We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Exploiting seismological networks..Remotely

00:00

Formale Metadaten

Titel
Exploiting seismological networks..Remotely
Serientitel
Anzahl der Teile
93
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
In this presentation we are going to explain and demonstrate step by step in a real attack scenario how a remote attacker could elevate privileges in order to take control remotely in a production seismological network located at 183mts under the sea. We found several seismographs in production connected to the public internet providing graphs and data to anyone who connects to the embed web server running at port 80. The seismographs provide real time data based in the perturbations from earth and surroundings, we consider this as a critical infrastructure and is clear the lack of protection and implementation by the technicians in charge. We are going to present 3 ways to exploit the seismograph which is segmented in 3 parts: Modem (GSM, Wi-Fi, Satellite, GPS,Com serial) {web server running at port 80 , ssh daemon} Sensor (Device collecting the data from ground or ocean bottom) Battery (1 year lifetime) Apollo server (MAIN acquisition core server) These vulnerabilities affect the Modem which is directly connected to the sensor , a remote connection to the modem it’s all that you need to compromise the whole seismograph network. After got the root shell our goal is execute a post exploitation attack , This specific attack corrupts/modifies the whole seismological research data of a country/ area in real time. We are going to propose recommendations and best practices based on how to deploy a seismological network in order to avoid this nasty attacks. Bio: Bertin Jervis Bonilla is a security researcher focused in offensive security, reverse engineering and network attacks and defense, Bertin has been speaker in several security conferences in his country and latin america such OWASP Latin Tour , DragonJAR conference and EKOPARTY, He is the founder of NetDB - The Network Database project , a computer fingerprint/certificate driven search engine. Formerly is a network engineer working for a five letters us networking company in San Jose Costa Rica. James Jara is the founder and CTO of NETDB.IO , a search engine of internet of things focused in info-security research. He likes Bitcoin Industry, Open Source and framework development and gave various presentations on security conferences like EkoParty. Interested machine learning for mobile, Internet of Things (IoT) devices and industrial systems used in critical infrastructure networks. Sport-coder!
33
35
GruppenoperationVektorraumExploitSoftwareschwachstelleOrdnung <Mathematik>AnalysisMathematische LogikMinkowski-MetrikMailing-ListeSoftwareBitUnrundheitGruppenoperationResultanteComputervirusRPCFirmwareTopologieJSON
Framework <Informatik>Projektive EbeneSuchmaschinesinc-FunktionDatenbanksystemNetzwerkdatenbanksystem
RechnernetzMittelwertRFIDSolitonSoftwareDatenfeldProgrammierumgebungZeichenketteLeistung <Physik>Mathematische LogikRPCSharewareExploitComputersicherheitNeuroinformatikPhysikalisches SystemUmwandlungsenthalpieFlächeninhaltBestimmtheitsmaßOpen SourceOrdnung <Mathematik>SuchmaschineJSON
FokalpunktBenutzerbeteiligungKonfiguration <Informatik>Persönliche IdentifikationsnummerGraphische BenutzeroberflächeURLGewicht <Ausgleichsrechnung>Digitales ZertifikatAbfrageWeb-ApplikationKartesische KoordinatenComputeranimation
NetzadresseAutomatische IndexierungUmwandlungsenthalpieDigitales ZertifikatSuchmaschineServerComputeranimation
Prozess <Informatik>InternetworkingResultanteStrategisches SpielE-MailComputeranimation
Elektronischer FingerabdruckSharewareSuchmaschineProgramm/QuellcodeXMLComputeranimation
