Cracking into embedded devices and beyond! - owasp
Recommend Documents
In the following sections we call it ... method to construct a window set (we call it the full cover set) to cover all legal ... Bottom left: center-surrounded template.
We'll need some of these items to add and remove components to the .... DigiKey. â Manufactures website. â Call the
advantage to the majority of penetration testers as Linux is likely to be a ... highly integrated and come with addition
name suggests the website is dedicated to exploiting routers and it lists ... The web server is a key part of the device
devices use operating systems like VxWorks or Windows CE, and lots of ... VxWorks is a popular proprietary real-time ope
vulnerable to cross site scripting. ▫Exploited by ... ▫Script executes, creating the “
news story”. ▫Link: .... ▫Or, this will put Spongebob at the TOP of your queue:.
Store data locally on an embedded device using the Record Management System. Course Topics. Introducing Java Embedded. D
Part 1: Cucumber & friends. • Behavior Driven Development with Cucumber. •
Infrastructure as Code with Chef and Etch. • Test Driven Infrastructure with ...
Odziv na incidente, obveščanje in odprava. Skladnost in revizija. Aplikacijska
varnost. Upravljanje življenjskega cikla informacij. Enkripcija in upravljanje s
ključi.
Cross-compiling Node.js and Node Package Manager(NPM). ▻ Development ...
Node.JS uses Javascript. ▻ Most web developers are familiar with the language.
▻ You can get .... 1 TCP Server. □ to get configuration messages from Server.
Hardware Accelerated Adobe* Flash* for Embedded Devices. FAQ. May 2012. 2
.... http://blogs.adobe.com/flex/2011/11/your-questions-about-flex.html.
This paper describes a concept for adopting IEC 61131 programming suites and the PLCopen standard ... cal Commission, 2009) defines programming languages for PLCs. Figure 1 ..... [online] http://www.sps-magazin.de/mues/formmue.php?
with these and other studies it is shown at least qualitatively, that high con- ... The metric used in all the above studies is battery capacity or effective bat- ... The voltage of a cell when no load is applied, is the open-circuit voltage, ... the
Email: [email protected]. Received: December 2 2005; revised: February 8 2006. Abstractâ The capabilities of embedded devices such as smart-.
tation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key ..... For the 128-bit integer multiplication, we use 2-level Karatsuba in.
ment, 300 kb of RAM, 1 Mb of flash and ROM, ... software acceleration of embedded Java virtual machines. ..... (http://www.aplixcorp.com/products/jblend.html).
This paper describes a concept for adopting IEC 61131 programming suites and the PLCopen ..... [online] http://www.sps-magazin.de/mues/formmue.php?
Test Automation for E mbedded Systems. Page 1 ... Based on: “Automated
Testing for Embedded Devices”, Scott ... over 100 separate software testing
projects.
cumvent SWATT, we expect that an attacker needs to change the hardware to hide ... *This research was supported in part by the Center for Computer and.
binary analysis techniques for security ... (IEEE). ⢠IEEE Standard Glossary of Software Engineering ... instructions
Aug 3, 2006 - 2005 compiler distributed under the Free ... Ada is well known for supporting good software engineering practices and for interfacing cleanly with ... Report Documentation Page .... vides a much more extensive GUI builder.
Cracking into embedded devices and beyond! - owasp
Most devices have web interfaces enabled by default. This applies to ... The
devices are ownable via their web interface .... BT Home Hub hacking challenge.
Cracking into embedded devices And beyond! - by Adrian Pastor
www.procheckup.com www.gnucitizen.org
Most devices have web interfaces enabled by default This applies to consumer and corporate appliances
The drive behind this research
The devices are ownable via their web interface Not just info theft is possible but also gaining root/admin privileges
The drive behind this research (2)
Attack doesn‟t end after owning the embedded device If device not properly segmented, we can probe the internal network
Why “and beyond”?
Internet -> target device -> LAN Target device: stepping stone / bouncing point Not many companies consider DMZing “miscellaneous” devices
Why “and beyond”? (2)
Most of what we need to probe the LAN already on device i.e.: Axis camera with shell scripting (mish) and PHP support
Why “and beyond”? (3)
Who‟s paying attention to printers, cameras, etc? Anyone? After all they‟re just primitive devices Not taking into account as seriously as app / web servers security-wise
Why “and beyond”? (4)
Can be exploited reliably Can be hard to detect by IDS No need to develop platform-specific shellcode
Focus on remotely exploitable web bugs
Devices‟ web interfaces often developed without parameter filtering in mind ◦ Real example: Linksys WAG54GS [1] Tons of persistent XSS
Lots of possibilities / attack scenarios
Focus on remotely exploitable web bugs (2)
Auth bypass File retrieval / directory traversal XSS - reflected and persistent! CSRF - most devices are affected Privilege escalation
The juicy bugs!
