42

Printer Wars: Revenge of the Printer Troll (233373224)

Embed Size (px)

DESCRIPTION

Once upon a time in a northern Midwest institution, a printer activated, a piece of paper printed out, and the "printer troll" was born. Thus begins the story of "securing the printer." Departmental printers, both multifunction and single use, are prevalent on campuses. Many of these printers are set up by the vendor and receive no management or support from IT or the vendor. A recent vulnerability scan demonstrated just how unsecure these printers were. NDSU embarked on a printer remediation project that affected departments and hundreds of printers. Follow NDSU's story of printer remediation, training, and education. OUTCOMES: Get a plan of action and project outline and steps for finding, identifying, and remediating insecure networked printers * Hear our project experiences, stories, lessons learned, statistics, and success metrics * Learn about our plans for next steps and future auditing and testing for insecure devices on the campus network http://www.educause.edu/events/security-professionals-conference/2014/printer-wars-revenge-printer-troll

Citation preview

Page 1: Printer Wars: Revenge of the Printer Troll (233373224)
Page 2: Printer Wars: Revenge of the Printer Troll (233373224)
Page 3: Printer Wars: Revenge of the Printer Troll (233373224)
Page 4: Printer Wars: Revenge of the Printer Troll (233373224)

About NDSU

• Morril Land Grant University founded March 8, 1890

• 102 undergraduate majors, 170 undergraduate degree programs, 81 master’s degree programs, and 47 doctoral degree programs of study

Page 5: Printer Wars: Revenge of the Printer Troll (233373224)

About NDSU

• Campuses– Main Campus – Over 100 separate buildings– Downtown Campus – 3 very large renovated

historic buildings– Extension Offices and Research Centers – In

all but two counties of North Dakota– Recent Acquisition of a Nursing School in

Bismarck – still finding out what is there

Page 6: Printer Wars: Revenge of the Printer Troll (233373224)

About NDSU

• Spring 2013 Enrollment ~ 14000• FTE ~ 2600

Page 7: Printer Wars: Revenge of the Printer Troll (233373224)

NDSU’s Physical Infrastructure• Open Network

– External facing network (79 Subnets)• Open to the Internet.

– Internal facing network (79 Subnets)• Open to the University System and some State Wide

entities.– Firewalled Network

• Used by some departments for regulatory compliance– Server Room Network

• Used for server to server communication (i.e. Backup)

Page 8: Printer Wars: Revenge of the Printer Troll (233373224)

NDSU’s IT Infrastructure

Supported Departments

Distributed IT

Independent Departments

Page 9: Printer Wars: Revenge of the Printer Troll (233373224)

A little History• 2004 – ND ITD (Information Technology Department)

• SNMP Scan – Found a majority of printers on the University System network that had SNMP set to “public”

• 2008 – Foundstone• 175 insecure devices recognized as Printers

Page 10: Printer Wars: Revenge of the Printer Troll (233373224)

How did the Printer Problem really come to light?

• Nessus Scan– Removed the safe scan

• See how much paper would be wasted– LaserJet M 602

• 3 sheets– Nessus Findings

• FTP Open• Telnet Open• Web Page default Username and Password• SNMP Community Name set to Public

Page 11: Printer Wars: Revenge of the Printer Troll (233373224)

How did the Printer Problem really come to light?

• Brought this to the attention of superiors– We have Nessus, “scan the entire network”

– Work out alternative solution

Page 12: Printer Wars: Revenge of the Printer Troll (233373224)

Is this really a problem?

• 2008 - NDSU dropped support for printers for cost savings.

• Currently a department requests a DNS name for the printer they purchased and that name is granted within our naming scheme and that name is added to an install script.

• Printer Plugged into the Network.

Page 13: Printer Wars: Revenge of the Printer Troll (233373224)

Is this really a problem?

Page 14: Printer Wars: Revenge of the Printer Troll (233373224)

Is this really a problem?

Page 15: Printer Wars: Revenge of the Printer Troll (233373224)

Is this really a problem?

• Shawn Merdinger– Printer Attack: Script Kiddie

• Discover Internet-facing .edu printers via Shodan (or scanning)

• Convert child pornography image to PJL printable format

• One line of code via TOR. Script, loop, rinse 'n repeat. Reap Lulz. – 'cat kp.img | nc xxx.xxx.xxx.xxx 9100' (plenty of other ways, too!)

Page 16: Printer Wars: Revenge of the Printer Troll (233373224)

Problem

• Results– Printer is now federal/state crime scene

(connected PCs are also suspect)– Hostile work environment class action lawsuit

(HR, employee fallout)– Press, Press...and moar Press (and all the

incorrect stories as a bonus)

Page 17: Printer Wars: Revenge of the Printer Troll (233373224)

Is this really a problem?

Page 18: Printer Wars: Revenge of the Printer Troll (233373224)

Methodology – Step by Step1. Tools – What are we going to use?2. Locating devices – How wide spread is the problem?3. Policies and Procedures – Shouldn’t we have covered

this somewhere?4. Identification and Notification – How do we let them

know their Printers look so bad?5. Reactions – How could we have been so wrong about

how the population would react?6. Interesting Problems – It did What?7. First follow up scan – Is it working?

Page 19: Printer Wars: Revenge of the Printer Troll (233373224)

Tools

• Tools Used:– Angry IP scanner (GPLv2)

– NMAP (GNU GPL)

– Putty (GNU GPL)

– WinSCP (GNU GPL)

– Microsoft Excel (campus agreement)

– Student Employee

Page 20: Printer Wars: Revenge of the Printer Troll (233373224)

Angry IP Scanner

• Finding what is on the network.

