Breaking and Fixing Cri.cal Infrastructure. Jus.n Searle Managing Partner U.liSec

Similar documents
Dissec&ng Smart Meters

What can a small device do in modern industrial World.

Energy Assurance Plans

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM

Business Case Components

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar

Embedded/Connected Device Secure Coding. 4-Day Course Syllabus

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Why you should adopt the NIST Cybersecurity Framework

The Confluence of Physical and Cyber Security Management

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Trusted Platform Module explained

Hacking to Get Caught. (Updated) Thoughts About Adversary Replica?on and Penetra?on Tes?ng

Digital Circuits Part 2 - Communication

Surveying the Physical Landscape

Vendor Management: SSAE 18. Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner

Strengthening Cybersecurity Workforce Development December 2017

Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip

CipherChain Kit on SCSI-1 or PCI bracket

Critical Resilient Interdependent Infrastructure Systems and Processes

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

OpenWay by Itron Security Overview

ez430-chronos Wireless Watch Development Tool: Teardown & Getting Started

KillerBee: Practical ZigBee Exploitation Framework or "Wireless Hacking and the Kinetic World" Joshua Wright

MSP430F471xx MCUs offer high accuracy, simultaneous sampling and anti-tamper for three-phase e-metering applications

Application Note, V 1.1, Apr AP08006 C868. Interfacing SPI/I2C Serial EEPROM with C868 Microcontroller. Microcontrollers. Never stop thinking.

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

eip-10 Embedded TCP/IP 10-BaseT Network Module Features Description Applications

Critical Infrastructure Assessment

HARDSPLOIT. Framework for Hardware Security Audit a bridge between hardware & a software pentester

IBG Protection for Anti-Fuse OTP Memory Security Breaches

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On

Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology

ArduCAM CC3200 UNO board

18-642: Cryptography 11/15/ Philip Koopman

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

Provisioning secure Identity for Microcontroller based IoT Devices

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

EEPROM с двойным интерфейсом RF/serial. ноябрь 2011

ice40 UltraPlus Image Sensor Elliptical Crypto Engine (ECC) Demo - Radiant Software User Guide

Assessing Medical Device. Cyber Risks in a Healthcare. Environment

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

National Cyber Incident Response - Architectural Concepts

Contents. Main Memory Memory access time Memory cycle time. Types of Memory Unit RAM ROM

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

NUC505 ICP Programming Tool User Guide

Current Security Issue Demonstration Paper: Exploiting ZigBee Networks

Large-scale Testbed and Cyber Range Organiza6on and Design

1. IEEE and ZigBee working model.

The challenge with IoT

nblue TM BR-MUSB-LE4.0-S2A (CC2540)

New CC430 combines leading MCU and RF technology

Reindeer Technologies Pvt Ltd Excellence through Innovation

Energy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy. Simo Veikkolainen Nokia May 2014

This project has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No

Cipherchain-e kit with Single CipherChain-e

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

CRITICAL INFRASTRUCTURE AND KEY RESOURCES

ARM Security Solutions and Numonyx Authenticated Flash

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Connecting Securely to the Cloud

VA108x0 SPI memory boot options application note

Indriya_DP_03A14. Features. Block Diagram. XBEE based Wireless Sensor Network development platform

How Safe is Anti-Fuse Memory? IBG Protection for Anti-Fuse OTP Memory Security Breaches

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS

eh880 Secure Smart Card Terminal

AT90SO36 Summary Datasheet

Federal Information Processing Standard (FIPS) What is it? Why should you care?

Biometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing

Designing with STM32F2x & STM32F4

The Future of Smart Cards: Bigger, Faster and More Secure

Memory Expansion. Lecture Embedded Systems

HIDDEN SLIDE Summary These slides are meant to be used as is to give an upper level view of perfsonar for an audience that is not familiar with the

Cyber Security Capabilities

USB-to-I2C. Professional Hardware User s Manual.

