access Control System Public Safety/Land Mobile Radios Renewable Energy Geothermal Systems Renewable Energy Photo Voltaic Systems Shade Control System Smoke and Purge Systems Vertical Transport System (Elevators and Escalators) Smart High-Performance Green Buildings are highly integrated / interconnected

Johnson Controls Architecture

TridiumArchitecture

System & Terminal Unit Controllers, Actuators JACE Field Server ilon Smart Server VAV L-switch BAS Remote Server Valve Actuator Valve Actuator Pressure Sensor Temperature Sensor Analog voltage, resistance, current signal is converted to digital, then IP

ICS Protocols Internet Protocols IPv4 and IPv6 Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Hypertext Transfer Protocol (HTTP) - Port 80 Hypertext Transfer Protocol Secure (HTTPS) -Port 443 Open Control Systems Protocols Modbus: Master/Slave - Port 502 BACnet: Master/Slave - Port 47808 LonWorks/LonTalk: Peer to Peer - Port 1679 DNP3: Master/Slave - Port 20000 IEEE 802.x -Peer to Peer Zigbee-Peer to Peer Bluetooth Master/Slave Proprietary Control Systems Protocols Tridium NiagraAX/Fox Johnson Metasys N2 OSISoft Pi System Many others

Building Control System Protocols Control systems are fundamentally different than IT Can be based on Master and Slaves or Peer to Peer Slaves have Registers and Coils Devices use several different programming languages to perform operations Not originally designed for security or encryption Master = Client : sends requests for values in the address Slave = Server : replies with data Registers and Coils = memory locations Typical file extensions: *.ACD *.CXP *.ESD *.ESX *.LDA *.LCD *.LDO *.LCX *.plcproject *.PRJ *.PRT *.RSP *.QXD *.SCD

Typical Modbus Architecture

Typical BACnetArchitecture

Continuous Monitoring and Attack Surfaces Host Based Security Systems Scanning (Active) Windows, Linux HTTP, TCP, UDP McAfee Nessus Retina Client Side Attacks Server Side Attacks Intrusion Detection Systems (Passive) PLC, RTU, Sensor Modbus, LonTalk, BACnet, DNP3 Nessus Passive Vulnerability Scanner Sophia Grass Marlin Others? Network Attacks Hardware Attacks

Tools Information Gathering Google Search and Hacking Google Earth The Harvester Recon-NG Shodan Costar Network Discovery & Monitoring Nmap Snort Kismet Nessus McAfee Sophia Bandolier Attack and Defend Tools Kali Linux (Backtrack) SamuraiSTFU Wireshark Gleg Windows PowerShell Windows Management Information Console Windows Enhanced Mitigation Tools Windows Sysinternals Assessment Tools DHS ICS-CERT Cyber Security Evaluation Tool (CSET) Virtual Machines VM Player Windows Hypervisor

Google Hacking https://www.google.com/#q=navy+tridium+bangor

Google Hacking filetype:pdf-site:tridium.com site:mil https://www.neco.navy.mil/upload/n44255/n4425513r40020005n4425513r400200 05N44255-13-R-4002_Part_3_Draft.pdf

Google Hacking DiggityProject http://www.bishopfox.com/resources/tools/google-hacking-diggity/attacktools/#searchdiggity

Google Hacking DiggityProject...level the playing field find information disclosures and exposed vulnerabilities before others do

Google Earth Almost every community has downloadable.kmz files of infrastructure

BING Bird s Eye provides high resolution 3d imagery

GSA Smart Buildings Sources Sought (1) Google Street View provides very high resolution imagery of building & surrounds

Shodan Shodan is to OT IP addresses as is Google is to text search

Google Hacking-Database http://www.exploit-db.com/google-dorks/

Google Hacking DB Search Honeywell results

Shodan TridiumSearch Direct Internet connected HMI

DistechControls

Shodan DistechSearch HTTP/1.0 401 Unauthorized WWW-Authenticate: Digest realm="niagara-admin", qop="auth", algorithm="md5", nonce="uvdrawnmndawnje1odc4nzbhytc5njmyyzlkytk3ntg1zdqy" Content-Length: 56 Content-Type: text/html Niagara-Platform: QNX Niagara-Started: 2013-8-3-4-11-32 Baja-Station-Brand: distech Niagara-HostId: Qnx-NPM2-0000-12EA-FDCC Server: Niagara Web Server/3.0 Attacker has most of the information needed to exploit

Kali Linux http://www.kali.org/

Kali Menu Many exploitation tools

Target Sequence Target 1 Corporate DMZ Web Server, php exploit, use Meterpreter Target 2 File Server, psexec Pass-the Hash exploit, use Meterpreter Target 3 MS Domain Controller, nbtstat, netsh to create Beacon, use Meterpreter Target 4 ICS/BAS, Modbus exploit, locate devices

Target 4 (ICS/BAS) Attacker has now identified the number of Modbus devices on the network.

SamuraiSTFUApplications Embedded Electronics Field Technician Interfaces RF Communications Network Protocols User Interfaces

Launch mbtget Modbus Command Line Mbtget: universal Modbus read/write, no authentication required

Mbtget Change Registers and Coils ModbusPalRegister and Coil values have been overwritten by mbtget. Attacker uses vendor product, install instructions to identify initial settings, then alter them. No error codes show up to alert operator a system parameter has been changed, but High Voltage Alarm would be triggered, unless attacker also changed the Alarm value..

Wireshark Home Start and observe packets being captured Sample Captures (pcap) Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level.

Wireshark Modbus Captures Modbus Passive method to collect ALL IP data traversing, wired and wireless