SharewareGruppenoperationZeichenketteStreaming <Kommunikationstechnik>E-MailServerNetzadresseElektronischer FingerabdruckComputeranimation
ServerBenutzerbeteiligungComputerspielInternetworkingZweiWellenformKonfiguration <Informatik>Lesen <Datenverarbeitung>ZeichenketteLeistung <Physik>Computeranimation
SharewareFinite-Elemente-MethodeMatrizenrechnungSoftwareStandardabweichungElektronischer FingerabdruckSelbst organisierendes SystemURLInternetworkingData MiningFlächeninhaltKonfiguration <Informatik>Physikalisches SystemEntscheidungstheorieGraphEindeutigkeitSchlussregelProtokoll <Datenverarbeitungssystem>Gewicht <Ausgleichsrechnung>BenutzerbeteiligungDigitalisierungOrdnung <Mathematik>InformationServerGraphische StatikLesen <Datenverarbeitung>Kartesische KoordinatenDifferenteOpen SourceMultiplikationsoperatorSharewareWellenlehreComputeranimationJSON
SharewareProdukt <Mathematik>Reelle ZahlURLPhysikalisches SystemFlächeninhaltGraphComputeranimation
Data MiningLokales MinimumURLComputeranimation
BenutzeroberflächeRechnernetzPermanenteLokales MinimumURLOrdnung <Mathematik>NetzadresseZweiAbfrageDatenbanksystemIn-System-ProgrammierungGoogolComputersicherheitDatenfeldZeitzoneHilfesystemSharewareKategorie <Mathematik>Güte der AnpassungKartesische KoordinatenDatensatzDoS-AttackeHoaxWeb-ApplikationSoftwareServerInformationEnergiedichteKomponente <Software>FlächeninhaltPhysikalismusPhysikalisches SystemMathematikSoftwareschwachstelleBenutzerbeteiligungProgrammfehlerSelbst organisierendes SystemGoogle Street ViewMathematische LogikReelle ZahlWiederherstellung <Informatik>ComputeranimationXML
SharewareOrdnung <Mathematik>Open SourcePunktProgramm/QuellcodeXMLComputeranimation
Ordnung <Mathematik>SoftwareKonfigurationsraumComputeranimation
ATMSoftwareInterface <Schaltung>ServerStreaming <Kommunikationstechnik>AdressraumDean-ZahlEreignishorizontDatenverwaltungPolstelleFrequenzAdressierungEinfach zusammenhängender RaumATMOrdnung <Mathematik>ServerSoftwareMatrizenrechnungProtokoll <Datenverarbeitungssystem>Turm <Mathematik>CASE <Informatik>GraphElement <Gruppentheorie>DigitalisierungGrenzschichtablösungMobiles EndgerätKonfiguration <Informatik>KonfigurationsraumKomponente <Software>MinimumBildgebendes VerfahrenForcingBenutzerbeteiligungTelekommunikationDifferenteTopologieProzess <Informatik>TabelleFlächentheorieNichtlinearer OperatorGewicht <Ausgleichsrechnung>Workstation <Musikinstrument>Office-PaketTypentheorieDigitalsignalBetriebssystemPhysikalisches SystemFunktionalRPCGraphische BenutzeroberflächeOpen SourceURLEindringerkennungZählenBitKnotenmengeMultiplikationsoperatorWort <Informatik>UnschärferelationTelnetDienst <Informatik>DatenverwaltungFokalpunktProxy ServerEndliche ModelltheorieSchwebungVideokonferenzComputeranimation
MinimumVideokonferenzSharewareProgramm/QuellcodeComputeranimation
Ordnung <Mathematik>Wort <Informatik>Kreiszylinder
Nichtlinearer OperatorLeistung <Physik>CASE <Informatik>Zellularer AutomatTermBesprechung/InterviewComputeranimation
OISCMoment <Mathematik>InternetworkingFirmwareOrdnung <Mathematik>SoftwareschwachstelleZahlenbereichMultiplikationsoperatorDatenbanksystemServerNabel <Mathematik>Selbst organisierendes SystemE-MailInformationInternetworkingTurm <Mathematik>TelnetPasswortElektronischer FingerabdruckOpen SourceBenutzerbeteiligungGoogolSchlüsselverwaltungWurzel <Mathematik>StapeldateiSkriptspracheElektronische PublikationSoftwareATMDienst <Informatik>InjektivitätSystemaufrufMaskierung <Informatik>FirmwareKoroutineSharewareRichtungMinimumFiletransferprotokollComputeranimation
PasswortDefaultNabel <Mathematik>Wurzel <Mathematik>Dämon <Informatik>Physikalisches SystemExploitComputeranimationProgramm/QuellcodeXML
