25
©2013 Check Point Software Technologies Ltd. Physical (In)security Inbar Raz Malware & Security Manager Check Point Software Technologies

Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

©2013 Check Point Software Technologies Ltd.

Physical (In)security

Inbar RazMalware & Security ManagerCheck Point Software Technologies

Page 2: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

2©2013 Check Point Software Technologies Ltd.

Types of Vulnerability Disclosures

Responsible Disclosure:– Contact the vendor only and inform them of the vulnerability– If asked, work with the vendor– After 3-6 months, proceed to Full Disclosure

Full Disclosure:– Publish all information, including POC– Sometimes – only a video of POC

Page 3: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

3©2013 Check Point Software Technologies Ltd.

Disclosure #1

Vendor: An Online Movie Ticket Service

Field: Online shopping and entertainment

Affected Product: On-site Ticket Kiosk

Vulnerability: Multiple vulnerabilities cause the compromise of both customer and company data

Page 4: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

4©2013 Check Point Software Technologies Ltd.

Disclosure Details

On-site Kiosk

Touch Screen

Credit CardReader

Ticket Printer

No peripherals,No interfaces

And the journey begins…

Page 5: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

5©2013 Check Point Software Technologies Ltd.

Disclosure Details

Improper interface settingsallow the opening of menuoptions.

Menus can be used tobrowse for a new printer.

Page 6: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

6©2013 Check Point Software Technologies Ltd.

Disclosure Details

A limited browser is notrestricted enough.

A right-click can be used…

To open a full, unlimitedWindows Explorer.

Now the sky is the limit…

Page 7: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

7©2013 Check Point Software Technologies Ltd.

Disclosure Details

Browsing through thefile system revealsindicative directory names…

And even more indicativefile names.

Page 8: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

8©2013 Check Point Software Technologies Ltd.

Disclosure Details

Bingo: Credit Card Data(Unencrypted!)

Tools of the trade: Notepad

We can use the ticketprinter to take it home

Page 9: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

9©2013 Check Point Software Technologies Ltd.

Disclosure Details

But that’s not all:RSA Keys and Certificatesare also found on the drive!

Which we can print, takehome and then use afree OCR software to read…

Page 10: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

10©2013 Check Point Software Technologies Ltd.

Disclosure Details

The result:

RSA Keys used tobill credit cards.

Page 11: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

11©2013 Check Point Software Technologies Ltd.

Disclosure #2

Vendor: Point-of-Sale Manufacturer and Users

Field: Network Security

Vulnerability: Improper physical security allows access to insecure PoS devices during afterhours.

Page 12: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

12©2013 Check Point Software Technologies Ltd.

Disclosure Details

Point-Of-Sale devicesare all around you.

Page 13: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

13©2013 Check Point Software Technologies Ltd.

Disclosure Details

Location: A bar in Tel-Aviv

During working hours – tables, chair and PoS outside

During afterhours – everything is locked inside the facility

But the Ethernet port remains hot– In public space…

Page 14: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

14©2013 Check Point Software Technologies Ltd.

Attack Vector

In the past – play hacker/script kiddie with BackTrack.

Today: Fire up wireshark, discover IPs of live machines.

Page 15: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

15©2013 Check Point Software Technologies Ltd.

Attack Vector

In the past – play hacker/script kiddie with BackTrack.

Today: Fire up wireshark, discover IPs of live machines.

Detected IP addresses:– 192.168.0.1– 192.168.0.2– 192.168.0.4– 192.168.0.250– 192.168.0.254

Confirm by ping (individual and broadcast)

Page 16: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

16©2013 Check Point Software Technologies Ltd.

Attack Vector

Evidence of SMB (plus prior knowledge) lead to the next step:

And the response:

Page 17: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

17©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

Things to do with an open share

#1: Look around

Page 18: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

18©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

Things to do with an open share

#1: Look around

#2: Create a file list

Page 19: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

19©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

The mystery of 192.168.0.250

Answers a ping, but no SMB.

First guess: the ADSL Modem.

Try to access the Web-UI:

Page 20: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

20©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

The mystery of 192.168.0.250

Use the full URL:

Page 21: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

21©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

Reminder: We actually had this information.

Going for the ADSL router

Page 22: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

22©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

Going for the ADSL router

Naturally, there is access control:

Want to guess?

Page 23: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

23©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

Unlocked Achievements

Best for me, worst for them: Credit card data.

Database files (yet to be analyzed).

The program files of the billing system.

Potential attack through the internet.

Page 24: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

24©2013 Check Point Software Technologies Ltd.

Next Steps

Create a Responsible Disclose document for the PoS manufacturer

Send an Advisory to businesses

Page 25: Inbar Raz - Physical (In)Security – it’s not –ALL– about Cyber

25©2013 Check Point Software Technologies Ltd.[Restricted] ONLY for designated groups and individuals

IMPORTANT NOTICE

The bar operation was with full cooperation and consent.

DOING THIS ON YOUR OWN IS ILLEGAL.