So happy to be here! Paparazzi over IP. Daniel Mende & Pascal Turbing {dmende pturbing}@ernw.de. www.ernw.de



Similar documents
Exploring the world of Canon EOS photography. EOSmagazineQ. from July-September Wireless world Communication without cables

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi

BASIC ANALYSIS OF TCP/IP NETWORKS

Step-by-Step Setup Guide Wireless File Transmitter

The Ubiquitous Web, UPnP and Smart Homes

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Configuring the WT-4 for ftp (Ad-hoc Mode)

Chapter 3 Management. Remote Management

Packet Sniffing on Layer 2 Switched Local Area Networks

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Chapter 3 Safeguarding Your Network

Configuring the WT-4 for ftp (Ad-hoc Mode)

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Introduction to Network Security Lab 1 - Wireshark

Crestron Electronics, Inc. AirMedia Deployment Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Chapter 4 Management. Viewing the Activity Log

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

What is VLAN Routing?

VLANs. Application Note

WiPG Presentation Gateway

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview

Automatic Configuration and Service Discovery for Networked Smart Devices

Step-by-Step Setup Guide Wireless File Transmitter

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or

Chapter 5. Data Communication And Internet Technology

Firewall. User Manual

Configuring the WT-4 for ftp (Infrastructure Mode)

Funkwerk UTM Release Notes (english)

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Nokia E90 Communicator Using WLAN

Linux Network Security

USB Functions for Windows 7

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Quectel Cellular Engine

Computer Networks and the Internet

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

OV704WVG Product Specifications

Lab Module 3 Network Protocol Analysis with Wireshark

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Networking Test 4 Study Guide

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide

WLAN Security Networking with Confidence

EAGLE EYE IP TAP. 1. Introduction

Network Configuration Settings

SSL Guide. (Secure Socket Layer)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Lab VI Capturing and monitoring the network traffic

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

WiFi Security Assessments

1. LAB SNIFFING LAB ID: 10

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Mobile Devices: Server and Management Lesson 05 Service Discovery

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

Movie Cube. User s Guide to Wireless Function

My FreeScan Vulnerabilities Report

Access the GV-IP Camera through a broadband modem

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Chapter 8 Network Security

Some Notes on Web Application Firewalls

Lab Organizing CCENT Objectives by OSI Layer

GW-300NAS. Giga WAN Port. Giga LAN Port. Wireless 2T2R 300Mbps Giga NAS Router 2T2R. Mbps Green Router. IPTV Pass- Through

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Chapter 6 Using Network Monitoring Tools

Amcrest 960H DVR Quick Start Guide

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Chapter 2 Configuring Your Wireless Network and Security Settings

Nokia E61i Configuring connection settings

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Ethernet. Ethernet. Network Devices

Connecting to and Setting Up a Network

A Research Study on Packet Sniffing Tool TCPDUMP

VMDK Has Left the Building

COPY EOS 70D (W) Wi-Fi Function Instruction Manual INSTRUCTION MANUAL

1 Introduction: Network Applications

Wireless File Transmitter WFT-E6 COPY

Step-by-Step Setup Guide Wireless File Transmitter

COMPUTER NETWORK TECHNOLOGY (300)

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Computer Networks CCNA Module 1

Bit Chat: A Peer-to-Peer Instant Messenger

Chapter 4 Virtual Private Networking

Product Specifications

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Configure WorkGroup Bridge on the WAP131 Access Point

Amati.linea Desktop Streaming Player with amplifier

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

LESSON Networking Fundamentals. Understand TCP/IP

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Installing Certificates on Spectralink 8400 Handsets

Wireless Security: Secure and Public Networks Kory Kirk

Transcription:

So happy to be here! Paparazzi over IP Daniel Mende & Pascal Turbing {dmende pturbing}@ernw.de

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #2 Who we are Old-school network geeks, working as security researchers for Germany based ERNW GmbH Independent Deep technical knowledge Structured (assessment) approach Business reasonable recommendations We understand corporate Blog: www.insinuator.net Conference: www.troopers.de

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #3 Agenda Intro Transport Protocols Communication Modes & Attacks Conclusions