Wurzel <Mathematik>ServerTemplateProfil <Aerodynamik>PasswortNabel <Mathematik>DefaultNotepad-ComputerPhysikalisches SystemFaktor <Algebra>QuaderComputeranimationProgramm/Quellcode
Faktor <Algebra>PasswortZentralisatorHintertür <Informatik>Web-ApplikationUmwandlungsenthalpieSchnitt <Mathematik>Elektronische PublikationPhysikalisches SystemProgramm/Quellcode
Elektronische PublikationPasswortSoftwareschwachstelleProgrammfehlerMetrisches SystemPhysikalisches SystemServerSystemaufrufSoftwaretestOrdnung <Mathematik>RPCVideokonferenzDatenfeldProgramm/QuellcodeXMLComputeranimation
Hill-DifferentialgleichungVideokonferenzProgrammfehlerInterface <Schaltung>FehlermeldungNabel <Mathematik>Programm/QuellcodeFlussdiagrammComputeranimation
Dichte <Stochastik>DateiformatStandardabweichungFormale GrammatikRechnernetzStichprobeCodeCodierung <Programmierung>DatenstromSchnittmengeFormation <Mathematik>Workstation <Musikinstrument>Protokoll <Datenverarbeitungssystem>VerschlingungProxy ServerZeichenketteSystemplattformProgrammfehlerFokalpunktRelativitätstheorieMathematische LogikMathematikTelekommunikationOrdnung <Mathematik>Formation <Mathematik>DifferenteDateiformatURLWorkstation <Musikinstrument>SoftwareKomponente <Software>Physikalisches SystemServerOrientierung <Mathematik>TypentheorieQuantenzustandOrtsoperatorInelastischer StoßGrenzschichtablösungDatenstromZeitreihenanalyseTouchscreenDigitales ZertifikatWeb-SeiteCodeInternetworkingE-MailChiffrierungp-BlockRahmenproblemInformationMessage-PassingElektronische PublikationAblaufverfolgungDoS-AttackeHalbleiterspeicherSystemzusammenbruchNabel <Mathematik>Wurzel <Mathematik>MetadatenMetropolitan area networkKanalcodierungEntscheidungstheorieSharewareAbfrageProgramm/QuellcodeFlussdiagrammJSON
KontrollstrukturRechnernetzSoftwareSharewareQuarkmodellKonfiguration <Informatik>MultiplikationsoperatorUmwandlungsenthalpieAutonomic ComputingTelekommunikationSystemaufrufStreaming <Kommunikationstechnik>NetzadresseProfil <Aerodynamik>Programm/QuellcodeJSONXMLComputeranimation
Ordnung <Mathematik>RoutingProfil <Aerodynamik>SpeicherabzugInformationBeweistheorieNetzadresseGraphProxy ServerDatenstromComputeranimation
ComputermusikNetzadresseProxy ServerCASE <Informatik>Folge <Mathematik>Mechanismus-Design-TheorieOrtsoperatorSoftwarewartungComputeranimation
SoftwareCodeKontrollstrukturRechnernetzSoftwareGamecontrollerCASE <Informatik>ComputersicherheitTelekommunikation
Transkript: Englisch(automatisch erzeugt)
let's get this show rolling! Woo! Woo! So please give a warm round of applause to our two speakers James and Burton who will be adding one more thing to my list of worrying about which is hacking seismological networks so please. Um now can you hear me? Oh
awesome. Ok guys uh welcome to our talk um this is called exploiting and attacking seismological networks remotely. Um my name is Burton uh this is my colleague James Hara we are from Costa Rica and we are here to share uh to share uh the the results of uh
our last research. So ok um this is our disclaimer first of all this is not a typical talk of course this is a technical talk. Uh probably it is the first research of this kind. All vulnerabilities that we found has been correctly reported to the US earth and they
contacted the vendor affected. Um we are not responsible of the actions that someone can take after attend this talk. Ok. So hello guys. Hello. This is ok ready. So who we
are. Uh the agenda for today is this one so who we are we don't really know. Uh the motivation behind this research um how we get into these devices um how we find it. Um we will talk also about the risks and the impact um who is getting affected by um