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Critical Infrastructure Resilience

CSE 127: Computer Security Cryptography. Kirill Levchenko

Security in NFC Readers

Titan silicon root of trust for Google Cloud

Internet Of Things (IoT) fattore abilitante nella città del futuro XII GIORNATA DELLA RICERCA ANIE

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture

CCW Workshop Technical Session on Mobile Cloud Compu<ng

AT90SDC10X Summary Datasheet

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

Wireless Best Kept Secret For Now

Case studies from the real world: The importance of measurement and analysis in system building and design

Win-I2CUSB Hardware User s Manual

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

Raspberry Pi - I/O Interfaces

Building A Disaster Resilient Quebec

Timing Security: Mitigating Threats in a Changing Landscape Webinar

Transcription:

Breaking and Fixing Cri.cal Infrastructure Jus.n Searle Managing Partner U.liSec jus.n@u.lisec.com // @meeas 1

What is Cri.cal Infrastructure? Assets that are essen.al for the func.oning of a society and economy Food and Agriculture Banking and Finance Chemical Commercial Facili.es Communica.ons Cri.cal Manufacturing Dams Defense Industrial Base Emergency Services Energy Government Facili.es Healthcare and Public Health Informa.on Technology Na.onal Monuments and Icons Nuclear Reactors, Materials and Waste Postal and Shipping Transporta.on Systems Water 2

Tradi.onal Security Models BSIMM OpenSAMM 3

What Does These Mean? BSIMM OpenSAMM 4

Breaking In Before ASackers Do Penetra.on tes.ng is the MOST underu.lized process in these models by most companies across the world! Most money and.me is spent on governance, awareness, architecture, and defense Most companies may check to see if there their front door is locked, but rarely check to see if they have more than one door, or where those extra doors lead... And companies are always surprised when they are compromised... Con.nuous, agile penetra.on tes.ng helps to address this This should go far beyond vulnerability scanning, include exploita.on Hire or train at least one competent employee Set this as their sole priority, tes.ng both the outside perimeter and inside network segments, with targets changing at least weekly Have them find and follow the paths of least resistance like asackers do Hand off vulnerability remedia.on and tracking to a different individual 5

Cri.cal Infrastructure Control Controlled Field Device Controlling Servers Intermediate Network Devices Controlled Field Device Controlled Field Device ASacker Controlled Field Device 6

Penetra.on Tes.ng Methodology Green: Tasks most frequently and require the most basic of penetra.on tes.ng skill Yellow: Tasks commonly performed and require moderate penetra.on tes.ng skill Orange: Tasks that are occasionally performed but require higher levels of exper.se Red: Tasks performed infrequently and require highly specialized skills 7

Can ASackers Reach Field Assets? Many field deployed Critical Infrastructure devices have tamper detection and tamper protection mechanisms Locked cases and enclosures usually trivial to pick Tilt and vibration detection components can often be disabled before triggering once you locate them Cameras often not monitored long response times if they trigger 8

What To Do With Field Devices? ASacking data at rest Power down the device, expose its circuit board, and interact directly with each component Extract contents of accessible RAM, Flash, and EEPROM Iden.fy cryptography keys or firmware ASacking data in mo.on Boot and normally operate the device in a lab, monitoring bus ac.vity between major chips (MCU, Radio, Flash, RAM) Crypto keys can o^en be found in key load opera.ons between a microcontroller and crypto accelerator Firmware can o^en be found in boot processes (between Flash and MCU) and firmware updates (between Radio, MCU, and Flash) 9

Embedded Device Pentest Tasks! 10!

Embedded Field Device Disassembled 1. 240v Connec.ons 2. Microcontroller (Teridian 71M6531F SOC) 3. Dual Opera.onal Amplifier (LM2904) 4. ISM Band RF Amplifier (RFMD RF2172) 5. ISM Band RF (TI CC1110F32) Source - http://www.edn.com/design/power-management/ 4368353/What-s-inside-a-smart-meter-iFixit-tears-it-down 11

Embedded Device Tes.ng 12

Bus Pirate to EEPROMs CAT25080 SPI 24LC088 I2C CS 1 8 V CC A0 1 8 VCC SO 2 7 HOLD A1 2 7 WP WP 3 6 SCK A2 3 6 SCL V SS 4 5 SI VSS 4 5 SDA 13