Any admin setting can be changed Ideal when web int. NOT enabled on WAN
Personal Fav. #1: CSRF + auth bypass
Payload is launched when admin tricked to visit 3rd-party evil page Evil page makes browser send forged request to vulnerable device
Personal Fav. #1: CSRF + auth bypass (cont)
Web server password-protected but enabled on WAN interface Attacker doesn’t need to be authenticated Malformed request to web server injects malicious payload on logs page
Personal Fav. #2: Persistent XSS on logs page
Admin browses vulnerable page while logged in Device is compromised – ie: new admin account is added Example: Axis 2100 IP cameras [2]
Personal Fav. #2: Persistent XSS on logs page (cont)
Ironic: security-conscious admins get owned
Personal Fav. #2: Persistent XSS on logs page (cont)
No interaction required from victim admin Usually simple to exploit. i.e.:
◦ knowledge of “authenticated” URL ◦ Replay request that changes admin setting
Personal Fav. #3: Auth bypass + WAN web interface
No need to rely on password Ideal when web interface only on LAN Targets the internal user who can “see” the device‟s web interface Some preauth leaks are WAY TOO GOOD – ie: WEP keys or admin passwords
Personal Fav. #4: Preauth leak + XSS on preauth URL
Steal session IDs Overwrite login form‟s „action‟ attribute Phishing heaven! Real example: Pers. XSS on Aruba 800 Mobility Controller's login page [3] – by Jan Fry
◦ You own the controller you own all the WAPs – sweet!
Personal Fav. #4: Pers. XSS on admin login page
Because not needing to rely on cracking a weak password is great Let‟s see review a few real examples
Love for auth bypass bugs
Password prompt returned when accessing http://victim.foo/ If creds correct, then redirect to “authed” URL
Auth bypass type 1: unprotected URLs
Problem is no auth data (ie: password/session ID) is transmitted Simply knowing the admin URLs does the job! - ie: http//victim.foo/adminsettings.cgi Real example: 3COM APXXXX (vuln not published yet)
Auth bypass type 1: unprotected URLs (cont)
Resources (URLs) password protected However, assumed to be accessed via a certain method – ie : GET Requesting resource as POST gives the goodies! Real example: BT Voyager 2091 Wireless ADSL [4]
Auth bypass type 2: unchecked HTTP methods
Get config file without password: POST /psiBackupInfo HTTP/1.1 Host: 192.168.1.1 Connection: close Content-Length: 0
Auth bypass type 2: unchecked HTTP methods (cont)
Admin URLs password-protected correctly However, admin requests are NOT Real example: Linksys WRT54GS [5] – by Ginsu Rabbit
Auth bypass type 3: unprotected requests
Settings URLs requires password: GET /wireless.htm
Submitting admin request does NOT: POST /Security.tri Content-Length: 24 SecurityMode=0&layout=en
Auth bypass type 3: unprotected requests (cont)
Web server OKs multiple representations of URL i.e.: the following URLs could all be valid:
Real example: BT Home Hub and Thomson/Alcatel Speedtouch 7G [6] i.e.: the following URL gives you the config file without supplying creds:
◦ http://192.168.1.254/cgi/b/backup/user.ini//
Auth bypass type 4: URL fuzzing (cont)
No open tcp/udp ports on WAN interface by default Requirement: attack must be remote Most people would give up at this point Possible attack vectors, anyone?
BT Home Hub hacking challenge
OK, WAN is not an option How about the LAN interface? “Didn‟t you say it must be a remote attack?” you must be thinking
BT Home Hub hacking challenge (cont)
Think client side! Victim user‟s browser his worst enemy If you can‟t attack via WAN, let the internal user do it via LAN The aikido way: blend in, take advantage of already-established channels
BT Home Hub hacking challenge (cont)
The recipe: ◦ CSRF ◦ Auth bypass
The weapon: ◦ Simple form retrieved via hidden „iframe‟
BT Home Hub hacking challenge (cont)
The attack: ◦ Any user in Home Hub‟s LAN visits malicious web page ◦ Web page causes user‟s browser submit interesting request to Home Hub. i.e.: enable remote assistance
BT Home Hub hacking challenge (cont)
BT Home Hub hacking challenge (cont)
Demo time!
[1] Persistent XSS and CSRF on Linksys WAG54GS router http://www.gnucitizen.org/blog/persistent-xss-and-csrf-onwireless-g-adsl-gateway-with-speedbooster-wag54gs [2] Persistent XSS on Aruba 800 Mobility Controller's login page http://www.procheckup.com/Vulnerability_PR07-26.php http://www.securityfocus.com/bid/26465
[3] Multiple vulnerabilities on Axis 2100 IP cameras http://www.procheckup.com/Vulnerability_Axis_2100_rese arch.pdf
[6] BT Home Flub: Pwnin the BT Home Hub http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bthome-hub http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bthome-hub-2 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bthome-hub-3 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bthome-hub-4