attacking these devices. Also we will talk a little bit about the seismological instrumentations in order to understand better um this research. Also about the internals um deployment um deployments on the earth and ocean as well. About uh network topology also how we get into vulnerabilities phase uh also about the
firmware analysis um attack vectors um post exploitation and finally we get into some conclusions. And recommendations. Ok so my name is Bertin as I mentioned at the beginning my colleague James we are from Costa Rica San Jose. Uh we are the co-founders of the
NetDB project the network database project which is a search engine for IOT devices. Um it's a project that I started uh 5 years ago and then um James joined into into my idea
and we started working um very hard uh from 2 years ago and the framework and the tool. Um as I mentioned before from San Jose probably many of you know our country. Uh because. Thanks. Because uh it's a nice place to to live and visit. You are
welcome anytime you want to visit us. We had a lot of bitches not bitches. So you're welcome. It's a very very nice place to live. Um we don't have armies so everything is pretty much cool and relaxed. Ok the motivation for this talk um why are we interested in
seismological networks? Well an Amelash attacker is not interested for this uh for attack these devices because um we haven't seen our research previously in this field. Um it's pretty weird. Actually if you take a look in the Snowden docs if you look for the um
string seismological seismic uh Snowden doesn't mention anything about it. And and that was pretty pretty pretty much interesting for me. Um who could be interested? Uh I think governments you know in order to sabotage other countries seismological networks. Um this
is a new cool and attack scenario because um these devices are placed in string environments like uh in the middle of the ocean or um in the underground around volcanoes and specific areas. Uh you're playing with devices that measure um natural
disasters. So it's it's very risky. Uh this could lead to a financial a fin a financial sabotage to a specific company or country. The vendor of these instruments doesn't have
any sense of computer security at all. I'm going to show you. Remote access, remote exploitation. So all all the things that I mentioned um power power power of this this research to to continue until today. Okay how we discovered these these these devices.
So um how we discovered these devices. We have as we told you before um IOT search engine. So let's see a demo about how we get into this uh device. Okay let me show you guys very quickly because it's not the main focus of the talk. This is the NetDB uh web
application. Um you can perform queries regarding our uh query builder on tools. You can search in HTML, IP, ports, URL, uh HTTP headers, countries, SSL certificates as well,
finger pins, um and so on. There are there are a lot of options. So in this particular uh what happened here? Sorry. Sorry. Okay sorry. Okay in this particular example we are asking to NetDB for a specific IP address. Um we are indexing come on we
are indexing from this IP 3 ports in this example LDAP SSL with with the with the respective um certificate and uh HTTP server and HTTP and the port 80. If you take a
look and the same IP address and other search engine very well known for you as children. It doesn't have any results. So I'm not saying that we are doing a better job scanning the internet but we are doing something um something that uh they are not doing. We are using another strategy to get into the results so we are focusing on
getting as many data as possible. Yeah well basically that is NetDB and this is how we will be able to get into the seismograph. Um just looking into the HTTP headers labels.
