Computer Search Engine

Similar documents
We don t need no stinkin badges!

Security Testing in Critical Systems

Who is Watching You? Video Conferencing Security

Secure Networks for Process Control

CTS2134 Introduction to Networking. Module Network Security

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

SHODAN for Penetration Testers. Michael theprez98 Schearer

Eyes on IZON: Surveilling IP Camera Security

Security Considerations White Paper for Cisco Smart Storage 1

Codes of Connection for Devices Connected to Newcastle University ICT Network

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Plunder Pillage & Print

Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys

Summer Webinar Series

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TotalCloud Phone System

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Secure Data Center Operations Gilbert Held Payoff

Penetration Testing with Kali Linux

VoipSwitch Security Audit

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

RemotelyAnywhere. Security Considerations

The Self-Hack Audit Stephen James Payoff

Accessing Remote Devices via the LAN-Cell 2

Information. Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.

Tunnels and Redirectors

Concierge SIEM Reporting Overview

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Network Management Card Security Implementation

Building A Secure Microsoft Exchange Continuity Appliance

Executive Summary and Purpose

Network Management Deployment Guide

Building the Next Generation of Computer Security Professionals. Chris Simpson

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

OS Installation Guide Red Hat Linux 9.0

12 Security Camera System Best Practices - Cyber Safe

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

WhatsUpGold. v3.0. WhatsConnected User Guide

Added Security for your Traffic Signal Network

Virtually Pwned Pentesting VMware. Claudio

EZblue BusinessServer The All - In - One Server For Your Home And Business

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Using Nessus In Web Application Vulnerability Assessments

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Malware & Botnets. Botnets

Defeating Firewalls : Sneaking Into Office Computers From Home

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Network Traffic Analysis

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

SAST, DAST and Vulnerability Assessments, = 4

Developing Network Security Strategies

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Marble & MobileIron Mobile App Risk Mitigation

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

Vulnerability Testing of Industrial Network Devices

Simple Network Management Pwnd. Information Data Leakage Attacks Against SNMP

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Cyber Essentials. Test Specification

Firewall Firewall August, 2003

File Transfer Examples. Running commands on other computers and transferring files between computers

EZblue BusinessServer The All - In - One Server For Your Home And Business

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

CloudPassage Halo Technical Overview

1. LAB SNIFFING LAB ID: 10

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Catapult PCI Compliance

Installation and Configuration Manual

A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan

June 2013 v. 0.2

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Cisco ISE Command-Line Interface

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

NOC PS manual. Copyright Maxnet All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

What is Bitdefender BOX?

Firewalls. Chapter 3

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

SolarWinds Log & Event Manager

How to build a security assessment program. Dan Boucaut

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Linux Network Security

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Network Monitoring with SNMP

Transcription:

SHODAN Computer Search Engine University of Florida 5 November, 2013 Shawn Merdinger Security Analyst, HealthNet UF Health

Outline Shodan High-level technical overview Research Findings

Shodan Computer Search Engine John Matherly US based Public late 2009 Search engine for service banners of pre-scanned devices that are accessible via the public Internet Somewhat controversial... Major media coverage, security conference talks, DHS ICS-CERT advisories, political leaders naming as threat Tool: utility and outcome are dependent on use and intent

Shodan Scans Shodan's Scanning Process Shodan servers scan Internet Place scan results in DB Users search Shodan Services (web, telnet, snmp, ftp, mysql, rdp, etc.) Ports (80, 8080, 443, 161, 21, 23, 3389, etc) Web interface or API Free-text, port, org, hostname, country, city, CIDR, etc. Advanced Integration Metasploit Modules (hat tip to John Sawyer :) ExlpoitDB, Analysis with Maltego, geolocation mapping

How We Use Shodan at UF&Shands Currently looking for low-hanging fruit Printers on public IP Open Telnet Polycom Command Shell Lots of ways to leverage more Automation & deltas Application-level Limitations External IP only Still worth it

Who Is Talking About Shodan? If Joe Lieberman is talking about Shodan, you must know what it is.

DHS ICS-CERT Shodan Advisories First issued October 2010 Several updates & references since

10/25 DHS ICS-CERT Advisory Project SHINE: SHodan INtelligence Extraction Bob Radvanovsky & Jake Brodsky infracritical / scadasec I provide volunteer research support, search terms, etc. Daily search feed to ICS-CERT +1,000,000 sensitive systems so far, 8K devices new daily

Keeping Perspective... Scanning is old news Attackers Constantly scanning you Shodan just made scanning more Searchable + visible + accessible...without scanning Legitimate research HD Moore's scanning project Academic researchers doing default credential checks! HOT --> Hits select UDP ports of entire Internet every 7 hours.ru vps Columbia, 2010 (Qui, Stoflo) +500K devices with default credentials Scans.io Repository of raw scan data

Research Findings Challenges Of finding and reporting scary things Do no harm ground rules, intent, curiosity, outcomes What to do? Who to tell? How to go about it? Perspectives We will sue you Unethical Thank you No response The invaluable value of the CERTs I would not do this without them as resource. Period. Find bad stuff, write-up threat evaluation, send to CERTs Leave them alone Takes time, but mostly good results...mostly Exceptions...

