Cracking into embedded devices And beyond! - by Adrian Pastor www.procheckup.com www.gnucitizen.org.

Slides:



Advertisements
Similar presentations
Remote Replication Example A: Back up the data to a remote QNAP NAS over the IP network.
Advertisements

Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Nick Feamster CS 6262 Spring 2009
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Cross-site Request Forgery (CSRF) Attacks
Past, Present and Future By Eoin Keary and Jim Manico
Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
© 2009 IBM Corporation IBM Rational Application Security The Bank Job Utilizing XSS Vulnerabilities Adi Sharabani IBM Rational Application Security Research.
OWASP Web Vulnerabilities and Auditing
Path Cutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao, Vinod Yegneswaran, Phillip Porras, and Yan Chen.
©2009 Justin C. Klein Keane PHP Code Auditing Session 5 XSS & XSRF Justin C. Klein Keane
Attacking Authentication and Authorization CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
WebGoat & WebScarab “What is computer security for $1000 Alex?”
EECS 354 Network Security Cross Site Scripting (XSS)
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
DVG-N5402SP.
Presented by Paul Gilzow Web Communications University of Missouri #hew08xss.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Chapter 6: Hostile Code Guide to Computer Network Security.
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Advanced Networking for DVRs
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Copyright© 2002 Avaya Inc. All rights reserved Advanced Cross Site Scripting Evil XSS Anton Rager.
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
Lets Make our Web Applications Secure. Dipankar Sinha Project Manager Infrastructure and Hosting.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
© All rights reserved. Zend Technologies, Inc. PHP Security Kevin Schroeder Zend Technologies.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Enabling Embedded Systems to access Internet Resources.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Web Applications Testing By Jamie Rougvie Supported by.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
Integrating and Troubleshooting Citrix Access Gateway.
Web Portals Gateway To Information Or A Hole In Our Perimeter Defenses sm sm Deral Heiland – Layered Defense Research.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web2.0 Secure Development Practice Bruce Xia
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
Web Applications on the battlefield Alain Abou Tass.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Building Secure ColdFusion Applications
WEB APPLICATION TESTING
World Wide Web policy.
E-commerce Application Security
Client / Session Identification Cookies
Introduction to Networking
Data Networking Fundamentals
CSC 495/583 Topics of Software Security Intro to Web Security
Lecture 2 - SQL Injection
HACKIN G CITRIX.
Active Man in the Middle Attacks
Advanced Cross Site Scripting Evil XSS
Presentation transcript:

Cracking into embedded devices And beyond! - by Adrian Pastor

The drive behind this research Most devices have web interfaces enabled by default This applies to consumer and corporate appliances

The drive behind this research (2) The devices are ownable via their web interface Not just info theft is possible but also gaining root/admin privileges

Why and beyond? Attack doesnt end after owning the embedded device If device not properly segmented, we can probe the internal network

Why and beyond? (2) Internet -> target device -> LAN Target device: stepping stone / bouncing point Not many companies consider DMZing miscellaneous devices

Why and beyond? (3) Most of what we need to probe the LAN already on device i.e.: Axis camera with shell scripting (mish) and PHP support

Why and beyond? (4) Whos paying attention to printers, cameras, etc? Anyone? After all theyre just primitive devices Not taking into account as seriously as app / web servers security-wise

Focus on remotely exploitable web bugs Can be exploited reliably Can be hard to detect by IDS No need to develop platform-specific shellcode

Focus on remotely exploitable web bugs (2) Devices web interfaces often developed without parameter filtering in mind Real example: Linksys WAG54GS [1] Tons of persistent XSS Lots of possibilities / attack scenarios

The juicy bugs! Auth bypass File retrieval / directory traversal XSS - reflected and persistent! CSRF - most devices are affected Privilege escalation

Personal Fav. #1: CSRF + auth bypass Any admin setting can be changed Ideal when web int. NOT enabled on WAN

Personal Fav. #1: CSRF + auth bypass (cont) Payload is launched when admin tricked to visit 3 rd- party evil page Evil page makes browser send forged request to vulnerable device

Personal Fav. #2: Persistent XSS on logs page Web server password-protected but enabled on WAN interface Attacker doesnt need to be authenticated Malformed request to web server injects malicious payload on logs page