Okay. So um as you can see we have a lot of fingerprints of the many devices so one day um we have done a lot of research and thanks to uh this search engine we see um a keyword, very um curious keyword. So we have another demo when in which we will see how we get
into this um particular device. Okay. So. So let's see the demo. So this is NetDB in
action. As you can see I'm asking NetDB for a particular string which is Taurus. Um that string is available in the server label and the HTTP header of these two IP addresses. So
you can see the fingerprint JD 5.1X Linux 2.4.24 NMX Taurus. Uh that was uh very pretty much um new for us and I noticed when you connect directly to the to the web server
running in the port 80 you will you will get into this dashboard and you are saying something very unusual. I have seen many researches uh about VNCs opening the internet and many other servers but I haven't seen this before in my life. Um I I have I have seen many
many servers but this one was pretty much different because it's giving you readings, it's giving you um voltage on readings, power and waveforms. You can see how the way the waveforms um there is uh an option called waveforms and you can refresh these
waveforms each by seconds. So uh at the beginning I was not sure about exactly what was this thing. So for the reason I started the research. Okay. For some string
reason you when you you find a unique fingerprint and millions of fingerprints that we
have and we are currently collecting with NetDB in the public internet. So what is Taurus? That's the question now. So we have the web server, we have the readings, we have everything, we have access and we can track them. So we know the finger we know already the fingerprints so we can start tracking them on the internet. But what it
is? Okay. Um what is Taurus? It's a portable digital seismograph. It's a developed by Nanometrics. Uh it's a company based on Canada. And when you take a look
in the official documentation you will know is that it's pretty much connected to the directly to the broadband broadband seismometer which is called trillion 240. And then all the data coming from the broadband seismometer is um routed to the portable
digital seismograph and then that decision center. Also it could be connected to a geophone. Um these geophones um are devices that are placed in the middle of the oceans in order to understand better the sounds of the seismic waves in the middle of the of the ocean. So um which is a seismometer. A seismometer are instruments that
measure the motion of the ground. Um they are reading the wave movements from earthquakes, volcanic eruptions, um or different source. Um from Wikipedia we read um
there are different common application like earthquake, detention, um fracking, dealing, also mine safety, uh structural analysis. So uh continue with the reading of the research. So uh we ask we ask so for example uh which is the organization to keep the
standards um protocols and and all the rules to to get these devices properly working um globally and the and the world. So I found the International Federation of Digital
Seismograph Networks um this organization keeps up keeps up to date the seed reference manual which is the standard protocol for earthquake information exchange um and all the digital seismograph uh worldwide network. So um these devices um provides the
real location just connecting directly to the uh web server. Uh as you can see you can go to the timing option and and you will notice that and the location area is
providing to you the latitude and the logitude and altitude uh according the their exact um location somewhere in the world. So there is a uh um a demo showing you
how we can how we were able to find a seismograph in the middle of the ocean. So let's take let's take this this this data from this um real production seismograph and let's uh ask to google uh for this uh location and you will notice that it's placed in a very
cool area. So let's go to google, to the exact location and and there you go. This place
in the middle of the ocean in Europe um between UK and Norwega and Denmark. So so we said well this is cool because uh this device is is running in an autonomous way in the
middle of the ocean so uh let's attack this thing. So it's pretty cool because I haven't seen someone exploiting something in the middle of the ocean so let's do it. No? Ok uh NetDB is giving us uh not their exact location because we are using the max mine uh databases in order to um query uh the exact location of all IP address that we found
every second. But it's pretty much accurate because it's telling us well your device is located in some ISP in the UK. So uh this is another example of how you can use um google
street view in order to query the same information and we found this seismograph located in Marlowe Oklahoma. Is this the same one here? This is the the the coordinate and asking to google so it's telling us well it's inside that property but uh google uh street
view doesn't have access to property so you're not be able to to get into into more inside the property but it's in there. So it's pretty cool. So which is the impact? I was looking for the real impact in the real world um so first all um no one else has ever
done as we told before uh research security about this uh field. So we know that we know this that we can perform a denial of service. Also we can take advantage of the web server
applications um and then we get into the web application vulnerabilities. We see that there are several uh bugs um this information disclosure in the web application that using as we said a JETI server. Also there can be leads um economic impact for oil and
gas research of a specific company. Um there are other fields like a military industry and unknown areas. Yeah. Okay um another company which is called PGS um they sell these
components or these networks in order to perform guy gas and oil recovery. Um so this catch my this catch my attention because uh you can see that uh there are lower applications for for this technology. Uh just not uh for earthquake detection or um
earth understanding. So vendors found in this research uh good old systems uh g-well instruments Zara uh also there are lower vendors but the most affected is the
nanometrics which uh claims that there are the world leader in the system logical instrument and networks. Uh also you can take a look and google for wait papers regarding instrumentation and earthquakes in order to understand better how these devices works. Because it's pretty much uh science a science field. So no one it's not
very familiar for us as security researchers. So it was pretty much difficult to me to understand exactly how these devices work. So I had to request some help to our um organization in my country which is called Opsicory. Uh and they provide to me some
information regarding how they works and I explained to them exactly well I got a nutshell here in this thing so they told me well bro we are screwed basically. A lot of mathematics a lot of physics so if you're interested you can you can take a look.
