67
All Your Door Belong To Me – Attacking Physical Access Systems VALERIE THOMAS EXECUTIVE SECURITY CONSULTANT @HACKTRESS09

Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Embed Size (px)

Citation preview

Page 1: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

All Your Door Belong To Me – Attacking Physical Access SystemsVALERIE THOMASEXECUTIVE SECURITY CONSULTANT@HACKTRESS09

Page 2: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

• Executive Security Consultant for Securicon

• 10+ years in Information Security

• Coauthor of Building A Security Awareness Program

• Social Engineering trainer

• Physical access “enthusiast”

Introduction

Page 3: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Agenda

• Why this talk?• Topology of a physical access system

(PACS)• Why PACS deployments are insecure• Attack surfaces and exploits• Putting it all together for complete

takeover

Page 4: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

What Is A Physical Access System?

A Physical Access Systems (PACS) consists of several components working together to ensure that access is granted or denied to a controlled area when appropriate.

Page 5: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Why Physical Access Systems?

Page 6: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

PACS Components

• Access control point• Door• Gate• Turnstile

• Credential Reader• Credential• Access card• Electronic fob• Personal identification number (PIN)• Biometric

Page 7: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access Cards

Low frequency • 125kHz• Small amount of

data• Unencrypted

High frequency • 13.56 MHz• Large amount of

data• Sometimes

encrypted

Page 8: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access Cards

Page 9: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

PACS components

• Access control panel• Decodes binary data• Compares card data to an access list, then

grants or denies entry

Page 10: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

• Access control server• Software provided by manufacturer• Usually a Windows server• Maintains card records• Maintains access groups• Card format details• Event monitoring

• Door components• Electric strike• Door contact• Request to exit (RTE)

PACS components

Page 11: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

How credentials are read

https://media.blackhat.com/us-13/US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Slides.pdf

Page 12: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

https://en.wikipedia.org/?title=Access_control#/media/File:Access_control_door_wiring.png

Page 13: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

https://en.wikipedia.org/?title=Access_control#/media File:Access_control_topologies_main_controller_a.png

Page 14: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

The Split Personality of Security

Computer Security• Protects valuable assets• Typically reports to

Technology or Financial Officers• “You must be really

smart”• Controls designed and

implemented by network security professionals

Physical Security • Protects valuable

assets• Typically reports to

Administration or Facilities Organization

• “You’ll get a better job someday”

• Controls designed and implemented by electrical contractors

Page 15: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Why PACS deployments are insecure

• The gap between physical and cyber security is closing• The physical security industry is ~15

years behind IT• No security maturity model• Vendors implement features without

security testing• Heavily reliant on IT but lack

understanding• Often deployed and forgotten

Page 16: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

HID iClass• The card and reader perform mutual

authentication using a 64 bit encryption key• This key is programmed into the reader

at the manufacture• Don’t worry - It’s encrypted!

Why PACS deployments are insecure

Page 17: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

https://www.blackhat.com/docs/us-15/materials/us-15-Evenchick-Breaking-Access-Controls-With-BLEKey-wp.pdf

Page 18: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Physical security culture• Majority are former military/defense• Lack technical understanding of PACS• Unaccustomed to patching/addressing

vulnerabilities• Vendor loyal• Resistant to change

Why PACS deployments are insecure

Page 19: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Attack surfaces and exploits

• Access cards• Readers• Request to exit devices• Access control panel• Access control server• Workstations

Page 20: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access card attacks

Page 21: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 22: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 23: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 24: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 25: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access card attacks - Long Range

• Weaponized long range reader (read & record)• Does not clone/write• Read distance is ~2ft• Available for• Proximity• iClass (Standard Security)• Indala

Page 26: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

PROS• Improved read

range• Stores hundreds of

card reads• No interaction

required – just power on

CONS• Expensive =(• Can misread

custom card formats

Access card attacks - Long Range

Page 27: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Design 1 – Tastic RFID Thief

Page 28: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 29: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Tastic RFID Thief Output File

Page 31: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Design 2 - RavenHID

Page 32: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 34: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Long Range Power

Must have 12V Output

Page 35: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access card attacks – low tech

Most vendors print the card number ON THE CARD

Page 36: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access card attacks – low tech

And on the box

Page 37: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Reader attacks - BLEKey

• Inserted in-line with the reader• Records card data and sends via

Bluetooth• Replays data• Reader DoS

Page 38: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 40: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Request to exit device attacks

Page 41: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 42: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 43: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 44: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 45: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 46: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 47: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Access control panel attacks

• Remember how important door controllers are?• Medium to large environments will have

multiple door controllers• These controllers are usually reachable

from the general address pool• Often have very useful data

Page 48: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Hunting Door Controllers

• Many controllers have features to simplify configuration• Embedded web servers• FTP• SNMP

• Access is generally open or protected with a weak default password• Many allow anonymous FTP

Page 49: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Hunting Door Controllers

Keep in mind…• These devices can be very fragile – heavy

scanning is not recommended• Many of the web interfaces will only work

in IE• Don’t change any settings

Page 50: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Hunting Door Controllers

Ports to look for• TCP 21• TCP 23• TCP 80• UDP 161• TCP 9999

Keywords in DNS/Nessus Scans• Tyco• iStar• Matrix• Lenel

Page 51: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

What Can Controllers Tell Us?

• Card numbers and access log• Areas they control• IPs of other controllers• IPs of the access server• Passwords!

Page 52: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Web Interface

Page 53: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Web Interface

Page 54: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Web Interface

Page 55: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Web Interface

Page 56: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

VertX

https://github.com/brad-anton/VertX

Page 57: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Hunting Access Servers

• Usually not as obvious as controllers• Majority are Windows Servers• Can often obtain the IP from a controller• DNS search is a fairly reliable method

Page 58: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Hunting Access Servers

DNS/Nessus Keywords• CCURE/C-CURE/C*CURE• OnGuard• AccessControl• FacilityCommander• Additional keywords at

http://www.capterra.com/physical-security-software/

Page 59: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Page 60: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Other PACS Resources

PACS information and card data can be found in other areas of the network• SharePoint• Email• Document shares (usually in null session)• Guard workstations

Page 61: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Putting it all together

• Long range reader to collect card data• Programmed

duplicate cards and created fake employee card• Observed security

guard daily activity

Page 62: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Putting it all together

• Placed hardware keyloggers• Captured

credentials and other useful data• Gained access to

access server• Produced duplicate

cards for employees with the most access

Page 63: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Putting it all together

Page 64: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Putting it all together

Page 65: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Game Over

Page 66: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

Long road ahead

• Physical security has a lot of catching up to do• Will require huge culture shift• Many of the misconfigurations discussed

are preventable• PACS security checklist (in progress)

Page 67: Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

[email protected]@hacktress09