defcon 18 "hacking electronic door access controllers"

35
“We don’t need no stinkin’ badges!” Shawn Merdinger security researcher DEFCON 18 Hacking electronic door access controllers

Upload: shawnmerdinger

Post on 27-May-2015

811 views

Category:

Technology


7 download

DESCRIPTION

Latest version of my "Hacking electronic Door Access Controllers" presentation from Defcon 18 (31 July, 2010, Las Vegas)

TRANSCRIPT

Page 1: Defcon 18  "Hacking Electronic Door Access Controllers"

“We don’t need no stinkin’ badges!”

Shawn Merdingersecurity researcher

DEFCON 18

Hacking electronic door access controllers

Page 2: Defcon 18  "Hacking Electronic Door Access Controllers"

Obligatory Speaker Slide

• Shawn Merdinger– Former Cisco STAT, Tippingpoint, non-profits– Independent security researcher– University of Florida, Health Science Center• Founder of LinkedIN MedSec group• Currently researching medical device security <groan>

– Past security research on VoiP phones• Basic VxWorks debug stuff (see HDM’s talk)

– Quick rant: We need more women in security!

Page 3: Defcon 18  "Hacking Electronic Door Access Controllers"

Outline

• EDAC technology– Trends, landscape– Vendors– Architecture

• EDAC real-world analysis – S2 Security NetBox• Research, exposure, vulnerabilities, attacks• Countermeasures & recommendations

Warning: stupid bugs ahead

Page 4: Defcon 18  "Hacking Electronic Door Access Controllers"

Learning outcomes

• Awareness of security issues in EDAC systems• Major players, vendors• Pen-testing knowledge• Research and testing methods• Benefitting EFF via ethical hacking

Page 5: Defcon 18  "Hacking Electronic Door Access Controllers"

Q . …about the security of buildings around town….what was your response?

ATTY GEN. RENO: “Let's do something about it.”

Q. Is this a good thing that has happened?

ATTY GEN. RENO: I think any time you expose vulnerabilities, it's a good thing.

Department of Justice Weekly Media Briefing, 25 May 2000

“When hackers put viruses on your home computer it's a nuisance; when they unlock doors at your facility it's a nightmare.”

John L. Moss, S2 Security CEOSTAD, Volume14, Issue 1, January, 2004

Choice quotations

Page 6: Defcon 18  "Hacking Electronic Door Access Controllers"

EDAC Technology Overview• Trend is towards IP from proprietary solutions

– Convergence of IP, Video (cameras, DVR)– Adding other building systems (HVAC, elevators, alarms)– Cost savings, integration, increased capabilities (LDAP)

• Many controllers use embedded Linux• Wide range of vendors in EDAC space. Vulns appearing.

S2 SecurityHoneywellHID Global VertxIngersoll-RandBosch SecurityReach Systems

Cisco Systems (Richards Zeta) BrivoDSX AccessRS2 TechnologiesSynergisticsLeneland many others….

Page 7: Defcon 18  "Hacking Electronic Door Access Controllers"

EDAC Deployment

• Often you’ll see– Managed by building facilities people– Stuck in a closet and forgotten– Long lifecycles of 5-10 years

• Distanced from IT Security– “Physical security is not your domain. It’s ours.”– Patching, upgrades, maintenance. What? Huh?– Policies regarding passwords, logging don’t apply– 3rd party local service contractor adds doors, hardware

configuration

Page 8: Defcon 18  "Hacking Electronic Door Access Controllers"

Anyone really question the importance of EDAC Security? Really?

• Yale lab murder• Clark access log

Page 9: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 Security NetBox

• Built by S2 Security• 9000+ systems installed worldwide– Schools, hospitals, businesses, LEA facilities, etc.

• Same box is sold under multiple brand names– Built by S2 Security

• NetBox

– Distributed by Linear• eMerge 50 & 5000

– Reseller branding• Sonitrol eAccess

Page 10: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 Security NetBox

Page 11: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 Security EDAC Architecture

Page 12: Defcon 18  "Hacking Electronic Door Access Controllers"

Reading up on S2 Security

• Preparation and information gathering– S2 Security docs, case studies, press releases– Search engines (Google, Bing, etc.)– Lexis-Nexis, ABI-Inform (tip: access these at college campus libraries)

• Example: able to determine from tinyurl.com/s2mysql– MySQL, Samba– Lineo Linux distribution (same as Zarus! )– Processor is ARM Core IXP 425 chip @ 533 MHz– Only 15 months from design to 1st customer shipping– “S2 did not have much prior experience with open source”– “MySQL is used to store everything from reports, user information,

customized features, facility diagrams, and more”

Page 13: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 Security Marketing

• “Data security features built into the software and hardware assure that it is safe to deploy systems across any network, even the public Internet”

• “Remote locations are easily handled”

• “S2 NetBox can operate for years without maintenance of any kind”

Page 14: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Components

• HTTP Server• MySQL / Postgres• NmComm custom application• FTP/Telnet• Other features…

Page 15: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Component: HTTP Server

• GoAhead Webserver TCP/80• Poor choice – Sixteen CVEs • CVE-2003-1568, CVE-2002-2431, CVE-2002-2430, CVE-

2002-2429, CVE-2002-2428, etc.• No vendor response for several

– Typical example in CVE-2002-1951• “GoAhead….contacted on three different occasions

during the last three months but supplied no meaningful response.”