This is an example about the others is uh seismological instrumentation. Um this is an example about how to use uh geophones and um what is their hydrophones hydrophones
in order to catch up uh the sounds from the ocean and to catch up the the movements from the earth. But in the first example um uh they are producing a fake movement in order to get into the gas and oil. So uh I found a demo from a company
doing this. And let's take a look at how they are being deployed and how they are producing the fake movement in the earth in order to to get into the gas and oil um sources. So as you can see each point represents uh a little uh sensor that is
a sensor. But you notice that they have a big trucks and they in some way stimulate the earth in order to get the response and check well uh there is gas and oil so let's dig
into it. This uh truck is collecting all the data from the network and then um is sent to the acquisition main center. So this is where we are attacking. Each of these uh
little uh devices. So um let's take a look at how they look at typical configurations. Um
as we can see we have the sensor and we have um a key um the port table digital seismograph. So basically um the port table um is the small piece on the left uh top of the image. Um we have the broadband small mirror uh the bottom which is called
towers. Um which are the internals of these devices? Um they are liners basic uh operating system. They have a remote management system. They have a several service like um SSH, telnet, HTTP, um the web servers jetty. Um they have a really
accurate GPS that can be um used in fewer to get um you know exactly location of the device. Also they basically are made for ocean bottom deployment. In this case the trillium. Um they have a battery that can make the device uh be long time I mean
years in the ocean. Um in this case we have uh sophisticated uh image with in which we can see a horizontal sensor um vertical sensor. We have a celer a celeron
thermometers. Yeah sorry. Um and other layer for seismological and electronic stuff. Um in this image um this is a pretty expensive device so we are not uh available to get one. So this is a HD photography in which we can see the several components of this
device. So um what about the deployment options? We have two cases. The first one is for the air deployment and the second one is for the ocean bottom deployment. For the first one as uh stand alone um deployment um is typical uh typically running above
third mode um is not require a network connection. For the second one it will work as a network element. So in this case um the user must configure the Taurus with the acquisition server IP. So the Taurus will be streaming the data to the acquisition
server using the MP protocol. That means nanometrics protocol. Okay um geophysics depend on seismometers to monitor earthquakes generated by the motion of the tectonic plates uh that forms the air crust. In order to function the instrument needs to
be uh leveled prior to operation. Uh that's easy enough for a device deployed on uh dry land but when it comes to seismometer place in the ocean floor thousands of feet below to to the surface uh the process gets beat and more challenging. As you can
see in the air deployment is pretty simple. Um you know it's a small device and it's um simple to deployment. But um now let's see a topology of this seismological network. Um before jumping into the ocean deployment um this is how it looks as a
seismological network. Um in this scenario we have three different communications type. Um the first one is a BSAT the second one is a ADSL and the third one is a GPRS model. So basically the data comes from the sensor is sent by the towers to the acquisition server. Well um this is uh typical ocean bottom deployment. Uh
they're using uh autonomous underwater vehicles uh as known as uh AUADs. Uh this is uh pretty much expensive um deployment because you need uh several um chips and several
UAVs. And each of these um sensors and digital seismograph has a cost around uh $30,000 each. So it's pretty much inexpensive infrastructure. Uh this is uh an example about
how it looks like uh the the dashboard which receive all the data coming from the remote stations in this case the seismograph. Uh this is software provided also by nanometrics which is called antenna. Um and it it it can provide to you the exact location
and a nice web GUI. But it's not the focus of the talk today. There is uh also an open source um web server that can collects also the data coming from this station which is called um Syscom tree. If you are interested to take a look in the open source
um seismological technology. Okay the challenge as I mentioned is pretty much uh high. In order to function um these instruments need to be leveled prior to operation. It's not it's not easy when it's a thousand feet on the through the ocean floor. So um I
would like to share share uh share with you uh a video about how this uh how this works. Actually we have sound, no sound. Well this is a quick demo. Well not a demo,
it's just in order to take a look at how these engineers uh works in the ocean
deploying uh these devices. You can see this is the UAV and that antenna that you can see is the the GPS antenna. Inside that uh glass bowl is the cylinder with the sensor. So
this device has an autonomy of uh 8 months. Also they can be powered by a solar cell. Uh also in some cases they can be um provided with a long term battery because these
power for their operation. So there you go. This is going straight to the to the to the to
