Plunder Pillage & Print



Similar documents
FROM PRINTER TO PWND. Leveraging Multifunction Printers During Penetration Testing

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers

CAC/PIV PKI Solution Installation Survey & Checklist

Penetration Testing with Kali Linux

Customer Tips. How to Upgrade, Patch or Clone Xerox Multifunction Devices. for the user. Purpose. Upgrade / Patch / Clone Process Overview

Setting Up Scan to SMB on TaskALFA series MFP s.

Xerox Security Bulletin XRX13-006

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Device Log Export ENGLISH

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring MailArchiva with Insight Server

Quick Scan Features Setup Guide

Vulnerability Assessment and Penetration Testing

Customer Tips. Basic Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.

Simple Network Management Pwnd. Information Data Leakage Attacks Against SNMP

Created by Hotline Support Konica Minolta Hotline Support (UK) V1.2

SafeCom Smart Printing Administrator s Quick Guide

Learn Ethical Hacking, Become a Pentester

Smart Card Authentication. Administrator's Guide

Basic Exchange Setup Guide

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012

Send to Network Folder. Embedded Digital Sending

Scanning Guide for Current Colour Machines

Basic Exchange Setup Guide

Embedded Web Server Security

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.

Software Version 1.0 ConnectKey TM Share to Cloud April Xerox ConnectKey Share to Cloud User / Administrator s Guide

Penetration Testing Report Client: Business Solutions June 15 th 2015

PageScope Enterprise Suite

Authentication Methods

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android

F-SECURE MESSAGING SECURITY GATEWAY

HOW TO GUIDE. Pcounter Scan Server. For Support Click here INTRODUCTION

1. LAB SNIFFING LAB ID: 10

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

KM Embedded. Configuration Guide. AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Scan Features Minimum Requirements Guide WorkCentre M123/M128 WorkCentre Pro 123/ P42081

Scan to Quick Setup Guide

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Smart Card Installation and Configuration Guide

WirelessOffice Administrator LDAP/Active Directory Support

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Security Provider Integration Kerberos Authentication

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

LDAP User Guide PowerSchool Premier 5.1 Student Information System

The Trivial Cisco IP Phones Compromise

Xerox Multifunction Devices. Tracking versus Accounting

One Platform for all your Print, Scan and Device Management

Integrating LANGuardian with Active Directory

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

ECE 4893: Internetwork Security Lab 12: Web Security

Preinstallation Requirements Guide

Quick Scan Features Setup Guide. Scan to Setup. See also: System Administration Guide: Contains details about setup.

File Transfer Examples. Running commands on other computers and transferring files between computers

PrinterOn Print Management Overview

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

FreeFlow Core, Version 4.0 August P Xerox FreeFlow Core Security Guide

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Equitrac Office. Administration Guide Equitrac Corporation

NSi Mobile Installation Guide. Version 6.2

F-Secure Messaging Security Gateway. Deployment Guide

PaperCut Xerox Secure Access Manual

NovaBACKUP xsp Version 15.0 Upgrade Guide

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Linux VPS with cpanel. Getting Started Guide

How To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc

Summary. How-To: Active Directory Integration. April, 2006

Xerox PrintSafe Software

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

System Admin Module User Guide. Schmooze Com Inc.

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

For Use with QR Code Scanner / Reader Enabled Applications

qliqdirect Active Directory Guide

Centrify Cloud Connector Deployment Guide

HP JETADVANTAGE SECURITY MANAGER

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Customer Tips. Configuration and Use of the MeterAssistant Option. for the user. Purpose. Xerox Device Configuration. Xerox Multifunction Devices

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

SETUP AND OPERATION GUIDE CLOUD PRINT. Version 1.0. January KYOCERA Document Solutions UK

Smart Card Authentication Client. Administrator's Guide

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

A brief on Two-Factor Authentication

VoIPon Tel: +44 (0) Fax: +44 (0)

Five Steps to Improve Internal Network Security. Chattanooga ISSA

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

HP OfficeJet Pro 276DW Scan to Network Folder and Digital Fax to Network Folder not working after firmware upgrade

Kaseya Server Instal ation User Guide June 6, 2008

Summer Webinar Series

WHMCS LUXCLOUD MODULE

My FreeScan Vulnerabilities Report

How to Configure Captive Portal

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Transcription:

Plunder Pillage & Print THE ART OF LEVERAGING MULTIFUNCTION PRINTERS DURING PENETRATION TESTING Deral Heiland deral_heiland@rapid7.com @Percent_x Pete Arzamendi peter_arzamendi@rapid7.com @TheBokojan

Introduction Deral Heiland @Percent_X Senior Security Consultant Rapid7 Dayton, Ohio 20+ years IT 6+ years consultant/pentester Pete Arzamendi @thebokojan Senior Security Consultant Rapid7 AusMn, TX 14+ year IT 5+ years consultant/pentester

Agenda MulMfuncMon Printers (MFP) avack vector AVack Examples AutomaMng the avacks Reducing the risk

So Why Multi-Function Printer

So Why Multi-Function Printer What is it that all pentesters want USERNAMES PASSWORDS Which leads to shell

So Why Multi-Function Printer Since becoming the printer security evangelist 2010 printer hacking success during pentesmng Gain access to Windows acmve directory user account less then 10-15% Gained domain admin creds rarely 2014 printer hacking success during pentesmng Gain access to Windows acmve directory user account 45-50%+ Which leads to gaining Domain Admin access 25-30% Gain direct domain admin creds > 5%

So Why Multi-Function Printer How is this possible Usage tracking Scan to email Scan to file LDAP authentication Remote firmware upgrades Printer need access to credentials for these features to work correctly So let us Plunder Pillage & Print our way to SHELL

Plunder

Plunder plun der [pluhn-der] 1. To rob of goods or valuables by open force, as in war, hostile raids, brigandage, etc.: to plunder a town. 2. To rob, despoil, or fleece: to plunder the public treasury.

Plunder Pulling user data What kind of data can we get that will help with the assessment? Usernames Applications Hostnames

Plunder Examples: Dell Gives up usernames, applications, and client hostname Xerox Gives up usernames and applications HP Gives up usernames and applications

Dell Exposing Usernames, Applications, and Hostnames

Xerox Exposing Usernames and Applications

HP Exposing Usernames and Applications

Pillage

Pillage pil lage verb (used with object), pil laged, pil lag ing. 1. To strip ruthlessly of money or goods by open violence, as in war; plunder: The barbarians pillaged every conquered city. 2. To take as booty. verb (used without object), pil laged, pil lag ing. 3. To rob with open violence; take booty: Soldiers roamed the countryside, pillaging.

- Pillage - Address Book Extraction Attacks

Pillage Address books User name Email Addresses Passwords Konica Minolta Canon IR-ADV

Pillage Canon ImageRunner Advanced Canon IR-ADV Exported address books can contain password Requires special setting Passwords by default are encrypted during export Encryption settings are controlled on end user side So encryption can be turned off (FAIL)

Pillage Canon ImageRunner Advanced Canon IR-ADV enable password export

Pillage Canon ImageRunner Advanced Canon IR-ADV encrypt output password

Pillage Canon ImageRunner Advanced Canon IR-ADV address book export results

Pillage Canon ImageRunner Advanced Canon IR-ADV captured address book post request

Pillage Canon ImageRunner Advanced Canon IR-ADV captured address book request with web proxy

Pillage Canon ImageRunner Advanced Canon IR-ADV address book export results PWNED

Pillage Konica Minolta Konica Minolta Exported address books can contain passwords Not accessible via web console Managed via Konica Management application Soap message transactions TCP Ports 50001 50003

Pillage Konica Minolta Step 1: Authenticate and retrieve session key

Pillage Konica Minolta Reply: Valid authentication Responds with AuthKey

Pillage Konica Minolta Step 2: Post request with Authkey Set and proper version

Pillage Konica Minolta If all the pieces are correct the Konica will deliver data in plain text including : PASSWORDS Effective in retrieving password for: SMTP SMB FTP PWNED

- Pillage - The Pass-back Attack

Pillage Pass-back-attacks Target the printers authenmcamon services LDAP FTP SMB (Windows file sharing) SMTP

Lets focus on the LDAP Pass- Back- AVack PWNED Change IP Address LDAP Auth Trigger LDAP lookup Capture Plain Text Password LDAP Reply