Intro A number of current high-end cameras have network interfaces. We did some research as for their security and potential attack paths. In the following we focus on Canons new flagship EOS 1D X, but similar problems might be found in other models, of other vendors, too. 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #4

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #5 The Camera Canon EOS-1D X

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #6 The Camera A Bit of Marketing From Canon USA: A built in Ethernet port allows for fast, easy transfer of images directly to a PC or via a network to clients from live events. The EOS-1D X is compatible with the new WFT-E6A Wireless File Transmitter for wireless LAN transfer with the IEEE 802.11 a/b/g/n standards.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #7 The Camera The Ethernet Port

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #8 The Camera WLAN Adapter

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #9 The Target aka. Mr. Reuters

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #10 The Target What if One could get the real, unedited images first. One could upload (bad) images. One could turn the camera into a surveillance device.

Transport The underlying Protocols

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #12 Transport Wired LAN via built-in Ethernet port or Wireless LAN via WFT-E6A. Standard TCP/IP (no IPv6, yet).

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #13 Traditional Attacks Layer 2 ARP-spoofing possible. No sticky ARP entries ARP-flooding with ~100 packets per second DoS the network stack.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #14 Traditional Attacks Layer 3/4 TCP/IP is used for all network communication. Established connections can be killed via TCP-RST.

Communication Modes

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #16 Communication Modes Overview FTP Upload Mode DLNA Built-in webserver EOS Utility

FTP Upload Mode

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #18 FTP Upload Mode Mode of operation Target server and credentials configured on camera. Photos taken are uploaded to the server immediately.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #19 FTP Upload Mode Downside As FTP is clear text, credentials can be sniffed. As well as the complete data transmission Uploaded pictures can be extracted from network traffic.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #20 FTP Upload Mode

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #21 FTP Upload Mode

DLNA mode

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #23 DLNA mode Overview Digital Living Network Alliance UPnP used for discovery. DLNA guidelines for file formats, encodings, resolutions. HTTP and XML used to access media.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #24 DLNA mode Cons No authentication. No restrictions. Every DLNA client can download _all_ images. Your Browser could be a DLNA client. Or somebody else's browser. For your camera.

Built-in webserver Always a good idea

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #26 Built-in webserver Canon WFT Server Wireless File Transmitter Server Mode. Canon USA: Use a web browser to capture, view and download images remotely

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #27 Built-in webserver Canon WFT Server Browser interface uses AJAX. Embedded webserver only capable of HTTP GET method. Every other request method is answered with a 404.

Built-in webserver Authentication Authentication via HTTP Basic (RFC 2617) on login page. Session cookie is used afterwards. Cookie looks like sessionid=40b1 4 (!!!) byte Session ID 65535 possible IDs 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #28

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #29 Built-in webserver Session ID Brute force implemented in 6 lines of python. To check for all possible IDs takes about 20 minutes. Embedded Webserver is not that responsive.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #30 import requests target_uri = 'http://192.168.1.103/api/cam/lvoutput' target_string = 'SESSION_ERR' for i in xrange(0xffff): if (i!= 0 and i%1000 == 0): print str(i) + 'IDs checked' r = requests.get(target_uri, cookies={'sessionid': '%x' %i}) if r.text.find(target_string) == -1: print 'SessionID is : sessionid=%x' %i break

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #31

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #32 Built-in webserver recap Full access to Live View, stored photos and camera settings. You surf We brute.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #33 Built-in webserver Requirements Camera in WFT Server mode. Valid session opened by user. Some minutes of time.

EOS Utility mode aka. I wanna be root

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #35 EOS Utility mode The Utility

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #36 EOS Utility mode The Utility

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #37 EOS Utility mode Overview Allows remote control of all nonmanual camera functions. Pictures can be up- and downloaded. Possibly even more (sound recording anyone?)