the ocean. Okay. Um okay seismometers capture a transient a transient phenomenon. If an
instrument malfunctions, whether it is at the bottom of the ocean or at the top of a ice cap, the data is lost forever. So it's telling us okay if you can deny the service this thing, you will lose a lot of data. And what happen if you do the same with uh one thousand or two thousand of these devices at the same time? So this could impact a
lot the research that these engineers are doing. You need to be absolutely sure that the direction of marketing of nanometrics says. So what about the vulnerability research? Um
we are start looking for to get a shell of the device. So we are start looking first for the firmware um in Google and other service. But what is uh pretty difficult to get it. So what I did was uh look with my friend um for the firmware using other techniques. So
let's explain about that. Okay so the the firmware was not was not very easy to find in the internet when I started looking at it. So I decided to send an email directly to the support, nanometric support. And they reply me back um 10 minutes 10 minutes later. And
they told me uh welcome yo welcome routine voila. So I'm going to give to you a username and a password in order to get all the all the documentation and all the firmware in front of us and all the software. Okay so I said well pretty cool. And the
same day I started downloading everything the firmware and all the stuff available. Um because they they gave me access I I haven't done anything illegal here or something weird. It's just was a simple email requesting access to to the firmware and and they
were very gently to provide access to me to that database. Okay so there's the firmware finally. Um is a that TGC file which contains a lot of scripts and batch. So basically you don't need to use a bingwok bingwok tool or a bingwok modkey in order to
take a look into the firmware like only like other fingers available in the IOT devices. So I I thought well uh you probably you're kidding me because uh there is an script called Taurus install that is edge which is pretty much uh a lot of bunch of um batch
commands. So imagine that you could uh inject uh batch command inside that script and then upload it to the to the sensor to the to the Taurus and you will probably get a back door running always so nothing complicated for us. Okay um after 3 days uh they sent
to me an email. Uh there were 10 nanometric software and firmware can only be provided to registered customers and I I do not see your organization registered in
your customer database. So what is the serial number of the Taurus you wish to upgrade? So they cut me off all the access to the database but it was too late for them because I already have all the documentation and all the fingers. So starting digging into the finger I was able to get all the passwords, the root passwords of the SSH daemon, uh the
password of the web server, uh the password of the telnet, ftp and everything. And also I found several back doors that are not well documented in the official documentation. So
too much talk I know uh it's pretty uh it's pretty hard for you all this information I know is pretty heavy. So let's take a look in the in the demo. So this is the shell um
with the default password and the SSH daemon. So who I am, I'm root of course. Um let's uh as to the system that you name and you know it's NMS and NMX Taurus. Um and after that
what happened in the middle of the ocean is the following. That's it. Well exploit. Um
let's take a look here again. So basically uh now we have a root shell, we have the highest privilege on the system. We can do whatever we want. Uh we have uh busy box shells
also. Uh we have access uh to all the system components, to all the uh threads, everything. Everything is completely compromised after after you get the the default password for the SSH server. So you can see there are a lot of profiles. So you can
go straight to users txt template and which are all the users and plain text. And you will notice uh that there is something called factory which is not documented and then central tech and user. And the password is the same for for all the users. Uh central
central tech tech and user user. And the factory back door which is not in the official documentation. Um these these users are from the web application specifically. So
let's continue taking a look into the system file. You get the PSW file. So let's do a cut. Um more users. You notice that uh the SSH password is not um is not in here.
Was uh in in other file. But was only available um unpacking the the the finger. So
so the password uh was uh dolphin 18 for the SSH server. I don't know why they choose uh that um uh pretty much uh innocent password. I don't know. Nothing
related to the system or the or the field. Dolphin 18. So now we have access to uh user um a back door user. A lot of vulnerabilities. Um let's test some vulnerabilities. And I wouldn't call this uh zero day. Uh but no one else uh
previously uh found this uh bug before in the system until I reported to the US cert. And actually nanometrics um confirms the issue. But they told me well um yeah the bug is in there. Um you win. But uh I think that there is no way to exploit this um
remotely. But it's in there. So well uh I think that an attacker with a lot of um um creativity um can exploit this um remotely. So let's take a look in the video. In order to show you how the bug uh works perfectly. Let me rewind this. Okay. There you go.
