Leonardo Nve Egea Leonardo Nve Egea lnve@s21sec.com 1. because Im - - PowerPoint PPT Presentation

leonardo nve egea leonardo nve egea
SMART_READER_LITE
LIVE PREVIEW

Leonardo Nve Egea Leonardo Nve Egea lnve@s21sec.com 1. because Im - - PowerPoint PPT Presentation

Leonardo Nve Egea Leonardo Nve Egea lnve@s21sec.com 1. because Im sure that some people will publish more attacks. .2 because previously presentations about satellite. ll Warezzman (in 2004 at Undercon VIII first Spanish hacker CON )


slide-1
SLIDE 1

Leonardo Nve Egea Leonardo Nve Egea

lnve@s21sec.com

slide-2
SLIDE 2
  • 1. because I’m sure that some people will

publish more attacks. .2 because previously presentations about ll satellite.

slide-3
SLIDE 3

Warezzman – (in 2004 at Undercon VIII first

Spanish hacker CON)

Jim Geovedi & Raditya Iryandi

f (HITBSecConf2006) d l kh

Adam Laurie (Blackhat 2009 at DC)

lf l b

Myself at S21Sec Blog (February 2009)

slide-4
SLIDE 4

Orbit based satellites Low Earth orbiting (LEO) Geostationary orbit (GEO) Other: Molniya, High (HEO), etc. Function based satellites Communications Earth observation Other: Scientifics, ISS, etc.

, ,

slide-5
SLIDE 5
slide-6
SLIDE 6

S lli LEO

Satellite LEO Meteorological

HAM (A R di O )

HAM (Amateur Radio Operator) Satellite GEO Satellite GEO UFO (UHF Follow ON) Military Inmarsat Inmarsat Meteorological (Meteosat) SCPC / Telephony link FDMA

SCPC / Telephony link FDMA

slide-7
SLIDE 7
slide-8
SLIDE 8

f

Standard of European Telecommunications

Standards Institute (ETSI).

Defines audio and video transmission, and

data connections. h f f

DVB‐S & DVB‐S2 is the specification for

satellite communications.

slide-9
SLIDE 9

Transponder: Like channels (in Satellite

comms)

Frecuency (C band or Ku). Ex: 12.092Ghz

  • Polarization. (horizontal/vertical)

Symbol Rate. Ex: 27500Kbps FEC. Every satellite has many transponders

  • nboard which are operating on different

frequencies

slide-10
SLIDE 10
slide-11
SLIDE 11

Header d Header Body

0x47 Flags PID Flags Adaptation Field Data

Program ID (PID): It permits different programs at same transponder with different components [Example BBC1 PIDs: 600 (video), 601 (English audio), 603 (subtitles), 4167 PIDs: 600 (video), 601 (English audio), 603 (subtitles), 4167 (teletext)] Special PIDs NIT (Network Information Table) SDT (Service Special PIDs: NIT (Network Information Table), SDT (Service Description Table), PMT (Program Map Tables), PAT (Program Association Table).

slide-12
SLIDE 12

Temporal video links. Live emissions, sports, news.

d

FTA – In open video.

slide-13
SLIDE 13

Hispasat Pre news feed (live news)

slide-14
SLIDE 14

ATLAS Agency to TV feeds feeds

slide-15
SLIDE 15
slide-16
SLIDE 16

Captured NATO feeds

slide-17
SLIDE 17

NATO COMINT official

slide-18
SLIDE 18

f

I widely known that the Department of

Defense (DoD) and some US defense ll d f h contractors use satellites and DVB for their comms.

