It WISN't me, attacking industrial wireless mesh networks

Similar documents
WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control

The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert

ISA100.11a. Pengfei Ren.

What do we expect from Wireless in the Factory?

The ZigBee Architecture An Introduction

Control Data Systems Industrial Wireless Communications

Exploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant.

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

Sensor-to-cloud connectivity using Sub-1 GHz and

Guide to Wireless Communications, 3 rd Edition. Objectives

KW41Z IEEE and BLE Coexistence Performance

ISA100 Wireless for Control Applications. Control Data Systems. Industrial Wireless Data Systems,

HART COMMUNICATION. A Digital Upgrade For Existing Plants

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security

Wireless Network Security Spring 2016

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Wireless LAN Security (RM12/2002)

Kinetis USB-KW41Z Wireless Protocol Sniffer Quick Start Guide

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

Wireless Network Security Spring 2015

TOBIAS ZILLNER ZIGBEE EXPLOITED THE GOOD, THE BAD AND THE UGLY

Principles of Wireless Sensor Networks

Implementation of WirelessHART in the NS-2 Simulator and Validation of Its Correctness

Current Security Issue Demonstration Paper: Exploiting ZigBee Networks

Pwning KNX & ZigBee Networks

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Bluetooth Smart: The Good, The Bad, The Ugly... and The Fix

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.

Foreword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Wireless Network Security Spring 2011

Amarjeet Singh. February 7, 2012

Computer Networks Security: intro. CS Computer Systems Security

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Mobile Security Fall 2013

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Principles of Wireless Sensor Networks

Implementation of Gradient Routing in WSNs

Networking interview questions

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

What can a small device do in modern industrial World.

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS

nblue TM BR-MUSB-LE4.0-S2A (CC2540)

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Integration of Wireless Sensor Network Services into other Home and Industrial networks

Communication in Broadband Wireless Networks. Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Unencrypted Mouse Packet

Zigbee protocol stack overview

Wireless Personal Area Networks (WPANs) Wireless PAN

Chapter 24 Wireless Network Security

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes

Brief Contents. Acknowledgments... xv. Introduction...xvii. Chapter 1: Packet Analysis and Network Basics Chapter 2: Tapping into the Wire...

VertexCom. VC83X0 Product Brief. Version: 0.4 Release Date: June 28, Specifications are subject to change without notice.

Wireless Network Security Spring 2011

BAHX Core performance monitoring using ISA a compliant wireless Temperature Transmitters

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Network Encryption 3 4/20/17

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Bluegiga Bluetooth Smart Software v.1.3 5/28/2014 1

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35

Outline. Introduction. The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Advanced WiFi Attacks Using Commodity Hardware

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

ZIGBEE EXPLOITED. The good, the bad and the ugly. Tobias Zillner August 6th Cognosec 2015 Castellezgasse 16/ Vienna, Austria

A Rising Tide: Design Exploits in Industrial Control Systems

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

OneWireless Network Overview

Using Network Analyzer Tool to Monitor Bluetooth Mesh Traffic

Table of Contents 1 WLAN Service Configuration 1-1

ZigBee Security Specification Overview

Attacks on WLAN Alessandro Redondi

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

The IoT and Thread in PHYTEC Nodes. Jonas Remmert July 15th, 2016

Secure Initial Access Authentication in WLAN

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Internet Protocol and Transmission Control Protocol

Sub-GHz Remote Control Dimmer Quick Start Guide. Reference Design for Kinetis KW01 MCU KW01RCDRDQSG

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

NETWORK SECURITY. Ch. 3: Network Attacks

Appendix E Wireless Networking Basics

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack

Mesh networking with ZigBee. A dive into the ZigBee ecosystem

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Subject-Computer Networks, M.Sc.(CS) - III rd

Preventing wireless deauthentication attacks over Networks

Mittuniversitetet PROFIBUS PA

The Open System Interconnect model

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Transcription:

It WISN't me, attacking industrial wireless mesh networks

Introduction Erwin Paternotte Lead security consultant @stokedsecurity Mattijs van Ommeren Principal security consultant @alcyonsecurity 2

Industrial (r)evolution A brief history of control systems: ~1940: Air: Pneumatic logic systems: 3-15 psi Mid 1950: Analog: Current loop: 4-20 ma Mid 1980: Digital: HART, Fieldbus, Profibus Late 2000: Wireless mesh networks WirelessHART (09/2007) ISA 100.11a (09/2009) 3

Previous research Security considerations for the WirelessHART protocol, Shahid Raza et al, 2009 https://ieeexplore.ieee.org/document/5347043/ WirelessHART A Security Analysis, Max Duijsens, Master (2015) https://pure.tue.nl/ws/files/47038470/800499-1.pdf Attacking the plant through WirelessHART, Mattijs & Erwin, S4 Miami (2016) https://www.youtube.com/watch?v=alepgutwzvc Denial of service attacks on ICS wireless protocols, Blake Johnson, S4 Miami (2018) https://github.com/voteblake/diwi/ (video no longer available) 4 Wright s principle: Security does not improve until practical tools for exploration of the attack surface are made available.