I2C Protocol I2C Write Command: 0x A 0 0x 0 0 0x 0 0 0x B E Chip Address 0 0 0 0 Memory Location Data to Write Memory Block Write = 0 Read = 1 Set Address to Read 0x A 0 0x 0 0 0x 0 0 I2C Write Command: 0x A 1 r r r r r r Chip Address 0 0 0 0 Each "r" = read 1 byte Not Used Memory Bank Write = 0 Read = 1 14

Dumping EEPROMs and Flash 15

Task: Bus Snooping Data in Mo.on 16

Using Entropy to Find Keys Asymmetric keys have high entropy (very random) RAM and Flash is filled with non- random data Graphing entropy of flash reveals a spike in randomness This spike is the loca.on of the asymmetric key in flash 17

Systema.c Crypto Key Search Perform basic string searches for obvious keys Develop custom tools to do more advanced searches: GoodFET: Abuses vulnerability in TI, Ember radios to access RAM even when chip is locked zbgoodfind: Search for ZigBee key using RAM dump as a list of poten.al keys Combined they can recover the ZigBee network key $ sudo goodfet.cc dumpdata memdump.hex Target identifies as CC2430/r04. Dumping data from e000 to ffff as chipcon-2430-mem.hex.... $ objcopy -I ihex -O binary memdump.hex memdump.bin $ zbgoodfind -R 802154_encr_sample.dcf -f memdump.bin zbgoodfind: searching the contents of 802154_encr_sample.dcf for encryption keys with the first encrypted packet in memdump.bin. Key found after 6264 guesses: c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf 18

Termineter & John Commor Open a terminal to the "john_commor_c1218" folder and start the serial emula.on script sudo./pts_ports.sh! Open a new terminal and start the virtual smart meter replacing the "???" with the port numbers displayed on the last command sudo python john_commor_c1218.py -e??? -t???! Open a new terminal and use Termineter to read the first c12.22 table on the meter. Replace the "???" with the port you typed a^er the "- t" in the previous command sudo./termineter2.py! set connection /dev/pts/???! connect! use read_table! set tableid 1! run! Now use Termineter to read tables 2 and 3 19

Decompiled Code 20

Task: Cryptographic Analysis 21

Insecure Block Cipher Modes AES ciphers using CTR mode effec.vely become a stream cipher Without key deriva.on and rota.on, IV collisions compromise integrity of cipher The following example show a failure to use new IV C:\>type ivcoltest.py #!/usr/bin/env python knownplain = "\xaa\xaa\x03\x00\x00\x00\x08\x00\x45\x00\x01\x48\x00\x01\x00\x00" knowncip = "\x31\xb9\x84\x81\xe1\x96\x6e\x71\xd8\xa3\x39\x0c\xfb\x48\xaa\x61" unknowncip = "\x31\xb9\x84\x81\xe1\x96\x6e\x71\xd8\xa3\x3d\x0c\xfb\xb5\xaa\x61" print "Decrypted packet: " for i in range(0,len(knownplain)): print "%02x"%( (ord(knownplain[i]) ^ ord(knowncip[i])) ^ ord(unknowncip[i]) ), print("\n") C:\>python ivcoltest.py Decrypted packet: aa aa 03 00 00 00 08 00 45 00 05 48 00 fc 00 00 22

Conclusion Cri.cal Infrastructure needs more tes.ng! Tes.ng needs to be constant and remain agile Tes.ng needs to go deeper and include field controlled assets Research is needed in all major areas of security. Apply your talents and find your niche! Pentes.ng methodology for energy sector is publically available Download it at hsp://www.smartgrid.epri.com/nescor.aspx Provides a detailed methodology for performing penetra.on tests from controlling servers all the way to the controlled embedded field devices Methodology is directly applicable for any cri.cal infrastructure organiza.on and the systems they use to control cri.cal assets Black Hat's Pentes&ng Smart Grid and SCADA course based on this methodology Other Energy sector specific documents that may help NIST: hsp://csrc.nist.gov/publica.ons/pubsnistirs.html#nist- IR- 7628 ASAP- SG: hsp://www.smartgridipedia.org/index.php/asap- SG 23

Contact Informa.on www.u.lisec.com sales@u.lisec.com Jus.n Searle personal: jus.n@meeas.com work: jus.n@u.lisec.com cell: 801-784- 2052 twiser: @meeas 24