"Data security is a challenge, and unfortunately, not everyone has risen to it.“ John L. Moss, S2

Security CEO

Page 16: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Component: MySQL

• MySQL server listening on 3306• Outdated SQL– Version 2.X uses MySQL version 4.0• 3.X uses Postgres

– Just how old is MySQL 4.0? • End of life? How about end of download…

Page 17: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Component: NmComm

• Service listening on TCP/7362• Performs multicast discovery of nodes• Custom daemon coded by S2 Security• Patent issued 15 December, 2009– “System and method to configure a network node”• http://tinyurl.com/s2patent• Reads like a RFC (tip: grep for “must not” ;)

“Ladies & Gentlemen, start your fuzzers!”

Page 18: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Component: FTP & Telnet

• Cleartext protocols for a security device?!?!– Telnet to manage (as root – use diagnostics tools ;)– FTP for DB backups

• Poor security-oriented documentation

"We see some vendors fitting their serial devices with Telnet adapters, which simply sit on the network transmitting unsecured serial data.”

John L. Moss, S2 Security CEO

Page 19: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Components: Features!

• Lots of extras and licenses options– Elevator, HVAC, Temp, BurglarAPI– VoIP

• Increases complexity• Expands attack surface– More devices, protocols

Page 20: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Components: Features!

• View building floorplans

Page 21: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 NetBox unauthenticated reset

• VU#571629• Remote, unauthenticated factory reset via

crafted URL

Page 22: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 NetBox Unauth Access Backup DB

• CVE-2010-2466 – Unauth attacker can dload DB backups– Nightly DB backup is hardcoded CRON• File name is “full_YYYYMMDD_HHMMSS.1.dar”• Predictable time range and naming convention

– Attacker gets backup DB = Game Over• Uncompress the.dar format

– /var/db/s2/tmp/backup/all.dmp

• Entire system data in DB!

Page 23: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Unauth Access Backup DB

• Extract admin MySQL_64bit hash

• Affects NetBox 2.X (mysql) and 3.X (postgres)• Hash is trivial to crack

• CVE-2010-2468

Page 24: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Pwnage: Doors

• Open any door– Right now– Or schedule

Page 25: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Pwnage: Cameras

• Backup file contains IP camera info– Name, IP address, admin username and password

• NetBox 2.X and 3.X systems vulnerable• Attacker now owns IP cameras

"Most hackers don't care about watching your lobby. If they gain access to the network, they're going to go after financial data and trade secrets.”

Justin Lott, Bosch security marketing

Page 26: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Pwnage: DVRs

• User/Pass to DVRs in backup DB• Poor setup guides for DVRs

• Recommends keeping default user/pass– On-Net Surveillance Systems Network Video Recorder document

Page 27: Defcon 18  "Hacking Electronic Door Access Controllers"

More HTTP directory grief…

• CVE-2010-2465– Unauthenticated access• Node logs• Employee photographs

Page 28: Defcon 18  "Hacking Electronic Door Access Controllers"

NetBox Remote Fingerprinting

• Remote Identification– MAC OID registered to S2 Security

– Nmap service fingerprint submitted (nmap 5.20)

– /blank.html (props to SkipFish)

Page 29: Defcon 18  "Hacking Electronic Door Access Controllers"

Enter Shodan

• Game changer– NetBoxs difficult to find, not on Internet, blah blah..– “Behind a firewall, accessible only by VPN”– “Deep within the corporate network”

• Targeted searches– Unique fingerprint– 341 devices today. 150 in March, 2010

Page 30: Defcon 18  "Hacking Electronic Door Access Controllers"

Recommendations: Vendor

• Vendor– Conduct security evaluations on your products– Provide secure deployment guides– Tighten-up 3rd party integration – Improve

• Logging– More details: changes, auditing, debug levels– Ability to send to log server

• HTTP– Use a “better” HTTP daemon– HTTPS by default– Modify banners, reduce footprint, etc.

• FTP/Telnet to SCP/SSH

Page 31: Defcon 18  "Hacking Electronic Door Access Controllers"

Recommendations: Customers– Demand better security! • From vendor, reseller, and service contractor• Expect fixes and patches

– Manage your EDAC like any other IT system• Patching, change management, security reviews

– Technical• Isolate eMerge system components

– VLANs, MAC auth, VPN, restrict IP, etc.

Page 32: Defcon 18  "Hacking Electronic Door Access Controllers"

S2 Security CEO Letter

• From John L. Moss to System Integrators

Page 33: Defcon 18  "Hacking Electronic Door Access Controllers"

Offer: EDAC Evaluations for Vendors

• Recorded at CarolinaCon– Get a “phase 1” product security evaluation• Donate to a non-profit like EFF (and get tax-deduction)• Will sign NDA (non-disclosure agreement)

– Eval the box, report & outbrief– Add’l advice for product security response• /security page, email POC, PGP, vulnerability policy, etc.• Introduction to CERT/CC, US-CERT• Security conference support

Page 34: Defcon 18  "Hacking Electronic Door Access Controllers"

So Far….

• Approached by 2 EDAC companies• Talk…establish trust…NDA…gear shipped • 1st company donated to EFF– Won EFF’s Defcon Giveaway Contest : $2560 raised

Page 35: Defcon 18  "Hacking Electronic Door Access Controllers"

Thank you!

• Questions?• Contact [email protected]– Follow-up questions– Product security evaluations

A special thank you to DEFCON & EFF