Xerox LDAP Pass-Back-Attack Example: Executing a pass-back-attack against a Xerox ColorQube 9303 1. Login as admin user (Most Xerox s are configured with an admin password We ll show you how to get this later...) 2. Access the ldap setting under Properties -> Connectivity -> Protocols 3. Change IP address to point to your system 4. Set up netcat listener on your system 5. Issue a search under User Mappings

Xerox LDAP Setup Screen

Xerox User Mappings

Xerox Passing the Credentials PWNED

Sharp LDAP Pass-Back-Attack Example: Executing a LDAP pass-back-attack against a Sharp MX-4101N 1. Login as admin user (Most Sharp s are configured with an admin password of admin) 2. Access the LDAP setting under Network Settings 3. Change IP address to point to your system 4. Set up netcat listener on your system 5. Issue a test connection

Sharp LDAP Setup Screen

Sharp LDAP Setup Screen

Sharp Passing the Credentials

Print

Print print verb (used with object). 1. To produce (a text, picture, etc.) by applying inked types, plates, blocks, or the like, to paper or other material either by direct pressure or indirectly by offsetting an image onto an intermediate roller. 2. To reproduce (a design or pattern) by engraving on a plate or block. print verb (used with object). 1. The evil take over of a printer for the purpose of pillaging and plundering, accomplished using a print job over port 9100

- Print - Xerox Workcentre Firmware Attack

Print Firmware attacks attack against Xerox Xerox firmware files.dlm are simple Tar file with XRX job ticketing header

Print Extract a Xerox workcentra firmware you can find some interesting files opt/nc/dlm_toolkit dlm_tookit is used to build DLM firmware packages and sign them

Print dlm_maker application

Print Demo Video Print Job to Remote Root Shell

Print Detail white paper on Xerox firmware attack http://h.foofus.net/goons/percx/xerox_hack.pdf Vulnerable Xerox Models WorkCentre Pro 232/238/245/255/265/275 WorkCentre 232/238/245/255/265/275 WorkCentre Pro C2128/C2636/C3545 WorkCentre Pro 165/175 WorkCentre Pro M165/M175 WorkCentre Pro 32/40 Color WorkCentre Pro 65/75/90 WorkCentre Pro 35/45/55 WorkCentre M35/M45/M55 WorkCentre 5030 WorkCentre 5632/5635/5645/5655/5665/5675 WorkCentre 5735/5740/5745 WorkCentre 6400 WorkCentre 7655/7665/7675 WorkCentre 7755/7765/7775 ColorQube 9201/9202/9203 ColorQube 9301/9302/9303

Praeda+ Metasploit= Praedasploit

Praeda Praeda (LaMn for plunder, booty, spoils of war) Current Praeda version (WriVen in Perl) Embedded device informamon harvesmng tool Enumerate 103 devices/models Fingerprints devices using: 1. Title page & server type 2. SNMP

Praeda How it works: Scan network for embedded systems Fingerprint embedded systems Run Preada modules based on fingerprint Gather data and log it

Praeda How we use it: One of the first tools we run on an assessment Use data harvested to gain foothold in environment Success rate is pretty darn good. :)

Metasploit Easier to maintain and less decency issues Captured data can be stored within Metasploit s database for later use (ex: psexec and brute force modules) Large community base. Easier for users to contribute their own printer pwning modules

Praedasploit Beta Modules Modules we have created: Xerox LDAP pass-back module Konica address book extract module Dell and HP username extract module

Praedasploit module example ExtracMng usernames from a HP Color LaserJet CP3505

Praedasploit module example ExtracMng Address books from Canon IR- ADV

Praedasploit module example ExtracMng Address books from Konica Minolta

Praedasploit module example ExtracMng admin password from Xerox 5735

Praedasploit Future Additional Metasploit modules Embedded system scanning engine Fingerprint embedded devices The ability to call Metasploit modules

SECURING YOUR ENVIRONMENT

Securing Your Environment Change default password Don t match the default password schema Patch management Disable firmware upgrades Don t expose to the Internet FuncMonal isolamon (Access Control Lists) Payroll HR MFP management interface

QuesMon? Deral Heiland Deral_heiland@rapid7.com TwiVer: @Percent_X Pete Arzamendi Pete_Arzamendi@rapid7.com TwiVer: @thebokojan hvps://github.com/moosedojo/

END OF THE WORLD AS WE KNOW IT