We don t need no stinkin badges!



Similar documents
12 Security Camera System Best Practices - Cyber Safe

December P Xerox App Studio 3.0 Information Assurance Disclosure

Service Manager and the Heartbleed Vulnerability (CVE )

IBM. Vulnerability scanning and best practices

emerge 50P emerge 5000P

Summer Webinar Series

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Acano solution. Security Considerations. August E

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Penetration Testing Report Client: Business Solutions June 15 th 2015

Who is Watching You? Video Conferencing Security

Codes of Connection for Devices Connected to Newcastle University ICT Network

Security Considerations White Paper for Cisco Smart Storage 1

Eyes on IZON: Surveilling IP Camera Security

Computer Search Engine

LifeSize Control Installation Guide

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Smartphone Pentest Framework v0.1. User Guide

Hardening Guide. Installation Guide

NMS300 Network Management System

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

SNI Vulnerability Assessment Report

Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys

Administrator s Guide for the Polycom Video Control Application (VCA)

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Exploiting Foscam IP Cameras.

CTS2134 Introduction to Networking. Module Network Security

OCS Virtual image. User guide. Version: Viking Edition

Hills Professional Series NVRs and Cameras

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Windows Remote Access

Multi-Homing Dual WAN Firewall Router

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

October P Xerox App Studio. Information Assurance Disclosure. Version 2.0

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Rally Installation Guide

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

1 Scope of Assessment

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

EXPLORER. TFT Filter CONFIGURATION

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Xerox Mobile Print Cloud

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

NAS 224 Remote Access Manual Configuration

Penetration Testing LAB Setup Guide

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Mediasite EX server deployment guide

Understanding Security Testing

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Avaya G700 Media Gateway Security - Issue 1.0

CARRIOTS TECHNICAL PRESENTATION

Firewalls. Chapter 3

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

A brief on Two-Factor Authentication

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

FROM PRINTER TO PWND. Leveraging Multifunction Printers During Penetration Testing

Gigabit SSL VPN Security Router

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS

CNet IP Camera Configuration Document

Hosted SharePoint: Questions every provider should answer

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Secret Server Qualys Integration Guide

Alliance Key Manager A Solution Brief for Technical Implementers

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Cyber Essentials. Test Specification

Quick Installation Guide

Half Bridge mode }These options are all found under Misc Configuration

8 steps to protect your Cisco router

Protecting the Home Network (Firewall)

Planning Maintenance for Complex Networks

VMware vcenter Log Insight Security Guide

Managing the System Event Log

Exam Questions SY0-401

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

DIGIPASS Authentication for GajShield GS Series

CLOUD SERVICES FOR EMS

Technical Overview CM-16 Climate Monitor. Get yours direct at:

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

ASV Scan Report Attestation of Scan Compliance

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Transcription:

We don t need no stinkin badges! Hacking electronic door access controllers Shawn Merdinger security researcher DEFCON 18

Outline EDAC technology Trends, landscape Vendors Architecture EDAC real-world analysis S2 Security NetBox Research, exposure, vulnerabilities, attacks Countermeasures & recommendations

Learning outcomes Awareness of security issues in EDAC systems Major players, vendors, resellers Pen-testing knowledge Research and testing methods

Choice quotations When hackers put viruses on your home computer it's a nuisance; when they unlock doors at your facility it's a nightmare. John L. Moss, S2 Security CEO STAD, Volume14, Issue 1. 1 January, 2004 Q. About security of buildings around town.what was your response? ATTY GEN. RENO: Let's do something about it. Q. Is this a good thing that has happened? ATTY GEN. RENO: I think any time you expose vulnerabilities, it's a good thing. Department of Justice Weekly Media Briefing, 25 May 2000

EDAC Technology Overview Trend is towards IP from proprietary solution Convergence of IP, Video Adding other building systems (HVAC, elevators, alarms) Cost savings, integration, increased capabilities Most controllers use embedded Linux Wide range of vendors in EDAC space S2 Security Honeywell HID Global Vertx Ingersoll-Rand Bosch Security Reach Systems Cisco Systems (Richards Zeta) Brivo DSX Access RS2 Technologies Synergistics

EDAC Deployment Often you ll see Managed by building facilities people Stuck in a closet and forgotten Long lifecycles of 5-10 years Distanced from IT Security Physical security is not your domain. It s ours. Patching, upgrades, maintenance. What? Huh? Policies regarding passwords, logging don t apply 3 rd party local service contractor adds doors, hardware configuration