• Angry IP Scanner– http://angryip.org/w/Home

Page 21: Printer Wars: Revenge of the Printer Troll (233373224)

Angry IP Scanner

• Finding what is on the network.

Page 22: Printer Wars: Revenge of the Printer Troll (233373224)

NMAP

• Command Used:

• Results Achieved:

Page 23: Printer Wars: Revenge of the Printer Troll (233373224)

Findings

• What did we find?– External Network – outward facing

• 3,526 active hosts (June 2013)• 67 recognizable printers • 4858 active hosts (February 2014)• 138 recognizable printers

– Internal Network – not routable to the internet• 1885 active hosts (June 2013)• 509 recognizable printers• 2194 active hosts (February 2014)• 551 recognizable printers

Page 24: Printer Wars: Revenge of the Printer Troll (233373224)

How bad is it?

• Human solution for finding the vulnerabilities in the printers– Didn’t want to be responsible for:

• Crashing Printers• Reams of wasted paper• Default user names and passwords

Page 25: Printer Wars: Revenge of the Printer Troll (233373224)

Student Employee

• What did he do?– Opened a browser to IP or Host name

• Tried to log in using defaults– Used Putty to Telnet into the IP or Hostname

• Port 23– Tried an anonymous FTP connection with

WinSCP• Port 21• Anonymous Login selected

Page 26: Printer Wars: Revenge of the Printer Troll (233373224)

Findings

• What did we find? (June)– External Network – 67 Printers

• 20 With anonymous FTP Logins – 30%• 20 Default User/Admin Account – 30%• 9 Telnet Logins – 13%

Page 27: Printer Wars: Revenge of the Printer Troll (233373224)

Findings

• What did we find? (June)– Internal Network – 509 Printers

• 177 With anonymous FTP Logins – 35%• 219 Default User/Admin Account – 43%• 156 Telnet Logins – 31%

Page 28: Printer Wars: Revenge of the Printer Troll (233373224)

Procedure and Policies

• Review of existing policies and procedures.– Did we have any?– Why are they not being followed?– Should we make new?– How do we make our

clients follow newprocedures and policies?

Page 29: Printer Wars: Revenge of the Printer Troll (233373224)

Policies and Procedures

• What we found in our review:– Vague policies – NDUS 1901.2, NDSU 158.

• No documented procedures.– No procedures meant that few people knew

what should have been done.– Started new procedures right away.– Isn’t getting client buy in the most difficult task

anyway.

Page 30: Printer Wars: Revenge of the Printer Troll (233373224)

Identification and Notification

• DNS Names include department, for the most part.

• Some, no clue, who they belonged to

Page 31: Printer Wars: Revenge of the Printer Troll (233373224)

E-Mails

• Constructed emails to identified groups.– IP Address– DNS Name– Vulnerabilities found– Directions for cleanup

• We worked with ourCommunications Officer and the Help Desk.

Page 32: Printer Wars: Revenge of the Printer Troll (233373224)

• Sent out the emails and we waited:

Page 33: Printer Wars: Revenge of the Printer Troll (233373224)

Reactions

• Calm and collected• Were able to

configure devices with no problems

• Glad to help

• Panicked upon contact from the security office

• Needed us to help them through securing

• Were Grateful.

Page 34: Printer Wars: Revenge of the Printer Troll (233373224)

Some Problems

• Printers no longer printing:– Disabled port 9100 – Disabled SNMP– Client needed reconfiguration

• Stop the print spooler• Delete all jobs in C:\Windows\system32\spool• Restart spooler• Delete all IP ports• Delete all Printers• Restart computer• Setup Printers

Page 35: Printer Wars: Revenge of the Printer Troll (233373224)

Some Problems

• Older printers did not have a web-based configuration– Older Java

• Did not have any of the sections needed to configure

– Configuration through Telnet• set-password – Changes default password• ftp-config:0 – Disables FTP• set-cmnty-name: <newname> - Changes default SNMP • Idle-timeout: 5 – Sets short timeout for telnet

Page 36: Printer Wars: Revenge of the Printer Troll (233373224)

Follow Up Scan

Page 37: Printer Wars: Revenge of the Printer Troll (233373224)

Findings

• What did we find? (February)– External Network – 135 Printers

• 62 With anonymous FTP Logins – 46%• 68 Default User/Admin Account – 50%• 34 Telnet Logins – 25%

Page 38: Printer Wars: Revenge of the Printer Troll (233373224)

Findings

• What did we find? (February)– Internal Network – 579 Printers

• 185 With anonymous FTP Logins – 32%• 210 Default User/Admin Account – 36%• 73 Telnet Logins – 13%

Page 39: Printer Wars: Revenge of the Printer Troll (233373224)

SO WHAT HAPPENED

1. School was in session during the second scan.

2. Improved the process for finding printers.3. Rouges, people buying printers and just

plugging them in to the network.

Page 40: Printer Wars: Revenge of the Printer Troll (233373224)

Open SSH / Heartbleed

• The Internet of Devices• Open SSH is free• Printers possibly vulnerable?

Page 41: Printer Wars: Revenge of the Printer Troll (233373224)

Heartbleed?

• What did we do?– RenISAC made a python script available.– Wrote a script to iterate through our subnets.

• Findings?– Zero printers found that were vulnerable.

• However, found all kinds of other devices that had SSL open and that needs some investigation.

Page 42: Printer Wars: Revenge of the Printer Troll (233373224)

Questions?

Theresa Semmens – [email protected]

Jeff Gimbel – [email protected]