Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC SCAD ADA A Sy Systems: stems: Outsm tsmarting arting the Smart rt Grid id
Fadli B. Sidek Security Specialist @ BSidesVienna 2014
Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC - - PowerPoint PPT Presentation
Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC SCAD ADA A Sy Systems: stems: Outsm tsmarting arting the Smart rt Grid id Fadli B. Sidek BSidesVienna 2014 Security Specialist @ Whoami SecureSingapore
Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC SCAD ADA A Sy Systems: stems: Outsm tsmarting arting the Smart rt Grid id
Fadli B. Sidek Security Specialist @ BSidesVienna 2014
Whoami
SCADA Software Secure Source Code Review Binary Analysis Fuzzing VA/PTLegend
General Information Technical Information Something to refer to
What is a Critical Infrastructure?
What is SCADA?
Typical SCADA Control Room
A Typical SCADA Network Architecture
What’s the Big Deal?
Die Hard 4.0 – 4 real!!!
"I watched the movie for 20 minutes, then pressed pause, got a cigarette and a glass of Scotch. To me it was really scary: they were talking about real scenarios. It was like a user guide for cyber terrorists. I hated that movie," the flamboyant Russian entrepreneur says.
ATTACKS!!!
And Despite All That...
NSA finally admits!!!
Security Professionals to the Rescue
What this talk is not about
Hacking SCADA Applications Hacking SCADA Systems Hacking SCADA Networks
How I performed the VA Share Assessment Findings Types of Attacks on SCADA Finding SCADA Systems Online Compromising a Critical Infrastructure
Cos this is about
What I’ve Done
Architecture Review Network Devices Review VA on SCADA Systems
SCADA vs Corporate Environment
Automatic Tools used
Day 1
Reached Site Collect the IP Addresses Run Nessus Relax 2 Hours Later
Systems Hang Unable to collect data Application Hang Systems Sudden Reboot
The Impact
Nessus Scanning Policies
Nessus Plugins Selection
Day 2 - 10
Day 11
Ancient & Unsupported OS & Hardware
Techniques
Information Gathering Groupings Policy & Plugins
Segregate systems based on
Select plugins based on
Scan the systems by
Scanning Validation Reporting
Validate non intrusion vulnerabilities
SCADA Assessment Incidents
Vulnerabilities Found
Additional Findings:
Vulnerabilities Found
SCADA Attack Matrix
SCADA Attack Matrix
Map of ICS/SCADA Systems on the Internet
Searching for SCADA Systems in the Internet
SCADA Login Console
SCADA Login Console
Reconnaissance on SCADA Application
Anonymous FTP Access in SCADA Systems
Finding Application Vulns in SCADA Systems
Check Version Against CVEs
Checking Application Exploits in Metasploit
PWNED!
Owning a Critical Infra – Is it Possible?
Think We are at Peace???
Takeaways