Eyes on IZON: Surveilling IP Camera Security



Similar documents
How to setup camera with NAS

CHAPTER 2: USING THE CAMERA WITH THE APP

IOT SECURITY: CONSUMER DEVICES AND THE EXTENDED CORPORATE NETWORK

SwannEye HD Plug & Play Wi-Fi Security Camera Quick Start Guide Welcome! Lets get started.

Amcrest 960H DVR Quick Start Guide

Access the GV-IP Camera through a broadband modem

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Installing, Uninstalling, and Upgrading Service Monitor

Configuration Manual English version

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera

Use Enterprise SSO as the Credential Server for Protected Sites

Copyright 2013, 3CX Ltd.

Mobile Device Management Solution Hexnode MDM

Hills Professional Series NVRs and Cameras

Lutron Home Control Remote Access FAQ

DPS Telecom Your Partners in Network Alarm Management

Test Case 3 Active Directory Integration

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

Click Studios. Passwordstate. Installation Instructions

Management, Logging and Troubleshooting

The Incident Response Playbook for Android and ios

Exploiting Foscam IP Cameras.

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

User s Manual of DVR DVS Remote Client Software V 4.0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1

Quick Installation Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Network setup and troubleshooting

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Quick Installation Guide

STABLE & SECURE BANK lab writeup. Page 1 of 21

Remote Access via VPN Configuration (May 2011)

SwannSecure Wi-Fi Monitoring System

Topics in Network Security

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Citrix Receiver for Mobile Devices Troubleshooting Guide

Acano solution. Security Considerations. August E

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.

Lutron Home Control Remote Access FAQ

emerge 50P emerge 5000P

EM6230 e-camview HD outdoor IP camera

Comodo Mobile Device Manager Software Version 1.0

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Quick Installation Guide

Lutron Home Control Remote Access FAQ

Question How do I access the router s web-based setup page? Answer

WHMCS LUXCLOUD MODULE

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

LICENSE4J LICENSE ACTIVATION AND VALIDATION PROXY SERVER USER GUIDE

NMS300 Network Management System

이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다

NAS 242 Using AiMaster on Your Mobile Devices

1. Central Monitoring System Software

IceWarp to IceWarp Server Migration

IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual

Mobile Device Management Version 8. Last updated:

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Introduction to Mobile Access Gateway Installation

Who is Watching You? Video Conferencing Security

Criteria for web application security check. Version

WiFi Security Assessments

2X SecureRemoteDesktop. Version 1.1

Using a VPN with Niagara Systems. v0.3 6, July 2013

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

SyncThru TM Web Admin Service Administrator Manual

SOA Software API Gateway Appliance 7.1.x Administration Guide

Thick Client Application Security

Deploying iphone and ipad Mobile Device Management

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ

iphone in Business How-To Setup Guide for Users

SAS-IPCAM115 MANUAL IP CAMERA

1. Central Monitoring System Software

Media Server Installation & Administration Guide

Lab Configure Basic AP Security through IOS CLI

Using a VPN with CentraLine AX Systems

Advanced Administration

Alerting, Recording and Motion Detection Guide

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Managing Qualys Scanners

Release Notes LS Retail Data Director August 2011

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Quick Installation Guide

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Check list for web developers

umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0)

Installation Steps Follow these steps to install the network camera on your local network (LAN):

Upload files to FTP server

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

PC-ZViewer User Manual

CYAN SECURE WEB APPLIANCE. User interface manual

Digicom Remote Control for the SRT

DiamondStream Data Security Policy Summary

INSTALLATION GUIDE. Assign an IP Address and Access the Video Stream

Mobile Surveillance. User Manual

Transcription:

Eyes on IZON: Surveilling IP Camera Security SESSION ID: HTA-F03A Mark Stanislav Security Evangelist Duo Security @markstanislav

What is an IZON? IP enabled web camera that is fully managed from your ios-based device Provides remote access to live video Supports recordings for motion & noise Only requires WiFi + AC power to run Image from http://steminnovation.com/izon SKUs for US, Europe, China, Japan, UK, Australia, Hong Kong, and Singapore Sold at Apple, Amazon, Best Buy, Fry s, Wal-Mart, Target, and other retailers Image from http://steminnovation.com/izon!2

All network device assessment begins with NMAP!!3

How a camera is setup Install the app on your ios-based device Create an account (on app) that manages all of your cameras Go through a process to provide WiFi info (SSID/security details) Scan the QR code generated on your phone with the above info The camera connects to your network and does backend... stuff. We ll talk more about that in a few... Image from http://www.shopify.com QR decoded by http://zxing.org/w/decode.jspx!4

What happens during a new camera setup? 1/2 RSA (1024-bit) Public Key Transfers From Camera to App Multicast DNS Traffic!5

What happens during a new camera setup? 2/2 Encrypted admin password goes from the phone to camera!6

What if you remove the camera from your phone? Cameras are only attached to one account at a time This leads to a shared credential situation if you want your family members to also access it The device resets so that it goes back into factory default mode If you change the admin password, the app gets really mad :) Process output from camera after a remove is initiated 8515 root 1372 S < /bin/sh /bin/factoryreset complete_reset 8526 root 1384 S < /bin/sh /bin/led.sh alt blink_start 5 8575 root 1424 S < /bin/sh /bin/wifizconf.sh stop_bonjour!7