Industrial process control loop 5

Introduction to WirelessHART Supports HART application layer Single encryption cipher/key length (AES CCM*) Wireless technology based on Time Synced Mesh Protocol developed by Dust Networks (now part of Analog Devices) Radio SoC exclusively provided by Dust Networks 6

Introduction to ISA 100.11a Relies on several standards: 6LoWPAN (IPv6/UDP) Ability to tunnel other protocols Mainly developed by Nivis Generic 802.15.4 chips provided by multiple vendors: STM, NXP, Texas Instruments, OKI 7

WISN topology 8

Protocol stacks OSI Application HART WirelessHART ISA100.11a Command oriented, predefined data types and application procedures ISA native or legacy protocols (tunneling) Presentation Session Transport Network Auto-segmented transfer of large data sets, reliable stream transport Mesh network UDP Mesh network/6lowpan Datalink Physical Byte oriented, token, master/slave protocol Analog & digital signaling (4-20 ma) Upper data-link sublayer IEEE 802.15.4 MAC IEEE 802.15.4 PHY (2.4 GHz) Upper data-link sublayer IEEE 802.15.4 MAC IEEE 802.15.4 PHY (2.4 GHz) 9

Common denominators 802.15.4 MAC layer at 2.4 Ghz Time Slotted Channel Hopping in order to: Minimize interference with other radio signals Mitigate multipath fading Centralized network & security manager orchestrates communication between nodes Concluded that developing a common sniffer for both protocols should be possible 10

WirelessHART & ISA100.11a Security AES CCM* (CBC-MAC with counter mode) Datalink Layer (integrity only) Transport Layer (encryption) Join process Handshake with Network Manager Shared secrets Certificates (ISA100.11.a only) 11

Keys galore ISA100.11a Global Key well-known K_open well-known K_global well-known Master Key derived during provisioning, used as KEK K_join Join process D-Key Hop-by-hop integrity T-KEY End-to-end encryption WirelessHART Well-known Key Advertisements Network Key Hop-by-hop integrity Join Key Join process Broadcast Session Key End-to-end Unicast Session Key End-to-end 12

WirelessHART encryption keys OSI Application WirelessHART Command oriented, predefined data types and application procedures Presentation Session Transport Network Datalink Physical Auto-segmented transfer of large data sets, reliable stream transport Mesh network Upper data-link sublayer IEEE 802.15.4 MAC IEEE 802.15.4 PHY (2.4 GHz) join key broadcast session key unicast session key well-known/network-key 13

ISA100.11a encryption keys OSI Application ISA100.11a ISA native or legacy protocols (tunneling) Provisioning Joining Presentation Session Transport UDP K_open / K_global K_join T-Key Network Mesh network/6lowpan = Datalink Physical Upper data-link sublayer IEEE 802.15.4 MAC IEEE 802.15.4 PHY (2.4 GHz) D-Key 14 Global Key Master Key

How to obtain key material Default keys Documented, more or less Sniffing During OTA provisioning (ISA100.11a) Keys stored in device NVRAM Recoverable through JTAG/SPI (as demonstrated by our previous research) 15

WirelessHART default join keys 445553544E4554574F524B53524F434B Multiple vendors DUSTNETWORKSROCK E090D6E2DADACE94C7E9C8D1E781D5ED Pepperl+Fuchs 24924760000000000000000000000000 Emerson 456E6472657373202B20486175736572 Endress+Hauser Endress + Hauser 16

Sniffer hardware selection BeamLogic 802.15.4 Site Analyzer 16 channels simultaneously, no injection support, Basic Wireshark dissector, Expensive (~ $1300) NXP BeeKit Single channel 802.15.4 with standard firmware (not open source), reached EOL Atmel RZ Raven Single channel 802.15.4 with standard firmware, no free IDE (Atmel Studio n/a), reached EOL 17

NXP USB-KW41Z 18 Single channel 802.15.4 with standard firmware (not open source) Actively supported Free IDE available Powerful microcontroller (Cortex M0+) PCB ready for external antenna (Wardriving!) Easy firmware flashing via USB mass storage (OpenSDA) Documentation and examples, but with a few important omissions