slide-19
SLIDE 19

Let`s see:

http://telecom.esa.int/telecom/media/document/DVB‐ RCS%20Networks%20for%20the%20US%20Defense%20Market%20(R3).pdf

slide-20
SLIDE 20
slide-21
SLIDE 21

US COMINT official

slide-22
SLIDE 22

f

Find feeds: Lists of channels in www Blind Scan Visual representations of the signal

slide-23
SLIDE 23

Dr HANS http://drhans.jinak.cz/news/index.php Zackyfiles http://www.zackyfiles.com (in spanish) Satplaza http://www.satplaza.com

p p

slide-24
SLIDE 24

Two scenarios Satmodem Satellite Interactive Terminal (SIT) or Astromodem

slide-25
SLIDE 25

INTERNET

CLIENT ISP

slide-26
SLIDE 26

DOWNLINK INTERNET

CLIENT ISP

slide-27
SLIDE 27

DOWNLINK

POTS/GPRS POTS/GPRS UPLINK

INTERNET

UPLINK

CLIENT

UPLINK

ISP

slide-28
SLIDE 28

DOWNLINK

POTS/GPRS POTS/GPRS UPLINK

INTERNET

UPLINK

CLIENT

UPLINK

ISP

slide-29
SLIDE 29

DOWNLINK

ISP’s UPLINK POTS/GPRS POTS/GPRS UPLINK

INTERNET

UPLINK

CLIENT

UPLINK

ISP

slide-30
SLIDE 30

DVB Data - Astromodem

DOWNLINK & UPLINK

ISP DOWNLINK & UPLINK

INTERNET

ISP CLIENT

slide-31
SLIDE 31
slide-32
SLIDE 32
slide-33
SLIDE 33

Anyone with coverage can SNIFF Anyone with coverage can SNIFF the DVB Data, and normally it is y unencrypted.

slide-34
SLIDE 34

What do you need: Skystar 2 DVB Card linuxtv‐dvb‐apps Wireshark The antenna Data to point it.

p

slide-35
SLIDE 35

I bought it for 50€!!! from an g 5 PayTV ex‐”hacker” :P (I l di t t b th t I ill (Including a set‐top box that I will not use)

slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38

f Linux has the modules for this card by default, we only need the tools to manage it: linuxtv‐dvb‐apps My version is 1.1.1 and I use Fedora (Not too l b cool to use Debian :P).

slide-39
SLIDE 39

Once the antenna and the card is installed and linuxtv‐dvb‐apps compiled and installed, h the process is:

1‐Tune the DVB Card 2‐ Find a PID with data 3‐ Create an Ethernet interface associated to that PID

We can repeat 2 to 3 any times we want.

slide-40
SLIDE 40

h d 1‐ Tune the DVB Card 2‐ Find a PID with data 3‐ Create an Ethernet interface associated to that PID

slide-41
SLIDE 41

Tune DVB Card The tool we must use is szap and we need the d f transponder’s parameters in a configuration file.

For example, for “Sirius‐4 Nordic Beam":

# echo “sirius4N:12322:v:0:27500:0:0:0" >> channels.conf # echo sirius4N:12322:v:0:27500:0:0:0 >> channels.conf

slide-42
SLIDE 42

f We run szap with the channel configuration file and the transponder we want use (the f f l h h configuration file can have more than one).

# szap –c channels.conf sirius4N p 4

We must keep it running.

slide-43
SLIDE 43
slide-44
SLIDE 44

f The transponder parameters can be found around Internet.

http://www.fastsatfinder.com/transponders.html

slide-45
SLIDE 45

h d 1‐Tune the DVB Card 2‐ Find a PID with data 3‐ Create an Ethernet interface associated to that PID

slide-46
SLIDE 46

Find a PID

d b d #dvbsnoop ‐s pidscan h f d l Search for data section on results.

slide-47
SLIDE 47
slide-48
SLIDE 48

h d 1‐Tune the DVB Card 2‐ Find a PID with data 3‐ Create an Ethernet interface associated to that PID

slide-49
SLIDE 49

f

Create an interface associated to a PID

d b d b #dvbnet ‐a <adapter number> ‐p <PID>

Activate it

#ifconfig dvb0_<iface number> up

slide-50
SLIDE 50
slide-51
SLIDE 51

Back to de pidscan results

slide-52
SLIDE 52

Create another interface

slide-53
SLIDE 53

f Wireshark is our friend 16358 packets in 10 seconds

slide-54
SLIDE 54
slide-55
SLIDE 55

W h th PID i d t

We can have more than one PID assigned to an

interface, this will be very useful.