Gaining Access: The Failed Attempts :*( The admin user has an encrypted password sent over the wire, assumably utilizing the RSA public key we saw during setup Web site transactions are authenticated using HTTP Digest Because of this, we are unable to sniff the password, despite all requests being cleartext A brute force of Telnet and/or HTTP digest is potentially slow Hardware modification is not an area I know about... GET /cgi-bin/v1/servers/snapshot/1 HTTP/1.1 Host: 192.168.0.6 Authorization: Digest username="admin", realm="authorization required", nonce="e14a9782902552eb88d62c11183983fd", uri="/cgi-bin/v1/servers/snapshot/1", response="6fec266cccbfb3307f1a567147281a31", cnonce="823188c37fb6cd1b1190c4c07f49515e", nc=00000001, qop="auth" User-Agent: IZON/1.0.5 CFNetwork/609.1.4 Darwin/13.0.0 HTTP Digest Authentication!8

Attacking the app Rasticrac (or Clutch) dumps the app from memory to review Verification that the dumped app from memory is cleartext yay!!9

Looking for interesting data via IDA + `strings` Clean output via IDA Ugly output via `strings`!10

Default credentials, yes please! Every I Logged In Screenshot Ever Quick check of the network services!11

Camera s Linux accounts DES CRYPT :) root@izon # cat /etc/shadow root:bcdoeaqtenakm:12773:0:99999:7::: daemon:*:12773:0:99999:7::: bin:*:12773:0:99999:7::: sys:*:12773:0:99999:7::: www-data:*:12773:0:99999:7::: backup:*:12773:0:99999:7::: admin:ctedwasnlmwjm:12773:0:99999:7::: nobody:*:12773:0:99999:7::: mg3500:ab8eyhqwkrb36:12773:0:99999:7::: stemroot /ADMIN/ merlin!12

Paths restricted by authentication Web Server - lighttpd 1.4.24 user and admin credentials...and here s where those hashes come from Yes, user/user :)!13

http://camera-ip/mobileye/ Mobileye ; A Hidden Feature You can login to this hidden web interface using the stock credentials, user/user As user you can view the camera via an image stream, QVGA, and VGA video API service key/connection details are also available, notably for their alert video provider, IntelliVision Firmware details and alarm configuration also available!14

Wireless Reconnaissance and Thief-Enablement Imagine a thief who knows if you re home and can disable your motion/audio sensors so that no video is recorded of them...!15

Firmware Details, Streaming Service Status, LED Fun!!16

IntelliVision Usage http://www.intelli-vision.com - IntelliVision is a leading company in Video Intelligence and Automated Monitoring solutions for security, surveillance and safety markets. Alert videos are accessible through their S3 bucket via HTTP Single, vendor-named bucket... http://intellivision3.s3.amazonaws.com/ MD5 filenames are used with a static formatting as such: ${MD5}-(THUMBNAIL PLAYLIST VIDEO)-${number}.(jpg m3u8 ts) The aforementioned files are not encrypted prior to upload to S3 There are hardcoded S3 credentials found within the mobile app!17

Video Deletion; Not as deleted as you may like... Thumbnail + video files (TS) are still available 2 months since I said to delete this content...!18

https://www.yoics.com YOICS Usage We enable safe, secure access to your devices and your data whenever you have an internet connection. Provides access to your camera via a proxy when not on your WiFi network A public network address and port are opened-up which connects directly to your camera Best I can tell, this is utilized to administrate as well as stream the camera to your mobile device From the network connection I saw happen, it was accessing this proxy via HTTP, not HTTPS...!19

Additional YOICS Insights Your Stem innovation account s password is also used for your YOICS account that s automatically created for your usage Cleartext API queries to the YOICS service send your username and an MD5 hash of the aforementioned password to operate In some cases, the MD5 password is also base64-encoded Camera Device Details http://apistem.yoics.net/web/api/device.ashx?token={token} &deviceaddress={mac Address}&action=get API Token Information http://apistream.yoics.net/web/login.ashx? key=stemconnectapplication&user=stem_{email} &pwd={md5}&type=xml!20

62 results for IZON s Telnet prompt via SHODAN 1 - France 1 - Venezuela 1 - United Arab Emirates 2 - Panama 1 - Canada 2 - Japan 1 - Switzerland 5 - Germany 1 - China 13 - Mexico 1 - Denmark 32 - United States 1 - Finland Data Queried in July, 2013!21

Issue Summary Camera web server does not operate via HTTPS for anything Telnet is used for software upgrades and who knows what else Camera API calls are vulnerable to digest auth replay attacks RTSP is streamed in the clear so anyone can MITM live video Hardcoded root/mg3500/admin credentials for Linux accounts Hidden web backend with default login credentials for viewing S3 storage of alert videos without encryption or actual deletion Single S3 vendor bucket with hardcoded S3 access/secret keys Alert videos protected only by an MD5 path, no IAM credentials Your account password is sent as an MD5 over HTTP!22

Thanks go out to... @purehate_, @quine, and @dakykilla from Accuvant LABS for their help to determine the admin Linux account password @akgood and @jonoberheide for reviewing content early on and providing guidance @duiceburger for letting me use his jailbroken iphone for app testing!23

Vendor Disclosure Initially contacted Stem Innovation on 09/06/2013 explaining I wanted to discuss security issues within their product and would be presenting my research at a conference the following month Vendor response was confusing and usually sparse in communication I had to follow-up multiple times just to keep a basic flow of conversation It was only until about a day before the first public presentation of this research that I was asked to actually discuss the issues beyond a synopsis Upon trying to coordinate a time to do so, the CTO went dark again I ve never heard back since 10/14/2013 but did see that their 11/18/2013 ios app updated noted, Important security enhancements!24

Thanks! Questions? mstanislav@duosecurity.com! @markstanislav! http://www.uncompiled.com! https://speakerdeck.com/mstanislav!25