vu vuln lnera rabil bility ity as assessm ssment nts s on
play

Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC - PowerPoint PPT Presentation

Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC SCAD ADA A Sy Systems: stems: Outsm tsmarting arting the Smart rt Grid id Fadli B. Sidek BSidesVienna 2014 Security Specialist @ Whoami SecureSingapore


  1. Vu Vuln lnera rabil bility ity As Assessm ssment nts s on SC SCAD ADA A Sy Systems: stems: Outsm tsmarting arting the Smart rt Grid id Fadli B. Sidek BSidesVienna 2014 Security Specialist @

  2. Whoami • • SecureSingapore • 8 years in IT HeartBleed Bug • • Defcon Kerala (India) • S-O-E-C Security Engineer • • The Hackers Con (India) • VA/PT Software Security • • BSidesLV (USA) Research • BSidesVienna • Write Articles Secure Source Code Review SCADA Binary VA/PT Analysis Software Fuzzing

  3. Legend General Information Technical Information Something to refer to

  4. What is a Critical Infrastructure?

  5. What is SCADA?

  6. Typical SCADA Control Room

  7. A Typical SCADA Network Architecture

  8. What’s the Big Deal?

  9. Die Hard 4.0 – 4 real!!! "I watched the movie for 20 minutes, then pressed pause, got a cigarette and a glass of Scotch. To me it was really scary: they were talking about real scenarios. It was like a user guide for cyber terrorists. I hated that movie," the flamboyant Russian entrepreneur says.

  10. ATTACKS!!!

  11. And Despite All That...

  12. NSA finally admits!!!

  13. Security Professionals to the Rescue

  14. What this talk is not about Hacking SCADA Hacking SCADA Hacking SCADA Applications Systems Networks

  15. Cos this is about How I Share Types of performed the Assessment Attacks on VA Findings SCADA Finding SCADA Compromising Systems a Critical Online Infrastructure

  16. What I’ve Done VA on Architecture SCADA Review Systems Network Devices Review

  17. SCADA vs Corporate Environment

  18. Automatic Tools used

  19. Day 1 Collect the IP Reached Site Addresses Relax Run Nessus 2 Hours Later

  20. The Impact Unable to collect data Systems Hang Application Hang Systems Sudden Reboot

  21. Nessus Scanning Policies

  22. Nessus Plugins Selection

  23. Day 2 - 10

  24. Day 11

  25. Ancient & Unsupported OS & Hardware

  26. Techniques

  27. Validate non intrusion vulnerabilities Validation Methodology Scan the systems by • Individual • Groups Scanning • Sites • Operating Systems • Active/Passive/Backups Select plugins based on Reporting • Operating systems Policy & Plugins • Applications • Devices (Network) Segregate systems based on • Servers Groupings • Workstations • Network Devices • Operating Systems • Redundancy/failovers • Interviewing • Documentation Information Gathering • Live Hosts • OS fingerprinting • Systems Specification (HD size/Ram)

  28. SCADA Assessment Incidents

  29. Vulnerabilities Found Additional Findings:  Default Admin Password  Default Cisco Password  Blank Passwords  Default Web Server Passwords  Anonymous FTP  Obsolete OS (NT4.0, XP)  64MB/128MB RAM  Old Hardware

  30. Vulnerabilities Found

  31. SCADA Attack Matrix

  32. SCADA Attack Matrix

  33. Thank God SCADA systems are Isolated and not part of the Internet….. But hang on….

  34. Map of ICS/SCADA Systems on the Internet

  35. Searching for SCADA Systems in the Internet

  36. SCADA Login Console

  37. SCADA Login Console

  38. Reconnaissance on SCADA Application

  39. Anonymous FTP Access in SCADA Systems

  40. Finding Application Vulns in SCADA Systems

  41. Check Version Against CVEs

  42. Checking Application Exploits in Metasploit

  43. PWNED!

  44. Compromising a Critical Infra – Is it Possible?

  45. Owning a Critical Infra – Is it Possible?

  46. Think We are at Peace???

  47. Takeaways  Require Extra Precaution when performing VA on SCADAs  Information Gathering is very very Important!  Vulnerabilities Exist in Both Software & System  Critical Infrastructures a Favorite Amongst Hackers  Types of Attack are similar  But Impact of Attack Can be Deadly  Cyber Conflict is Never Ending  We need to guard our Critical Infrastructures

  48. • Twitter: @hang5jebat • Blog: http://securityg33k.blogspot.sg • LinkedIn: Fadli B. Sidek • Website: www.codenomicon.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend