Conf42 DevSecOps 2023 - Online

Hacking Demos, Dirty Secrets, Dangerous Lies, and Asset Intelligence

Video size:

Abstract

I’ll demonstrate an industrial robot hack & hacks against traditional IT & cloud assets. Stories from the trenches—secrets & lies involving cybercriminals, nation-state actors & defenders—will be shared. Methods for weaponizing asset intelligence for staying “left of boom” will be detailed.

Summary

  • Brian Kantos: Today we're talking about asset intelligence, dirty secrets, dangerous lies, and some hacking demos. He says think about it in four dimensions: length, breadth, height and time. Any type of asset type can fall into that category.
  • For the sake of this presentation, we're primarily going to be focusing on XioT, or extended Internet of things. There's almost 5 million Internet accessible cameras, almost 14,000 UPS systems. You can't run endpoint security on these guys.
  • About 50% of all the passwords on XioT devices are default. End of life firmware kicks in at about 25%. The remaining 74% of devices are about six years old. Devices can be exploited remotely with little to no effort to gain full administrative access.
  • There's actually a really interesting attack that came out last year called RSOCs. It was interesting because they weren't actually looking at traditional XioT. They were primarily focused on OT. These attacks still happen, but it's definitely not the big, interesting piece of Xiot attacks.
  • The line between nation states and cybercriminals is often blurred. These tools are commonly used for those physical type attacks. Another type of attack are OEm attacks. These are attacks that it's not malware, they just ship maliciously out of the box.
  • A popular example of this is called Quiet Exit. This is gaining access to your environment via one mechanism and then using Xiot on the backend. Most cases, though, people didn't even realize that they had been compromised. There is a threat window of 18 to 24 months before CSO's figure out that this is happening.
  • Kali Linux is a great platform to use for exploitation of security cameras. There are about three and a half million of these cameras worldwide. We can download files directly to the camera. And we can do anything from crypto mining to password crackers.
  • The next one and last one I want to show you is hacking industrial robots. If you can get access to these devices, you can actually steal the intellectual property. What can we learn by logging into a web server running on a robot with absolutely no security?
  • Fenuc robots often ship with no security controls, no authentication. It's very easy to get that intellectual property and with very basic skills. You want to make sure that if you're making a modification, you add it to the default program.
  • There's solutions out there today called asset intelligence platforms. They feed into your vulnerability management solutions. If you'd like to try out one of these solutions for free, you can poc the whole thing in 60 minutes.
  • Hacking in the XioT world isn't that complicated, just some very basic steps and maneuvering. All Linux servers are not managed, they typically don't have good passwords, and they're typically running old firmware. I hope you enjoyed the presentation. See you next time.

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hey, everybody, I'm Brian Kantos. I'm the chief strategy officer with Sevco security. And today we're talking about asset intelligence, dirty secrets, dangerous lies, and everyone's favorite, some hacking demos. So let's just jump right in. So I just want to give a little bit of a primer on asset intelligence, because that term is loaded. It means a lot of different things to a lot of different people. So when I talk about it, I'm really thinking about it in four dimensions. So the first one is length. These are your asset types. So this can be anything from an application, a vulnerability, a user, a physical device, a virtual machine. These can be Xiot devices, wireless access points, security cameras, voiceover, IP phones. So asset types, think of that as the length. Then we talk about breadth. These are the locations. So these devices can be on prem, they can be in the cloud, they can be at a remote location, they can be someone's laptop at a Starbucks, then height. This is where it gets really interesting. These are your asset details. And the best way to think about that is to bifurcate it into presence and state. So, for example, I might have a laptop, and on that laptop I have Crowdstrike, and maybe I have automox, Crowdstrike for EDR, automox for patch management. So that's presence. I know that those devices are there or those solutions are there, but then it comes down to state, well, is Crowdstrike two versions too old? Is it n minus two? Has it not communicated with the management console in over six months? Or maybe Automox is working, but it has an old configuration that's not the accepted configuration. So again, it's the state of those solutions, not just the present. And again, across applications and devices and users, and the final one is time. Certainly when I'm thinking about assets, I need to know real time information. So, for example, Bob is logged into ten one one. That particular machine has these particular applications, and those applications have these vulnerabilities. That's great. I would need that real time information, but I also need to know the historical data. Well, who is logged on to ten one one last week or last month or last quarter? Right. Pulling that information together so I can correlate it. So when I mentioned assetintelligence as part of this presentation, those are those four dimensions that I'm actually pointing at. And again, just remember, it's really any type of asset type can fall into that category. So let's jump into the dirty secrets. So, as I mentioned previously, the asset types can be any number of things. Well, for the sake of this presentation, we're primarily going to be focusing on XioT, or extended Internet of things. Now, there's really a few things that make up what I call XioT. The first one is this is purpose built firmware and hardware. So, for example, a printer isn't usually a camera, isn't usually an uninterrupted power supply, isn't usually a door controller. So they have a specific purpose. And the OT side of things, those can be very specific. It's digital assets controlling physics. Things like pressure, flow, temperature, volume. The next thing is they're network connected. Almost always. Not 100% of the time. And there's some legacy monolithic ScaDA devices that are not network connected, but most of them, even the old stuff today, has been retrofitted. It's actually hyperconnected. It's got Modbus and DNP three and TCP IP and serial over Ethernet and Bluetooth, and who knows what else are connected to those things. So now we're connected. So purpose built firmware hardware that's nowhere connected. The last item, perhaps the most important for today's discussion is you can't run endpoint security on these guys. So you're not putting an EDR, you're not putting patch management, you're not putting segmentation, you're not putting a local firewall or ips. The list goes on and on. Things that we consider pretty standard on the IT side of the house. You can, in many cases, manage the passwords. You can make sure they're being rotated every 90 days. Follow best practices. Uppercase, lowercase, special characters, numbers. You can even harden them by shutting off certain capabilities. Maybe I don't need wireless. I just want wired. Maybe I don't need Bluetooth or Bluetooth, low energy ble. So I can shut that off. Things like that, you can make them harder in many cases. So that's what Xiot is in the grand scheme of asset intelligence. So, I'd like to throw this up here just because most people watching are probably pretty familiar with Shodan. And I did a very non scientific study on Shodan. I just pulled up Shodan. I typed in camera, voiceover, IP, printer, and ups, and what I found was pretty interesting. And these again, those of you who aren't familiar with Shodan, it's devices that are Internet accessible, that fall into certain categories and characteristics or regions, however you break it up. Well, if we look at camera, there's almost 5 million Internet accessible. That's important to note, because interestingly enough, most Xiot attacks aren't predicated on being Internet accessible. We'll get more to that in a minute. But almost 5 million of these cameras are voiceover ip phones. A little over a quarter million printers, little under 100,000. I was really surprised at this one ups. I thought this number would be really low, like almost 14,000. What's the business case for having an uninterrupted power supply connected directly to the Internet, that somebody could log in and get access to that. Now, what's scary about UPS systems is there's only a few flavors of them that are out there. And usually people buy them because they have something pretty important plugged into them. One of the most common ups is APC. And I said, well, what's the default password for APC UPS CSO? I use this hacking tool called Google Search. And I said, oh, the default username for APC ups is APC lowercase. And the default password is APC lowercase. That's it. Now, I'll tell you this, out of those almost 14,000 ups systems, again, some of them are honey pots or whatever, but let's just say even there's 10,000, the majority of those are going to be APC. And we have a little joke in our company. If we ever find an APC ups system that does not have the default APC APC, everybody in the company gets a steak dinner. Well, we've all been eating a lot of chicken because it's always APC APC. So that's pretty scary. What we find is there's about three to five XioT devices per employee. So if you have a company of about 10,000 people, you probably have somewhere between 30 to 50,000 XioT devices. And in most cases, when you go into an organization, you say, how many XioT devices do you think we have? They're almost always off by about 50%. So if they say, brian, I think we have 15,000, I'm okay. You should probably have 30,000 because they go, oh, we forgot about lights out management. Oh, you're counting the voiceover IP phones. Oh, the digital door locks. There's a lot of o. But at the end of the day, these are just little Linux servers. They're usually Ubuntu busybox. Sometimes they're Android network devices, a little bit of BSD. Everything else is like Android, Linux. Android, of course, is a derivative of Linux. But busybox, Ubuntu, things like that. So all that to say this, they're pretty common operating systems. So you've got all these Linux devices running around, you don't even know how many you have, and chances are they're running some kind of default username and password. So that's kind of a bad situation. Last statistics page. What we find is about 50% of all the passwords on XioT devices are default. And the passwords that were changed, most commonly they were just changed once. And that's because it was forced at the time of installation. We've all been there. Okay, set it up. You got to change the default password. It can't be password anymore. So now it's password one password, exclamation point, something like that. So think about that in terms of those stats. 10,000 people, 50,000 devices, I've got 25,000 Linux servers all running the default password. And if that's not scary enough, and somehow the passwords were changed and are changed on that regular cadence, end of life firmware kicks in at about 25%. So 26% of devices that we find have an end of life firmware in the XioT world. The remaining 74%, the average age is about six years old. You've all got a smartphone in your hand. Probably most of you are looking at it right now. Could you imagine it operating if the OS was six years old or the apps were six years old? It probably wouldn't even run. And what comes with the old firmware vulnerabilities? If we just look at the CVSS scores, 50% of these devices have level eight, but almost 70% have eight, nine and ten. And I know I'm preaching to the choir, but once you get to that level, you're talking about devices that can be exploited remotely with little to no effort to gain full administrative access. So if I can't get in through the default password, chances are I can probably get in through other means. So now let's talk about the dangerous lies. When most people think about XioT attacks, they think of, I'm going to compromise a device, a group of devices, add them to my botnet. Well, those are legacy attacks, and those still happen. A lot of folks have heard about Marai. Marai was like the grandfather of XioT attacks where cameras were compromised and they were added to a botnet. Well, those things still happen today. There's actually a really interesting attack that came out last year called RSOCs. It was part of a takedown, in fact. And in this case it was interesting because they weren't actually looking at traditional XioT. The phones, the printers, the cameras, they were primarily focused on OT, and while they did go after some network devices and they did go after some enterprise XIot, it was primarily OT by a rate of about 80%. And these are things like PLCs. They run real time operating systems like Vxworks, and they weren't attacking these OT systems in these critical infrastructure environments to blow up a pipeline or shut down a power grid. They're simply adding them to their botnet. And they were using this botnet to take down systems, as botnets do. And they were actually so successful at creating this massive botnet, this global botnet, it was run out of Russia, but creating this botnet that they were renting it out. So I think it was for like $25 a day, us dollars, you could rent out this botnet and you could do botnet stuff, DDoS attacks, phishing, malware distribution, black hat, search engine optimization, all the things that you'd like to do with the botnet. But if you pay like $50, you actually get all that, plus you get 24 x seven online support. So, hey, I'm not really sure how to do this. Okay, we'll give you a hand. So they really did turn it into sort of an attack as a service in this means, and it was highly, highly successful, and it was eventually taken down by various government agencies working collaboratively. But why I'd like to bring this example up is it is it's that legacy? Hey, you've got a device. I'm just going to add it to a botnet. These attacks still happen, but it's definitely not the sort of the big, interesting piece of Xiot attacks. So now let's look at physical attacks. These are things like, I'm going to use your camera to spy on you, and I'm going to spy on you through audio and video. I'm going to unlock doors. I'm going to shut down power systems. These are often tied to nation states, but as we know, the line between nation states and cybercriminals is often blurred. Right? So I'm a nation state hacks by day, but I might be a cybercriminal at night. And a great example of this was frontin. So frontin was an XioT hacking tool designed by contractors for the Russian FSB. Very, very powerful tool. I'm going to find XioT devices, I'm going to take control of those XioT devices, and then I'm going to allow you to have CNC command and control of those devices to do whatever type of activities you want. Well, unfortunately for the russian FSB, the digital revolution hacking group got wind of this tool, stole it, and then released it. And not that any of you would, but if you go onto maybe some of your favorite torrents, you can probably find fronten on those torrents. Now, if you can read Russian or you know how to use Google Russian to English translate, you too can have a nation state military grade xiot hacking tool as well. And again, these tools are commonly used for those physical type attacks that we were talking about before, but they're certainly not limited to that. Another type of attack are OEm attacks. Now, these are attacks that it's not malware, they just ship maliciously out of the box. CSO, I'm talking about products like Huawei, ZTE, Hickvision, and there's several others. But these, in fact, are cameras. In most cases, they're cameras that came out of China. In most cases that if they're recording audio and video and you say, hey, stop recording audio and video, it turns the green light to red. But guess what? It's still recording audio. It's still recording video. Even worse, it's streaming that information. Now, a lot of security cameras are in very sensitive locations, as you can imagine. They're in military locations, they're industrial manufacturing, they're in healthcare, they're in pharmaceutical, they're in conference rooms. And all these other locations around CSO, if you have this massive stream of data, chances are you're probably going to find something sensitive somewhere. Now, for a while, we've known about this in a while, I'll say a few years. And it was policy within the US government that us government agencies and contractors were told not to use these cameras, that they're naughty cameras, don't install them. Well, in 2022, November of 2022, it's now illegal to import or sell these cameras within the United States. So most people, when that happened, went out on eBay and grabbed up as many as they could for their hacking labs. But the fact is that these cameras, while illegal to sell and use with the United States, are everywhere. In fact, I was at a conference in Dubai called Jitech. Great conference. It's kind of like ten black hats all glued together mixed with, like, RSA. So it's a huge, huge conference, like 150,000 plus people. Anyhow, one of the biggest sponsors there was Hickvision. I mean, you actually physically had to walk through their inflatable sign to get into the event. And just because they're still used worldwide, they're still very, very common. And the last type of attack that I want to talk about are pivot attacks. This is gaining access to your environment via one mechanism and then using Xiot on the backend. And a popular example of this is called Quiet Exit. This was actually an attack that was discovered by Mandian about a year and a half ago, maybe a little bit more than a year and a half, and pretty straightforward if you think about it. So what's one of the best ways to get into our organization? A phishing attack. So either through social media or some type of messaging app or an email, they get somebody to click, and we all know it works. So you basically just get this out to as many people you can in the organization. Someone, sometime, somewhere is going to click on it and get infected. Well, let's say their laptop gets infected. Well, the bad guys are like, well, hey, you've got network security and data secrets and application security and segmentation and this and that. I don't want to hang out here. I want to maintain persistence and I also want to evade detection. So what they do? Well, as soon as they got on, on that laptop and they had control, they started looking for XioT devices. In this particular case, in the case of quiet exit, they were looking for a lot of network based devices, which we talked about before, are things that are running BSD, wireless access points, load balancers, switches, network attached storage. Right? We've all got these all over our environments. Well, in addition to that, they also added some XioT stuff, traditional stuff, the voiceover, IP phones, the security cameras, the printers, things of that nature. And once they found these devices, they had their own version of Dropbear SSH, which as most of you know, is a client server software that you can use to have command and control and can do reverse tunnels. Okay, so that's pretty interesting. So they actually built this variant of dropbear SsH to run on these Linux, Android and BSD frameworks that they installed. So, okay, I got in through a laptop. I'm going to look for a vulnerable Xiot device that I know probably most people aren't managing. And I'm going to install there and I'm going to install there easily because the password is probably the default password and God forbid somebody changed it. I know you haven't updated the firmware, it's not patch. So I'm just going to find one of the level eight, nine or ten vulnerabilities of the 50 that that device is probably running and has been running for the last decade. Okay, so it's easy to get onto these devices, but the other thing is remember back to our statistic earlier, three to five devices per employee. If I'm on a laptop and I get on a network attached storage device and I get on a camera, am I just going to stop at those two devices? If it's an organization I really care about and I truly want to maintain persistence, why install in two if I can install in 200 or 2000 or 20,000? So now they're installed on all these devices, a plethora, throughout the entire environment. They get to the next phase of the attack, which is very simple. They're making API calls to on Prem, in this case, a quiet exit to office 365 and local exchange. So in the cloud and on prem mail, and they're pulling down all the information. They're mostly targeting biz dev people, people in finance and organizations that might have to do with M and A. And they're also watching the security team messages as well, to see if anyone's getting any wind of what they're doing. And they exfiltrated this data out. So, pretty straightforward attack. A little bit novel in the approach that they used with the XioT devices, at least Historically. Novel, not novel anymore. In most cases, though, people didn't even realize that they had been compromised. So there was a threat window of 18 to 24 months, CSO, 18 to 24 months, let's say two years before you figure out that this is even happening. Now you have to go back and clean up the mess on 20,000 Xiot devices that you didn't even know you had to begin with. Now you got to figure out who's managing it, what kind of security? Can we update these things? How do we do it? Is it one at a time? It's a real mess. And honestly, it's like the end of Spiderman, the Spiderverse. Everyone's pointing at each other. It's like, who runs this? Who's responsible security? No, it's network operations, not us. It's physical security. They've got it. No, we outsource that. It's a cluster and the bad guys know it, which is why they're targeting it, which is why attacks like Quietexit are so successful. Quite honestly, pretty darn scary. So let's get into some examples of this. I've got two really fun examples just to show you. One on the OT side, because I don't think a lot of people get exposure to see how that works, and one that is on the traditional Xiot side. So for the Xiot, we're just going to take a look at a security camera, everyone's got them, they're all over the place and honestly they're quite easy to compromise. And let's see how we're going to do it. So this is just Kali Linux, nothing too fancy. Most of you are familiar with this, a great platform to use for exploitation. And I'm going to log into a camera. This part, there's no hacking being done. I'm just going to show you what this camera is. I'm going to log in as an admin, type in my password, and as we log in you can do the typical things that you'd expect to be able to do if you logged into the camera. Well the first thing that we can do that's pretty straightforward is see what the camera sees. Well this camera is looking at another camera, a hick vision camera sitting on a switch. So that's super interesting, but we can also look at the configuration and we can see the network configuration. We've got the IP address, a default gateway, all the typical things that we'd want to see with a camera. So again, nothing fancy. Just wanted to show you that we've got a camera running in our environment. We're going to connect it with Kali. So I'm going to run showdown just to do a little query here and I'm going to see how many of these particular cameras. I'm going to put the last string at the end of the URL in that search. It goes oh, okay, so there's about three and a half million of these cameras worldwide. If we just look in the US, we find out there's a little under a half a million. So this particular camera type that we're looking at right now at the point I did this example, about a half a million that are Internet accessible. Well based on that camera type I'm going to go to exploit database and you could go to whatever your flavor that you like for your databases. You can go on the dark web and buy attacks, whatever, this is free, it's publicly accessible. So exploit DB, I say, okay, this is the camera I have. Let me look up the CVE. Here's the attack. This is great. It's a command injection attack. I can go ahead and grab that and modify it or I can just go ahead and download it directly. So I found out what the camera is. I download the exploit, I'm going to create Operation Hickvision. I'm going to run the python script with check and it says sure enough, this camera is vulnerable to this exploit. Fantastic. Now I'm going to change this python script from check to shell and boom, I'm in full administrative access. I see that it's running busybox. It was that simple. And now I'm even deeper than had I been if I logged in via the GUI, right? Because I'm underneath the GUi interface, I'm able to do everything as root on the system. So now I'm just listing some files. I see that I created a file. So I'm on this busy box. I created a file, or a folder rather, called bad. Okay, that's interesting. So what else can we do? Let's just clear this up a little bit. We'll re access it a couple of times just to make this screen easy to read. So what else can we do here? Let's first go to bad. So we'll go to this directory. Now I'm going to run TFTP. I'm going to do a remote get of a file called do bad off my Kali Linux system, right? So now I'm saying, hey, I'm running a TFTP server on Kali Linux. I'm going to run TFTP from the camera to Kali Linux on the default port 69 to get the file called do bad. So can I download files directly to the camera? Sure enough, there it is. I do a listing. There's do bad. I'm going to make it so everybody can read, write, execute that file. There it is, do bad. And let's see what do bad is. So essentially we went through this to download what, a shrek video? Because science, why not? And we could download scanners, password crackers, we cloud download things to do crypto mining, which is very common on cameras. Again, just a little Linux server. Okay, so we're able to upload files. What else can we do? So I'm going to go in the config file of this camera and see if I can find anything interesting. Well, here's serversert pem, as most of you know, these are tied to your certificates that you're using. So I'm going to use SCp now. So ssh port 22, so secure copy protocol. I'm going to grab all the PEM files. I'm going to exfiltrate that again to my Kali Linux server. The same system that was running TFTp is also running ssh. So I'm going to ssh and I'm going to basically grab those two files. Now I could have downloaded tools that were going to enumerate the network and grab other people's files and then take those files down. Compress them and expel. It would take too long, but you get the picture. And now I was able to grab files off the camera and bring them onto my Kali Linux system. It was that simple. So hacking. So pretty much we found out that the camera was what kind of camera it was. We went on exploit DB, one of lots of places to grab exploits. We downloaded it. We didn't even use metasploit. We just executed the Python script, which gave us full access to the system by exploiting that vulnerability. In this case, I think it was a level nine vulnerability, but it exploits that vulnerability, and now we've got direct access, upload files, download files, change configurations. If we wanted to, we can spy on people through the camera, et cetera, et cetera. So very, very straightforward attack. The next one and last one I want to show you is hacking industrial robots. And this one's a lot of fun. And one thing I'll mention, too, about any type of OT ScADA critical infrastructure device, however you'd like to categorize it, yes, you can do malicious things to the device. That's certainly one type of attack. But the intellectual property that organizations have in terms of how I make a certain pharmaceutical drug, what temperature and how much ultraviolet light and how much I stir for how long, at what speed, that IP isn't kept in some file system or some database. It's stored within those devices, whether it's batch manufacturing, discrete manufacturing, whatever it is, how I make Volvo's or how I make a painkiller that's kept on these devices. So if you can get access to these devices, you can actually steal the intellectual property. So this is a Fanook robot. These robots are really common. You see them in pretty much every single industry, and they're really fun to play with. So we bought a brand new Fanook, shipped in a crate that we actually ended up mounting the robot to that we did not do a very good job covering it up with these blankets. And we did the latest, greatest software, the firmware, all the latest patches, as vanilla as it could be. We wanted to be on the latest version, but with no modifications, just kind of how you'd get it out of the box. So these boxes are pretty cool. So here's a little bit of hacking on this Fanook. Now that you can control these guys a few ways, of course. Here's our remote control. And being the people we are, we said, well, let's just write some logic that will actually have this robot touch the top of a coke can very gently, because it'd be easy to do other things. We said, can we be gentle with it? Can we just touch the top of the coke can and come down again? I can use that using the physical remote control that's actually physically wired to the fanook. And you'll hear it pronounced Fanuc and Fanook. It's used interchangeably. So that's one way I can control it with this and program it. The other way is plc. So up here on this rack we've got a Rockwell and a Siemens. I can actually use that to control it. The third way is it's connected to the network, so I can ping it. I can ping my robot. If I can ping it, what else can I do? Okay, this is on the network again, this is an out of the box installation. So let me just put its ip address in a browser and see what happens. Boom, it's running a little web server from 1993, but it's a little web server. It's not the prettiest interface, but hey, it works for what it's doing. Okay, what can we learn by logging into the web server running on this robot with absolutely no security? Right? There was no authentication, nothing was done. Here we see the version. Okay, this was installed in January 2023. We see some of the configuration specs. Okay, that's interesting. That's valuable information to know for sure. Oh, active programs. Let's look at those active programs. Okay. It's in binary and ASCII. Well, I don't want to look at the binary. Show me canls. There's that ip we just talked about. So that program where the robot arm came down, just tapped the top of the can. There it is. We're going to play with this one a little bit later. So we can actually see the IP, the program that this robot was running. So that's not great right off the bat that we can get on with no access control at all. Now, that pendant that we are holding in our hand, that physical controller, there's a virtual version, the I pendant, right? So it's just like you're holding it, but we can do it virtually. So let's look at some of the settings here. Well, the first thing we see is, okay, it's got some TCP IP information. Great, we're already connected. We got that. But it's running FTP. Okay, anonymous FTP. Yikes. That can't be right, can it? So let's find out. Let's publicly google it and find out what Fanuk says about FTP. I love this line here. If you see an anonymous username. You may be able to connect through FTP without. Huh, you don't say. Interesting. Well, let's see what we can do. So let's go ahead and try to FTP to this IP address. And it must be a typo. There's no way this would be anonymous access right out of the box. And I'd be like, oh my God, I can. So now I can FTP to this device. Well, there's probably not much we can do. Let's see if we can do a directory listing. And within these guys, it's all flat. There's no folders, there's no hierarchy. So it's a big flat file system of all the files. Remember that can ls file we looked at before where we showed the intellectual property? Well, there it is. So we can see that file there. Okay, Brian, big deal. You can FTP, but there's no way you can get a file, right? You're not going to be able to download it. Oh my God, we did. So it's actually able to download that can ls file the IP. So I got it off the device again. Now it's on my laptop. I've got a little windows laptop here. I use my hacker tool notepad and I open it up. There's the program called can. I'm going to change the name to can crush and I'm going to change one variable here from a two to a three from 205 on the z axis. It's the only change I made besides changing the program name. Now I'm going to save this and I have to change it to ls because that's the extension that expects to see. So I'm going to do cancrush ls save again. I'm just doing this on my windows machine. This isn't on the robot yet. Okay, so we know we could FTP in, we could download a file, but there's no way we're going to be able to upload a file via anonymous ft. Oh my God, we can. So there it is. So we actually uploaded the file. And here's all the ls files. And there's canls, the original, and then there's cancrush, the naughty, naughty one we made. We modified the z axis. Okay, so we know we can get access via FTP. We know we can download files. We know we can modify those files and we know we can upload them. And here it is. Here's the cancrush ls file in ASCII that we wanted to take a look at. We see where it was modified and there's that z axis. So we changed it to 305 instead of 205. So pretty cool. But there's a couple of things we need to do because these robots are rebooted pretty frequently to clear the cache. When I say frequently, every couple of weeks and they reboot really fast, it usually takes like 10 seconds or less. But I want to find the default program to make sure that every time it reboots it uses it. So even if you don't know what it's called, you can probably guess. Default prog is the default program. We're going to change it from can to can crush now. You can reboot this thing all day, all night. It's always going to come up with can crush now because that's a default program. And again, they're rebooted a lot. So you want to make sure that if you're making a modification, you add it to the default program. Let's focus on what a reboot looks like, just so you can see it. There's lots of blinky lights. There's an Alan Bradley behind it as well, which is another PlC. But here we go. That's a very quick reboot. It doesn't say, hey, you just loaded a new naughty naughty file. So now we're expecting our robot to continue to do what it was doing, which is just do a nice little, nice little tap on top of that coke can and nothing worse. Oh my gosh. So it's actually running the can crush file. We had a little fun shooting this from different angles. And then we actually made the robot dance, which was pretty fun. And we made it do push ups, which isn't in the video, but was a lot of fun. So again, the fact that one there was no authentication turned on by default, that's an issue. And it's not to go after these guys at fenuc. This is the case across these ot devices. It's all about capital a. When you think about CIA confidentiality, integrity, availability, it's all about availability. So they often ship with no security controls, no authentication. The problem is they're plugged into the network, they're running web servers, they're running FTP servers, they've got email, they've got all these other things enabled in them. So it's very easy to get that intellectual property and with very basic skills. None of us were experts in this robot at all. We kind of just found out how to do these things through the online documentation. Oh, what file does it read? What format can we modify that in notepad and update it. Okay. If we put it in the default program when we reboot, will it really stay there or. There are eight other switches we have to hit. Pretty straightforward. Didn't take a ton of expertise, but very valuable. And this one was quite obvious, right? It went from touching a can to crushing a can, someone's going to notice that. But think if someone's manufacturing a car, for example, and a gear was supposed to be four and a half millimeters thick, but they made it 4.52 mm thick, well, it's probably going to pass QA, it's probably going to work. It's probably going to work for the first couple of months or even a couple of quarters, but eventually it's going to create so much friction, something's going to break, something's going to snap, it's going to cause a problem depending on where it is in the vehicle. And now you have a whole supply chain issue of devices that you've released that's a car. What if it's a tank? Or what if it's something else? So they can be very sensitive, in addition to the fact that we could download that intellectual property and steal it and leverage it. So I never like to just show the offensive side with that just a little bit. On remediation, I talked about asset intelligence at the very beginning and the four dimensions of Asset intel. And there's solutions out there today called asset intelligence platforms. And whether you've got robots, or you've got endpoint security devices, and it's installed on laptops, or you've got cloud, or you've got identities or vulnerability information, you've got all these sources of asset information, and they go through these different silos to your vulnerability management solutions, like tenable cloud infrastructure, like Google Cloud, IoT, OT, like phosphorus, or endpoint, like CrowdStrike, and they feed into these, these asset intelligent platforms that they're cloud native, they're agentless, they're very easy to work with, they'll make API calls to these different management consoles. So you kind of get the state of, the state of all your assets, including all those Xiot assets. Right. The focus of today's presentation was Xiot, but this expands to all of your asset types. Xiot is just fun to hack. So now you can have a platform that looks at all your asset intelligence, a lot like SIM looks at log data and event information correlates, that lets you analyze it, lets you sort things to say, again, presence and state. Hey, CrowdStrike is installed on 500 devices, but according to what I have in Microsoft active directory, I've got 600 devices that can be and should be running Crowdstrike. So I've got a gap of 100 and I see that they're not running malware bytes or my secondary EDR. So these are the devices that I need to get on top of, because CrowdStrike knows about CrowdStrike. Tenable knows about tenable, phosphorus knows about phosphorus. But if you have a platform that can understand what they all know, you start to find the gaps. Further than that, they feed to make other tools better. So they have API Bi directional integration with solutions like CMDBs, ticketing systems, SIm soar so from remediation with cortex or splunk or Servicenow or Arcsight. Whatever tools you happen to be using, it's feeding them with the best possible data so those tools can be as accurate as they are. That's my whole sales pitch on that. I just want to make sure people are aware that there are solutions like this out there that can actually get in front of these types of attacks. And if you'd like to try out one of these solutions for free, you can poc the whole thing in 60 minutes or less. Less time than it took you to listen to me yap on. In these presentation you can get like three sources, one person for a point of contact in 1 hour. You can actually try this stuff out. If you like it, you can say hey, beyond devices, I want to add identities and apps now. I want to integrate with CMDB. You can certainly do that if you decide to move forward. But if you want to kick the tires in something again, it's free, because most people aren't familiar with these platforms. Here's a QR code, here's a URL, go check it out. So with that, thank you so much. I hope you enjoyed the presentation. I hope you enjoyed the hacking demos. As you can see, hacking in the XioT world isn't that complicated, just some very basic steps and maneuvering, especially if the already are discoverable on something like exploit DB where you can just grab those and use that Python script, or use Metasploit if you want to use Metasploit. In that case, and take advantage of these devices, there's a lot of them, they're all Linux servers, they're not managed, they typically don't have good passwords, they're typically running old firmware, and they typically have lots and lots of exploitable vulnerabilities. I hope you enjoyed the presentation. See you next time.
...

Brian Contos

CSO @ Sevco Security

Brian Contos's LinkedIn account Brian Contos's twitter account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)