EDAC Architecture

S2 Security NetBox Built by S2 Security 9000+ systems installed worldwide Schools, hospitals, businesses, LEA facilities, etc. Same box is sold under multiple brand names Built by S2 Security NetBox Distributed by Linear emerge 50 & 5000 Resellers re-branding Sonitrol eaccess

S2 Security NetBox

S2 Security: Reading up Preparation and information gathering S2 Security case studies, press releases The Google Lexis-Nexis Academic Universe, ABI-Inform, etc. Example: able to determine from http://tinyurl.com/s2mysql Samba client MySQL, MyISAM Lineo Linux distribution (just like Zarus! ) Processor is ARM Core IXP 425 chip @ 533 MHz Only 15 months from design to 1 st customer shipping S2 did not have much prior experience with open source MySQL is used to store everything from reports, user information, customized features, facility diagrams, and more

NetBox Components HTTP MySQL / Postgres NmComm FTP/Telnet Features!

NetBox Component: HTTP Server GoAhead Webserver TCP/80 Poor choice Sixteen CVEs CVE-2003-1568, CVE-2002-2431, CVE-2002-2430, CVE- 2002-2429, CVE-2002-2428, etc. No vendor response Typical example in CVE-2002-1951 Vendor response: GoAhead.contacted on three different occasions during the last three months but supplied no meaningful response. "Data security is a challenge, and unfortunately, not everyone has risen to it. John L. Moss, S2 Security CEO

NetBox Component: MySQL MySQL server listening on 3306 Outdated SQL Version 2.X uses MySQL version 4.0 3.X uses Postgres Just how old is MySQL 4.0? WTF? End of DOWNLOAD?

NetBox Component: NmComm Service listening on TCP/7362 Performs multicast discovery of nodes Daemon coded by S2 Security Patent issued 15 December, 2009 System and method to configure a network node http://tinyurl.com/s2patent Gentlemen, start your fuzzers!

NetBox Component: FTP & telnet Cleartext protocols for a security device Telnet to manage FTP for DB backups Poor security-oriented documentation "We see some vendors fitting their serial devices with Telnet adapters, which simply sit on the network transmitting unsecured serial data. John L. Moss, S2 Security CEO

NetBox Components: Features! Lots of extras and licenses options Elevators, HVAC, Burglar VoIP Increases complexity Expands attack surface Daemons Libraries

NetBox Components: Features! View floorplans

NetBox unauthenticated reset VU#571629 Remote, unauthenticated factory reset via crafted URL

NetBox Unauth Access to Backup VU#228737 Unauth attacker can dload DB backups Nightly DB backup is hardcoded CRONJOB File name is full_yyyymmdd_hhmmss.1.dar Predictable naming convention with timestamp Uncompress the.dar format Backup DB is in var/db/s2/tmp/backup/all.dmp Attacker gets backup DB = Game Over Entire system data in DB!

NetBox Unauth Access to Backup Extraction of administrator MySQL_64bit hash Affects NetBox 2.X (mysql) and 3.X (postgres) Hash is trivial to crack Attacker now has admin access

NetBox Pwnage: Doors Open any door Right now Or schedule

NetBox Pwnage: Cameras Backup file contains IP camera information Name, IP address, admin username and password NetBox 2.X and 3.X systems vulnerable Attacker now owns IP cameras "Most hackers don't care about watching your lobby. If they gain access to the network, they're going to go after financial data and trade secrets. Justin Lott, Bosch security marketing

NetBox Pwnage: DVRs User/Pass to DVRs in backup DB Poor setup guides for DVRs Recommends keeping default user/pass On-Net Surveillance Systems Network Video Recorder document

NetBox Fingerprinting Remote Identification MAC OID registered to S2 Security Nmap service fingerprint submitted (nmap 5.20)

Recommendations: Vendor Vendor Conduct security evaluations on your products Provide secure deployment guides Tighten-up 3 rd party integration Improve Logging More details: changes, auditing, debug levels Ability to send to log server HTTP Use a better HTTP daemon Enable HTTPS by default Modify banners, reduce footprint, etc. FTP Change to SFTP Telnet Change to SSH

Recommendations: Customers Demand better security! From vendor, reseller, and service contractor Expect fixes and patches Manage your EDAC like any other IT system Patching, change management, security reviews Technical Isolate emerge system components VLANs, MAC auth, VPN, restrict IP, etc.

Questions? Contact Follow-up questions Security evaluations scm@hush.com http://www.linkedin.com/in/shawnmerdinger