65
Exploiting SCADA Systems Exploiting SCADA Systems http:// null.co.in/ http://nullcon.net/

Exploiting SCADA Systems

Embed Size (px)

Citation preview

Page 1: Exploiting SCADA Systems

Exploiting SCADA SystemsExploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 2: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 3: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Traditional SCADA Network Topology

“Control Systems Cyber Security: Defense in Depth Strategies”

Page 4: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 5: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

As newer products compete to make SCADA systems intuitive and modern, you can see the number of attack vectors rise.

Say hello to ScadaMobile.

Page 6: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 7: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Available at the App Store for only $2.99 (lite) and $74.99 for the full version

Page 8: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

So.. whats wrong?

Page 9: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Security has been implemented as an add-on instead of being build around the product from the ground up

Page 10: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

http://www.matrikonopc.com/products/opc-data-management/opc-tunneller.aspx

Page 11: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

http://www.indusoft.com/blog/?p=159

Page 12: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

http://www.wateronline.com/product.mvc/ClearSCADA-SCADA-Management-Software-0002

Page 13: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

http://www.isagraf.com/pages/news/0905PR-KingfisherDNP3.htm

Page 14: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Systems are typically installed for long term, and software upgrades may require new hardware

Page 15: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Not to mention downtime, and nobody likes downtime.

Depending on the product and the environment, just planning

the patch process can be frustrating.

Page 16: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Something somewhere is connected to something that is

connected to the Internet

Page 17: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

And some things just are connected to the Internet...

Page 18: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Courtesy of Shodan

(www.shodanhq.com)

Page 19: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 20: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 21: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 22: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“What really has to be done is better security around these systems and better, enforced security policies so the lack of patching does not matter.”

Page 23: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Quoted from someone in the Control Systems Industry.

This is the wrong way to view security. If this is what some

people in the industry believe, it is no wonder why so many vulnerabilities still exist...

Page 24: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

No authentication?

You've got problems.

Page 25: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 26: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

What would you like to do?

Page 27: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

An exception has occurred.

Server is entering safe mode...

Page 28: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Oh, by the way, you no longer need credentials.

Page 29: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 30: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Vendors are not always “receptive” to vulnerability reports

Page 31: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Favorite Quotes

“I'm not sure what this perl script is trying to do?”

“If the CSV file is edited manually then it may not parse correctly when it gets loaded.”

“From what I can see there is no security vulnerability in our product, if the CSV file is invalid then the application will not run correctly.”

“Hi Jeremy, thanks but please don't waste my time.”

“That sounds like a threat Jeremy, are you expecting me to pay you something?”

Page 32: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Possible “Security Unaware” Vendor Q&A

Page 33: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

I found several security vulnerabilities in your

products.....information.....

.....time passes.....

What are your plans regarding a patch?

Page 34: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“Product A isn't accessible from the Internet, so it's not vulnerable to attacks.”

So if someone owns a workstation on the same subnet with an IE exploit, how vulnerable do you consider it now?

Page 35: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 36: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“As long as you don't open untrusted files with Product AB, then the exploits can't harm the system.”

“Do you really want to risk the organization's security by trusting that someone won't open a file that could be found on the web, emailed, or dropped in a trusted location?”

Page 37: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 38: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“Product ABC uses a complex, proprietary protocol to which it's documentation is only circulated internally.”

What is to stop someone from using a packet sniffer and disassembler to analyze the protocol, figure out how it works, and spend some time researching how to exploit it?

Page 39: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 40: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Why is it important to audit SCADA software?

Page 41: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Stuxnet used a Siemens WinCC Hard-coded Database

Credentials Vulnerability

How many other vendors do this?

Page 42: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Kevin Finisterre

Page 43: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“If you outlaw SCADA exploits, only outlaws will have SCADA

exploits.”

KF in 2008 after releasing CitectSCADA vulnerability

information

http://www.exploit-db.com/papers/13028/

Page 44: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

If you find vulnerabilities in SCADA products, I suggest you work with ICS-CERT. They will

contact vendors, help coordinate disclosure, and generally help the

process go smoothly.

Page 45: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

MODBUS Fuzzing

Page 46: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 47: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Wait a few seconds...

Page 48: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 49: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

“Tunneller” Protocol

Page 50: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

HeaderSignature Length

TrailerBody

Client → Server

Connect Handshake

Msg ID

Page 51: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Session Handshake

Server → Client

Page 52: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Continued

Client → Server

Server → Client

Page 53: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Session Handshake Complete

Client → Server

Page 54: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Page 55: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Playing with lengths can be fun! Or not fun, or useful. Often time consuming and irritating actually. Literally be prepared to spend a lot of time chasing possibilities that aren't there. Just to, in the end, when you end up with another denial of service bug, wondering why you're still inside when its 8 in the evening. Maybe I should have listened to Dad and became a doctor, or a lawyer.

Not only in SCADA protocols, but others too!

Page 56: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Sploitware

Page 57: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Just a small project of mine focused on SCADA and related

software

Page 58: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Can check systems for potentially vulnerable software, exploit

vulnerabilities, lots of fun stuff

Page 59: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

DEMO!

Page 60: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Recommendations

Page 61: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Vendors...

Try to break it before you ship it!

Page 62: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

(And check out TAOSSA)

Page 63: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Clients...

Do a security evaluation before you make the purchase.

Page 64: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Because other people will.

Page 65: Exploiting SCADA Systems

http://null.co.in/ http://nullcon.net/

Thank you!

jbrown at patchtuesday.org