Malicious users can: Malicious users can:

Catch passwords. Catch cookies and get into authenticated HTTP

g sessions.

Read emails

C h f l

Catch sensitive files Do traffic analysis Etc Etc ….

slide-56
SLIDE 56

Reminder: In satellite communications we have two scenarios:

A‐ Satmodem, Only Downlink via Satellite B‐ Astromodem, Both uplink and downlink via Satellite.

slide-57
SLIDE 57

We can only sniff the downloaded data. We l ff d can only sniff one direction in a connection.

slide-58
SLIDE 58

f

DNS Spoofing

h k

TCP hijacking

k

Attacking GRE

slide-59
SLIDE 59

f h f k DNS Spoofing is the art of making a DNS entry to point to an another IP than it would b d h be supposed to point to. (SecureSphere)

slide-60
SLIDE 60

f

Data we need to perform this attack DNS Request ID Source Port Source IP Destination IP Name/IP asking for

g

slide-61
SLIDE 61

´ f ff

It´s trivial to see that if we sniff a DNS

request we have all that information and we f h can spoof the answer. l d d h b h l

Many tools around do this job, the only

thing we also need is to be faster than the l real DNS server (jizz).

slide-62
SLIDE 62

Why is this attack important? Think in phising With this attack, uplink sniff can be possible

▪ Rogue WPAD service ▪ Sslstrip can be use to avoid SSL connections.

slide-63
SLIDE 63

f

DNS Spoofing

h k

TCP hijacking

k

Attacking GRE

slide-64
SLIDE 64

TCP session hijacking is when a hacker takes b h

  • ver a TCP session between two machines.

(ISS)

slide-65
SLIDE 65

Seq=S1 ACK=A1 Datalen=L1 Seq=A1 ACK=S1+L1 Datalen=L2

f ff d d k f d

Seq=S1+L1 ACK=A1+L2 Datalen=L3

If we sniff 1 we can predict Seq and Ack of 2 and we can send the payload we want in 2

slide-66
SLIDE 66
slide-67
SLIDE 67

I iti ll l h f l ti ith A

Initially we can only have a false connection with A. In certain circumstances, we can make this attack

, with B, when L2 is predictable.

Some tools for doing this: Some tools for doing this: Hunt Shijack Scapy

slide-68
SLIDE 68

f

DNS Spoofing

h k

TCP hijacking

k

Attacking GRE

slide-69
SLIDE 69

Generic Routing Encapsulation

l l

Point to point tunneling protocol

f ll d ff

13% of Satellite’s data traffic in our

transponder is GRE

slide-70
SLIDE 70

This chapter is based in Phenoelit’s discussion b l d ll paper written by FX applied to satellite scenario. Original paper: h h l h l http://www.phenoelit‐us.org/irpas/gre.html

slide-71
SLIDE 71

HQ HQ

INTERNET INTERNET

Remote Office Remote Office Remote Office

slide-72
SLIDE 72

Find a target: h k d b #tshark –ni dvb0_0 –R gre –w capture.cap

slide-73
SLIDE 73

GRE Packet

IP dest 1 IP source 1 GRE h d GRE header Payload IP dest Payload IP source Payload IP Header Payload Data

slide-74
SLIDE 74

IP dest 1 and source 1 must be Internet

reachable IPs

The payload´s IPs used to be internal.

slide-75
SLIDE 75

INTERNET

1.1.1.2 1.1.1.1 10.0.0.54 10.0.0.5

slide-76
SLIDE 76

INTERNET

1.1.1.2 1.1.1.1 (*) 10.0.0.54 10.0.0.5

slide-77
SLIDE 77

(*) GRE Packet

1.1.1.1 1.1.1.2 GRE h d ( bit ith t fl ) GRE header (32 bits without flags) 10.0.0.5 10.0.0.54 Payload IP Header Payload Data

slide-78
SLIDE 78

1.1.1.2 1.1.1.1 (1) 10.0.0.54 10.0.0.5

slide-79
SLIDE 79

(1) GRE Packet

1.1.1.1 1.1.1.2 GRE h d ( bit ith t fl ) GRE header (32 bits without flags) 10.0.0.5 10.0.0.54 Payload IP Header Payload Data