Demo 1: Kinetix Protocol Analyzer Adapter (sniffer) 19

20

USB-KW41Z <-> host communication Hardware is detected as virtual COM/UART port (Windows/Linux) Freescale Serial Communication Interface (FSCI) developed by NXP for communication between host and device firmware. Host SDK for FSCI is available (with Python bindings) FSCI protocol is fairly well documented Allowed us to communicate directly with the USB-KW41Z without requiring the SDK to be installed 21

USB-KW41Z block diagram 22

Building the toolset Extended the KillerBee framework with a driver for the USB-KW41Z Allows us to comfortably capture 802.15.4 traffic into PCAP format Developed Scapy protocol support Allows us to forge and inject packets Developed Wireshark dissectors for WirelessHART and ISA100.11a Bringing WISN packet viewing to the masses Live capture and dissecting of WISN traffic on a single channel at the time 23

Demo 2: Sniffing traffic with KillerBee and Wireshark 24

25

Time Slotted Channel Hopping 26

Superframe Sequence of repeating channel hopping patterns Period usually between 512-4096 time slots Time reference WirelessHART: sequence number=0 (start of network manager) ISA100: TAI=0 (Jan 1 st 1958, 00:00:00) Timeslot within a superframe denotes a communication link, assigned by the Network Manager 27

28

Implementing Time Slotted Channel Hopping 29 Both protocols require high speed channel hopping via predefined, but different patterns. FSCI communication too slow to tune into time slots (10ms) Solution: implement channel hopping in firmware Two layers of encryption/authentication Solution: Implement in host software (Killerbee) Ability to inject traffic FSCI supports injection of arbitrary frames Solution: Implement frame injection in Killerbee, add protocol support to Scapy for crafting packets

Firmware Bare metal task scheduler 30 Task consisting of single (endless) loop Blocking function waiting for events Once a task is running, it has full control Cannot run longer than ~2 ms to prevent starvation of other tasks void MyTask (uint32_t param) { osaeventflags_t ev; } while(1) { OSA_EventWait(mAppEvent, osaeventflagsall_c, FALSE, osawaitforever_c, &ev); if( ev && gsomeevent) { } break;... /* do stuff */ break;

Bare Metal vs. RTOS Most RTOS use pre-emptive task scheduling Nice for hard real-time requirements but: Relatively large overhead Context switches Deal with synchronization issues Bare Metal uses cooperative multi tasking Dependent on other tasks behaving nicely Can avoid most synchronization issues Faster execution 31

Firmware Tasks/components Framework Memory Manager MAC/PHY Serial Manager Timers LED driver FSCI Application 802.15.4 MAC extension layer Source/destination/PAN info ISA100/WirelessHART Extract link information Timeslots, channels Timeslot synchronization Channel hopping 32

How to synchronize? Both protocols support advertisement packets Broadcast by network manager Contains information about free join slots Timing information to synchronize on Hopping patterns are documented in protocol specifications 33

Channel selection WirelessHART ActiveChannel = (Channel_Offset + absolute slot number) % number of active channels Channel = ActiveChannelArray [ActiveChannel] ISA100 ActiveChannel = (absolute slot number ChBirth) % ChCycle ChBirth = Channel number assigned at t0 (International Atomic Time, TAI) ChCycle = Number of channels x channel rate 34

Channel hopping Scheduling ch:18 ch: 23 ch: 11 38 ms 48 ms 25 11 16 13 21 18 12 14 23 21 15 24 22 25 11 16 13 21 Time slots/channels 35

Demo 3: Sniffing with channel hopping 36

37

Unauthenticated attacks Signal jamming through continuous power emission Concurrent packet transmission Join slot jamming Selective jamming transmitter communication Transmitting fake advertisements 38

Demo 4: Advertisement jamming 39

40

Authenticated attacks Nonce exhaustion Both protocols use a semi-predictable nonce counter to feed the AES CCM* algorithm A device will reject a packet if a nonce value is lower than a previously received one Spoofing a packet with a maximum nonce value, causes legitimate packets to drop Sending spoofed measurements to influence the process 41

Conclusions Still a large unexplored attack surfaces due to complexity of the protocols The released tools and research will fill this gap and enable security researchers to move forward in the field of WISN research Using WISN technology for process control and especially functional safety applications is probably not a good idea, and should be reconsidered 42

Future research Expand tool with more theorized attacks Research forced rejoin triggers Mapping WISN locations (wardriving) Implementation specific vulnerabilities (transmitters, gateways) 43

Questions & thank you Our code is soon available at: https://github.com/nixu-corp Thanks to the following people for their help: Alexander Bolshev (@dark_k3y) Sake Blok (@SYNbit) 44