S2 Security NetBox DefCon 2010 talk: We don't need no stinkin' badges Building Door Access Controllers (Web Based) Multiple CVEs, complete compromise of device, S2 Security vendor threatened to sue me, blocked my Twitter follow... Real value of Shodan Proved not deep inside corporate network (Today 800+ ) When hackers put viruses on your home computer it's a nuisance; when they unlock doors at your facility it's a nightmare John Moss, CEO of S2 Security

VoIP Phones Lots of VoIP phones, individual, conference (esp. Polycom) Late 2010 I focused on Snom VOIPSA blog Remote Tap scripts, call via phone web server, record, etc. Hard to find open Snom now Exposure works?!?!

No Auth Cisco Routers & Switches "cisco-ios" "last-modified" 14,000+ devices with HTTP No authentication set Level 15 access via HTTP ip http authentication local would lock down web server Creative attacks bit.ly and tinyurl.com w/ commands

No Auth Cisco Devices in Iran School of Particles and Accelerators in Tehran, Iran Hrmm...might be interested in this?

Banners Bite Back Warning banners = easy fingerprinting When best practices...ain't Swisscom and hotel routers (1200+) Warning banner has company name and hotel location Telnet. No SSH If they run their routers like this - what else?

Banners Bite Back Swisscom Miami Conference Routers (7)

Open SMB Router Example Netopia with Telnet open ready for setup (2500)

Telnet To Root On Linux Devices TVs, DVRs, home wifi/routers, phones, refrigerators Telnet to root, no auth! Botnets (Carna, Aidra)

WebCams Huge numbers, all kinds of uses Personal, Office, Business, Security, SCADA See Dan Tentler's talks and code Camcreep.py Auto screenshot via CLI wkhtmltoimage

Watching the Watchers Watch Credit: Dan Tentler @viss

Printers on Public IP Technical Risks Advanced research (Andrei Costin, Ph.D - Milan, Italy) MFP = Multi-function Printer (FAX, Scan, Email, Storage) Access docs, change configs, attack via printed document Risks Print from anywhere, Web printing, run out paper, ink Social engineering...but how bad could a printer be?

Printer Case Study: Penn State One line of code: cat jerrys_favorite_kids.img nc target_ip 9100

Online Crematorium Siemens HMI - VNC 3 char default pass, no auth Telnet, MD5 passwords pr0f South Houston SCADA hack (11/2011)

Cisco Lawful Intercept Cisco routers with LI special code and SNMP public LI User = level 16 super-duper Cisco admin level. Supposed to be invisible to any other user. Taps supposed to use encrypted SNMPv3 for secure Mediation Device comms.

BlueCoat BlueCoat surveillance devices and human rights abuses Syria Tracking and interception of dissidents' communications From Chilling effect to Killing effect ITAR export violations Ethical questions, PR exposure

CacheTalk Safes

Econolite Traffic Light Controller Yes, it is what you think. Credit: Dan Tentler @viss

Red Light Enforcement Cameras Delete those pesky speeding tickets!

Embassy Devices Question: What's running telnet in country X with embassy in name? Cuts both ways...

Serial to Ethernet Controllers Many of these are online Connected to anything that has a serial port Extra scary because don't know what it controls Web, telnet, snmp HVAC, lab stuff, etc. Wide open Legacy BACnet Hot-glued onto MB

Caterpiller VIMS Web based remote monitoring (control?) over cell modem CAT 79X series = largest trucks in world 80+ in Alberta, Canada (working the tar sands) Poor vendor response...lawyers, not engineers

75+ US TV Stations' Antennas TV station digital antenna controllers w/ no auth (telnet/http) Remote sites, air-to-ground data links, marketed to MIL, LEO, broadcasters On the wire looks like home NAS or DVR (embedded Windows) Multi-step search technique to find (1) Shodan (2) scan for unique port Sent DHS ICS-CERT report of issues, IP, Geolocation, FCC info Major broadcast network with C in acronym name Asset Owner: We'll take care of this after election Vendor: Should be deep in corporate network None have been secured as of today...

Gas Station Pumps 600+ in Turkey Reported to Turkish CERT Posted search & vendor doc to my Twitter feed Can be unattended gas stations, fully automated

Gas Station Pumps

Wrapping up Register for free Shodan account Email John Matherly for moar access Read up on Shodan Wikipedia Shodan web site (help, filters, references) Understand tool integration and new tools Metasploit, Stach & Lui Diggity, Shi0San, etc. Be smart. Be responsible. Tell it like it is.

Thanks! Contact Email: shawnmer@ufl.edu Twitter @shawnmer LinkedIN MedSec