The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team



Similar documents
Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation

ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery

IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley

Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535

Cryptographic Keys Life Cycle Management for your Company

JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences

BBP-2665 IBM BPM Process Modeling Experience on the Web

MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India

Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer

YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture

Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami

Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM

Deliverability 101. #amplify International Business Machines Corporation

How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience

Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)

Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect

Deliverability 201. #amplify International Business Machines Corporation

Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016

Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here

DataPower z/os crypto integration

YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer

Keynote: Cyber Intelligence and Cyber Security Overview

Communications Server for Linux

IBM Tivoli Service Request Manager 7.1

Java and Other Languages

z/os V1R11 Communications Server system management and monitoring

IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

IBM FlashSystem Cloud Performance and Capability

Speeding Cloud Foundry with Open Source OpenPOWER Hardware

Deploying a private database cloud on z Systems

WebSphere Commerce V7.0

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

Leveraging WebSphere Commerce for Search Engine Optimization (SEO)

Database lifecycle management

IBM Enterprise Marketing Management. Domain Name Options for

IBM Cognos Controller Version New Features Guide

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

CS z/os Network Security Configuration Assistant GUI

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

IBM Security QRadar Version Common Ports Guide

Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics

Installing on Windows

IBM Software Group. SW5706 JVM Tools IBM Corporation 4.0. This presentation will act as an introduction to JVM tools.

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

Managing and Securing the Mobile Device Invasion IBM Corporation

White paper December Addressing single sign-on inside, outside, and between organizations

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

IBM WebSphere Data Interchange V3.3

IBM Research Day: Containers Changing the Game in Cloud. Gosia Steinder Distinguished Research Staff Member

Packet Capture Users Guide

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

LAN API FOR DOORBIRD AND BIRDGUARD

IBM FlashSystem. SNMP Guide

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

Strengthen security with intelligent identity and access management

IBM Enterprise Marketing Management. Domain Name Options for

IBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength

IBM WebSphere Application Server Communications Enabled Applications

IBM Cognos Controller Version New Features Guide

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

Tivoli Endpoint Manager for Configuration Management. User s Guide

6 Things To Think About Before Implementing BYOD

IBM Configuring Rational Insight and later for Rational Asset Manager

New!! - Higher performance for Windows and UNIX environments

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

IBM Lotus Protector for Mail Encryption. User's Guide

Tivoli Automation for Proactive Integrated Service Management

IBM Tivoli Network Manager Best Practices Session

IBM Tivoli Web Response Monitor

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

IBM Tivoli Network Manager IP Edition V3.8

Reading multi-temperature data with Cúram SPMP Analytics

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.

Linux. Managing security compliance

Getting Started With IBM Cúram Universal Access Entry Edition

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

DB2 Database Demonstration Program Version 10.5 Installation and Quick Reference Guide

IBM Endpoint Manager for Mobile Devices

Data Transfer Tips and Techniques

Chris Rosen, Technical Product Manager for IBM Containers, Lin Sun, Senior Software Engineer for IBM Containers,

Tivoli Endpoint Manager for Security and Compliance Analytics

IBM Tivoli Provisioning Manager V 7.1

IBM Security QRadar Version (MR1) Configuring Custom Notifications Technical Note

Maximo Cognos BI. Pam Denny Maximo BI Architect Twitter: andbflo_denny IBM Corporation

IBM Security QRadar Risk Manager

Patch Management for Red Hat Enterprise Linux. User s Guide

The Consolidation Process

IBM Security SiteProtector System Migration Utility Guide

Transcription:

The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team

Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 1

State of Smart Building Security Based on http://www.facilitiesnet.com/buildingautomation/article/survey-suggests-many-bas-could-be-vulnerable-to-hackers--15561?source=part 2

Risks May Impact Physical Surroundings 3

Should You Pen-Test a Building Automation System? - pen-testing public servers and websites usual but not the system controlling HVAC - IT in charge of network, Facilities in charge of BAS - Shadow IOT under the Cybersecurity radar - tenant company different than building management company 4

About the IBM X-Force Ethical Hacking Team - white hat hackers - conduct security tests in order to strengthen target systems - research authors: - Paul Ionescu (@pauliones) - Jonathan Fitz-Gerald - John Zuccato - Warren Moynihan - Brennan Brazeau (former team member) 5

The Job - 3 IP addresses - break into the central server Other buildings 6

Station 1 Equipment 7

NMAP Scanning Station 1 1234 8080 security misconfiguration #1 router and BAS Controller ports open 8

What s on 8080 remote administration of the router fully exposed to the Internet 9

What s on 1234(Edited) platform authentication screen of BAS Controller administration 10

Router Vulnerability #1 Authentication Bypass adding a CR after the HTTP request bypasses authentication 11

Router Vulnerability #2 Command Execution open source firmware leads us to a command.php url better than telnet 12

Router Vulnerability #3 Password in Clear Text hacker handbook rule #1: find passwords 13

Security Misconfiguration #2 - BAS Controller password == router password - 30+ buildings == 60+ passwords to remember - password predictable 14

Composition of a BAS Controller BAS Management Company Hardware Manufacturer** BAS Software Framework Including OS* *No auto updates **Devices are not cheap 15

Executing Commands on the BAS Controller - Google search reveals diagnostic URL for BAS Software - Diagnostic URL allows command execution (not actual URL shown) http://1.1.1.1:1234/diagnostics/cmd:parameters - Following URL gets BAS configuration file (not actual path shown) http://1.1.1.1:1234/diagnostics/cat:/var/config.xml 16

Central Server Password configuration file includes: - central server IP - admin user name - encrypted password admin:ndizy 17

Decrypting the Central Server Password Not the same with the BAS Controller password Double encrypted Download encryption jars Write a simple JAVA program We could have guessed the password! System.out.println( EncryptionUtillity.decrypt( "NotTheActualEncryptedString/...")); 18

Access Denied central server login works but IP whitelisted 19

Using Wireless Router for Access to Central Server - router wireless is enabled (we could also enable it) - wireless password in clear text == BAS Controller password == router password - can we use the router wireless from outside the building? 20

Central Server Breached - router wireless is accessible from outside the building - central server lists 20+ locations across North America - each building has different controls - one insecure station gave access to everything - one weak D-Link router exposed to the Internet compromised the entire system 21

Key Takeaways 22

Q& A

Notices and Disclaimers Copyright 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law 24

Notices and Disclaimers Con t. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml. 25

Thank You Your Feedback is Important! Access the InterConnect 2016 Conference Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.