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #38 EOS Utility mode Technical SSDP and MDNS used for discovery. PTP/IP used for communication. Needs initial camera <-> software pairing.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #39 EOS Utility mode Pairing At first use, credentials needs to be exchanged between the camera and the client software. Camera must be put into pairing mode via camera menu. Camera signals the need for pairing via MDNS.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #40

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #41 EOS Utility mode Pairing

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #42 EOS Utility mode Pairing Client software connects to camera via PTP/IP. PTP/IP Authentication is successful regardless of the credentials. Credentials (hostname, GUID) are stored on the camera.

PTP/IP Feels like USBoIP )-:

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #44 PTP/IP Picture Transfer Protocol over Internet Protocol. ISO 15740. Standardized by International Imaging Industry Association

PTP/IP Packet format Wrapper for PTP with header: 4 byte length (little endian) 4 byte type (little endian) data 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #45

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #46 PTP/IP Layering

PTP/IP Authentication PTPIP_INIT_COMMAND_REQUEST Includes authentication data: 16 byte GUID hostname string 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #47

PTPIP_INIT_COMMAND_REQUEST 2a 00 00 00 01 00 00 00 eb 7a 78 9d 69 cb 64 4e a3 e0 fc 96 ef 59 79 42 73 00 65 00 72 00 76 00 65 00 72 00 00 00 00 00 01 00 Paket length = 42 byte Paket type = 0x01 = PTPIP_INIT_COMMAND_REQUEST GUID Hostname = server @ utf16 Trailer 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #48

PTP

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #50 PTP Explained Picture Transfer Protocol Standardized by International Imaging Industry Association ISO 15740 Lots of proprietary vendor extensions.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #51 PTP Packet format Designed for use over USB Fixed length 2 byte Msg Code 4 byte Session ID 4 byte Transaction ID 5 times 4 byte Parameter or Data

PTP Message Codes Lot of standardized codes like: PTP_GetDeviceInfo PTP_OpenSession PTP_CloseSession PTP_GetStorageIDs Also Vendor specific codes like: PTP_CANON_GetCustomizeSpec PTP_CANON_GetCustomizeItemInfo 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #52

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #53 PTP Use of Thankfully there are some implementations around. We decided to go with libgphoto2. Basic PTP/IP support is included as well.

The Attack aka. gottcha

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #55 Attack Getting the Credentials Client Hostname easy discoverable, but not needed. Camera also excepts connections with a different hostname. GUID unknown to client software. Obfuscated GUID is broadcasted by the cam via UPNP.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #56

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #57 tmp = mdns_info.getproperties()['tid.canon.com'].split('-') guid = [] l = lambda s: [ s[i:i+2:] for i in xrange(0,len(s),2) ][::-1] for i in xrange(0,3): guid += l(tmp[i]) guid += tmp[3] guid += tmp[4] guid = "".join(guid) guid = eb7a789d69cb644ea3e0fc96ef597942

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #58 The Attack Connecting to the Camera Camera only allows one connection. Already connected client needs to be disconnected. TCP-RST the established PTP/IP connection.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #59 Attack Process Listen for the Cam on MDNS. De-obfuscate Authentication data. Disconnect connected Client Software. Connect via PTP/IP. Have Phun (-;

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #60

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #61 Attack outlined So you can write it down Photograph uses hotel / Starbucks WLAN, which isn t unlikely during events (think of Grammy Awards few days ago). Almost anybody in the same LAN can download the images from the camera (and even more).

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #62 Countermeasures Enable network functionality only in trusted Networks. Use WPA and a secure passphrase for (your trusted) WLAN.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #63 Conclusions High-end cameras are yet another daily life item equipped with networking capabilities incl. full-blown IP stacks. Once more, their device-specific network technologies have been designed and implemented without (too much) security in mind. Again, this leads to (classes of) attacks previously unknown to their nonnetworked counterparts.

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #64 Next Steps New series of cameras (EOS 6D) Built-in Wireless Access Point New communication protocol for IOS/Android App

2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #65 There s never enough time THANK YOU...for yours!

ERNW GmbH Breslauer Str. 28 D-69124 66 Questions?

Join us for TROOPERS13 Workshops, Conference, Roundtables, PacketWars Hacking Contest, 10k Morning Run, March 11 th -15 th 2013 Heidelberg, Germany www.troopers.de