SCADA Hacking
Clear and Present Danger
ITAC 2014 – 02 Oct 2014 Presen sented ed b by: Francis Brown Bishop Fox, LLC www.bishopfox.com
SCADA Hacking Clear and Present Danger ITAC 2014 02 Oct 2014 - - PowerPoint PPT Presentation
SCADA Hacking Clear and Present Danger ITAC 2014 02 Oct 2014 Presen sented ed b by: Francis Brown Bishop Fox, LLC www.bishopfox.com Agenda O V E R V I E W Introd oduction on/B /Bac ackgr grou ound Target eting ng S
Clear and Present Danger
ITAC 2014 – 02 Oct 2014 Presen sented ed b by: Francis Brown Bishop Fox, LLC www.bishopfox.com
2
/Bac ackgr grou
eting ng S SCADA S System ems
cking ng S SCADA S System ems
efens enses es
O V E R V I E W
3
GETTING UP TO SPEED
4
B O R N I N T H E U . S . A . Jun 2010
5
E X P L O I T R E L E A S E S Jan 2012
6
M A J O R S C A D A V E N D O R S Jan 2012
7
E X P L O I T R E L E A S E S Jan 2012
8
S C A D A V U L N E R A B I L I T I E S Jan 2012
9
M A S S T A R G E T I N G Jan 2012 PhD Student connects 29 29 S SHO HODAN qu queries to Goog
maps
10
P H Y S I C A L S A F E G U A R D S F A I L “Once this line went
Cordaro said. “It’s not supposed to happen.”
11
W H E N T H E L I G H T S G O O U T May 2013
12
W H E N T H E L I G H T S G O O U T May 2013
13
R E T U R N F I R E May 2013
14
TRY NOT TO TRIP OVER ALL THE SYSTEMS
15
S E A R C H E N G I N E H A C K I N G
16
D I G G I T Y C O R E T O O L S
17
G O O G L E H A C K I N G
18
G O O G L E H A C K I N G
19
D I G G I T Y C O R E T O O L S
20
B I N G H A C K I N G
N E W G O O G L E H A C K I N G T O O L S
21
22
M A S S T A R G E T I N G O F S C A D A
23
H A C K E R S E A R C H E N G I N E
as some FTP (21), SSH (22) and Telnet (23) services
24
F I N D I N G S C A D A S Y S T E M S
25
F I N D I N G S C A D A S Y S T E M S
26
C R I T I C A L I N F R A S T R U C T U R E S E C U R I T Y
27
C R I T I C A L I N F R A S T R U C T U R E S E C U R I T Y
A D V A N C E D D E F E N S E T O O L S
28
29
S H O D A N R S S F E E D S
30
N M A P O F E N T I R E I N T E R N E T
31
D A T A M I N I N G C E N S U S
32
D A T A M I N I N G C E N S U S
33
S C A N N I N G F O R S C A D A
Serial Port Device Exposure: SNMP
34
S N M P R E S U L T S
35
S N M P R E S U L T S
36
S N M P R E S U L T S
37
S C A N N I N G F O R S C A D A
ntroni nix uses 2001-2032 and 3001-3032
38
S C A N N I N G F O R S C A D A
igi uses the RealPort protocol on port 771
39
P O I N T N C L I C K S C A R Y
Serial Port TCP Multiplexed Services
40
P O I N T N C L I C K S C A R Y
Serial Port TCP Multiplexed Services
41
P O I N T N C L I C K S C A R Y
42
P O I N T N C L I C K S C A R Y
Serial Port Device Exposure: ADDP
43
P O I N T N C L I C K S C A R Y
Serial Port Device Exposure: ADDP .. continued
44
P O I N T N C L I C K S C A R Y
45
P O I N T N C L I C K S C A R Y
46
P O I N T N C L I C K S C A R Y
47
S C A D A P A S S W O R D A T T A C K S
48
S C A D A P A S S W O R D A T T A C K S
49
S C A D A P A S S W O R D A T T A C K S
50
S C A D A P A S S W O R D A T T A C K S
51
S C A D A P A S S W O R D A T T A C K S
52
S C A D A P A S S W O R D A T T A C K S
53
S C A D A W I R E L E S S A T T A C K S
T O O L S
54
55
Name Frequency Distance
Low Fequency (LF) 120kHz – 140kHz <3ft (Commonly under 1.5ft) High Frequency (HF) 13.56MHz 3-10 ft Ultra-High-Frequency (UHF) 860-960MHz (Regional) ~30ft
56
A $ $ G R A B B I N G M E T H O D
Existing RFID hacking tools only work when a few centimeters away from badge
57
Cloning to T55x7 Card using Proxmark 3
M A I N T A I N I N G A C C E S S
59
PROTECT YO NECK
60
S C A D A P R O T E C T I O N From HD Moores “Serial Offenders” recommendations:
61
S C A D A P R O T E C T I O N
Snort and SCADA
62
S C A D A P R O T E C T I O N
63
S C A D A P R O T E C T I O N
NIST and other guidance docs:
64
Bi Bisho hop F Fox
www.bishopfox.com