Personal Fav. #2: Persistent XSS on logs page (cont) Admin browses vulnerable page while logged in Device is compromised – ie: new admin account is added Example: Axis 2100 IP cameras [2]

Personal Fav. #2: Persistent XSS on logs page (cont) Ironic: security-conscious admins get owned

Personal Fav. #3: Auth bypass + WAN web interface No interaction required from victim admin Usually simple to exploit. i.e.: knowledge of authenticated URL Replay request that changes admin setting

Personal Fav. #4: Preauth leak + XSS on preauth URL No need to rely on password Ideal when web interface only on LAN Targets the internal user who can see the devices web interface Some preauth leaks are WAY TOO GOOD – ie: WEP keys or admin passwords

Personal Fav. #4: Pers. XSS on admin login page Steal session IDs Overwrite login forms action attribute Phishing heaven! Real example: Pers. XSS on Aruba 800 Mobility Controller's login page [3] – by Jan Fry You own the controller you own all the WAPs – sweet!

Love for auth bypass bugs Because not needing to rely on cracking a weak password is great Lets see review a few real examples

Auth bypass type 1: unprotected URLs Password prompt returned when accessing If creds correct, then redirect to authed URL

Auth bypass type 1: unprotected URLs (cont) Problem is no auth data (ie: password/session ID) is transmitted Simply knowing the admin URLs does the job! - ie: http//victim.foo/admin- settings.cgi Real example: 3COM APXXXX (vuln not published yet)

Auth bypass type 2: unchecked HTTP methods Resources (URLs) password protected However, assumed to be accessed via a certain method – ie : GET Requesting resource as POST gives the goodies! Real example: BT Voyager 2091 Wireless ADSL [4]

Auth bypass type 2: unchecked HTTP methods (cont) Get config file without password: POST /psiBackupInfo HTTP/1.1 Host: Connection: close Content-Length: 0

Auth bypass type 3: unprotected requests Admin URLs password-protected correctly However, admin requests are NOT Real example: Linksys WRT54GS [5] – by Ginsu Rabbit

Auth bypass type 3: unprotected requests (cont) Settings URLs requires password: GET /wireless.htm Submitting admin request does NOT: POST /Security.tri Content-Length: 24 SecurityMode=0&layout=en

Auth bypass type 4: URL fuzzing Web server OKs multiple representations of URL i.e.: the following URLs could all be valid:

Auth bypass type 4: URL fuzzing (cont) Real example: BT Home Hub and Thomson/Alcatel Speedtouch 7G [6] i.e.: the following URL gives you the config file without supplying creds:

BT Home Hub hacking challenge No open tcp/udp ports on WAN interface by default Requirement: attack must be remote Most people would give up at this point Possible attack vectors, anyone?

BT Home Hub hacking challenge (cont) OK, WAN is not an option How about the LAN interface? Didnt you say it must be a remote attack? you must be thinking

BT Home Hub hacking challenge (cont) Think client side! Victim users browser his worst enemy If you cant attack via WAN, let the internal user do it via LAN The aikido way: blend in, take advantage of already-established channels

BT Home Hub hacking challenge (cont) The recipe: CSRF Auth bypass The weapon: Simple form retrieved via hidden iframe

BT Home Hub hacking challenge (cont) The attack: Any user in Home Hubs LAN visits malicious web page Web page causes users browser submit interesting request to Home Hub. i.e.: enable remote assistance

BT Home Hub hacking challenge (cont)

Demo time!

References [1] Persistent XSS and CSRF on Linksys WAG54GS router wireless-g-adsl-gateway-with-speedbooster-wag54gs [2] Persistent XSS on Aruba 800 Mobility Controller's login page [3] Multiple vulnerabilities on Axis 2100 IP cameras arch.pdf

References (cont) [4] BT Voyager Multiple Remote Authentication Bypass Vulnerabilities [5] Linksys WRT54GS POST Request Configuration Change Authentication Bypass Vulnerability ded

References (cont) [6] BT Home Flub: Pwnin the BT Home Hub home-hub home-hub-2 home-hub-3 home-hub-4