Also you notice that we have access to all the interfaces. So we can turn off or turn
on turn turn turn on the interfaces. So this is the bug. The shellshot bug. Uh it's completely vulnerable. And that's it. So more bugs and errors. You can see traces.
So here is an example about um when we was trying to put it down the server jetty. Um we noticed that um it's pretty easy to crash crash it out. Um with just uh pushing technique
sending randomly data over this jetty server. Because uh they have uh they don't have enough memory. Yeah you can actually send um crafted uh URLs in order to get these traces. So you will get a lot of disclosure information and messages. Okay. So
another vendor affected that um we notice is Google systems. Specifically in the SSL protocol. Uh these devices are running HTTP as server. Um with uh full herby block uh
herby bug enable. And also using our platform NetDB you can um query the SSL certificate uh for the string Google systems. And you will get directly into the Google seismometers. So um let's talk about a little let's talk about uh protocol and
communication stuff. Um these devices are using SEAT. SEAT is the protocol the um data format internally primarily for a change of seismological time series data and related metadata. So the format of the nomenclature of the SEAT format is four components. Um the
first one is the network code. It's one to two characters to identify the owner of the data. The second one is the station code. Um one to five characters for the station recording the data. Because could be several stations. Um location ID uh identify the
different data streams for a single station. And the last one channel code that is most important will contains the band sample rate type and orientation of the sensor. So um if you want to know more about the SEAT protocol you can get into the reference manual
that you can see on the web page. Well this is an example about uh Google systems and employees the networking using a screen server or something like that. Well our attack now we were we have a root shell but we need to do something more. We are not just
happy having a root shell and a seismograph in the middle of the ocean so we need to do something else. So I thought well I have access to the protocol I have access to the device so let's do a man in the middle attack. Um from all the data um coming from there and being streamed directly to that decision center. So my position now would be um
in the middle of the station and that decision center. Because these packets are not being sent using any type of um encryption. There is no SSL there is no PP tunnel there is nothing. These these packets are being um routed to the public internet without any
protection. Uh this is an example about how it looks the packet header and the uh the excuse me packet. This is pretty much representative it's not the exact packet and I did just for for you uh in order to understand better how the packet looks like. Um basically it's an XML file which uh contains all the information regarding the latitude
and longitude and this is the main focus of the man in the middle attack. Uh because we can modify in our proxy the latitude and longitude and this is going to be injected directly to the main acquisition center as a false data or a false positive. So we can
plug the acquisition center with um false data. Um let me show you the demo of the man in the middle attack plug. Demo 6. So there's the same thing the same seismograph in
the middle of the ocean but this time um these devices has an option called communications. So they can stream in autonomous way packets to any specific IP address
that you provide to them. So let's take a look. Let's let's create a a new profile uh in order to route all the traffic to my proxy. You you need to go to data streaming. You
will notice that there are some profiles in this seismograph. Uh these three main profiles but we are not going to touch anything. We are going to create a new one just for the proof of concept. Okay. So let's provide uh our IP address. And after um press the
apply button this seismograph is going to start sending to me all the information coming from the earth. And you will see uh you're right the TCP dump um running. This is our proxy in this case. And you will see all the data coming straight to our proxy. And
what I'm going to do is modify the latitude and longitude and then replace uh our IP address to the original um main acquisition center IP address because it's using UDP. As as you know UDP packets uh doesn't use any um sequence um mechanism like TCP. Um
so you can spoof the IP address and that's it. So well um conclusions we are able to locate
these devices anywhere in the world. We are in control of the device, the network and the software running on it. Um there is no SSL in communications. Um these devices have engineers to save people that don't understand the earth. And vendors please go better and think in security about devices that help us to protect our people and the
world. Yup. So recommendations basically um think in security when you code um this equipment and and that's it. Uh in case you have any questions just let us know. Thanks. Thanks.