slide-80
SLIDE 80

1.1.1.2 1.1.1.1 (1) (2) 10.0.0.54 10.0.0.5

slide-81
SLIDE 81

(2) IP Packet

10.0.0.5 10.0.0.54 IP header Data

slide-82
SLIDE 82

1.1.1.2 1.1.1.1 (1) (2,3) 10.0.0.54 10.0.0.5

slide-83
SLIDE 83

(3) IP Packet

10.0.0.54 10.0.0.5 IP header 2 Data 2

slide-84
SLIDE 84

(4) 1.1.1.2 1.1.1.1 (1) (2,3) 10.0.0.54 10.0.0.5

slide-85
SLIDE 85

(4) GRE Packet

1.1.1.2 1.1.1.1 GRE h d ( bit ith t fl ) GRE header (32 bits without flags) 10.0.0.54 10.0.0.5 Payload IP Header 2 Payload Data 2

slide-86
SLIDE 86

A Ph li ´ k l d’ IP i bli IP Thi At Phenoelit´s attack payload’s IP source is our public IP. This attack lacks when that IP isn´t reachable from the internal LAN and you can be logged. y gg I use internal IP because we can sniff the responses. To better improve the attack, find a internal IP not used.

slide-87
SLIDE 87

H How To Scan NSA And Cannot Cannot Be Traced Traced

slide-88
SLIDE 88

We can send a SYN packet with any destination IP and TCP port (spoofing a ll bl d satellite’s routable source IP) , and we can sniff the responses. We can analyze the responses.

slide-89
SLIDE 89

f OR… We can configure our linux like a satellite connected host. VERY EASY!!!

slide-90
SLIDE 90

What we need: An internet connection (Let’s use it as uplink) with

any technology which let you spoofing.

A receiver, a card….

slide-91
SLIDE 91

Let’s rock! Find a satellite IP not used, I ping IPs next to

another sniffable satellite IP to find a non responding IP. We must sniff our ping with the DVB Card (you must save the packets) DVB Card (you must save the packets). Thi ill b IP!

This will be our IP!

slide-92
SLIDE 92

Configure Linux to use it.

g

We need our router ‘s MAC

slide-93
SLIDE 93

f f Configure our dvb interface to receive this IP (I suppose that you have configure the PID…) The IP is the one we have selected and in the h d ICMP scan, we must get the destination MAC sniffed.

slide-94
SLIDE 94

Here we get the MAC address we must configure address we must configure in our DVB interface

slide-95
SLIDE 95

I use netmask /32 to avoid routing problems

slide-96
SLIDE 96

f f Now we can configure our Internet interface with the same IP and configure a default h f l h h route with a false router setting this one with a static MAC (our real router’s MAC).

slide-97
SLIDE 97
slide-98
SLIDE 98

IT WORKS!

slide-99
SLIDE 99

This is all !!! h b Some things you must remember: h ll f The DNS server must allow request from any IP or you must use the satellite ISP DNS server.

slide-100
SLIDE 100

f f If you have any firewall (iptables) disable it. ll h h k b ff d b All the things you make can be sniffed by

  • thers users.
slide-101
SLIDE 101

Now attacking GRE is very easy, you only need to configure your Linux with IP of one of h h h h ll the routers (the one with the satellite connection) and configure the tunneling.

http://www.google.es/search?rlz=1C1GPEA_en___ES312&sourceid=chro me&ie=UTF‐8&q=configuring+GRE+linux q g g

slide-102
SLIDE 102

ff

I’m studying the different methods to trace

illegal users. (I only have a few ideas).

In the future I would like to study the

b l f d d ll possibilities of sending data to a satellite via Astromodem (DVB‐RCS).

slide-103
SLIDE 103

Satellite communications are insecure.

b ff d

It can be sniffed.

l f k b d lk d

A lot of attacks can be made, I just talked

about only few level 4 and level 3 attacks.

slide-104
SLIDE 104

With this technology in our sky, an

anonymous connection is possible.

Many kinds of Denial of Service are possible.

slide-105
SLIDE 105