SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Spencer McIntyre, SecureState
EnergySec Summit Presentation
9/19/2013
PRESENTATION
Data Classification: Public
AGENDA
 Smart Meters in the “Big Picture”
 Role in AMI (Advanced Metering Infrastructure)
 Why attack the Meter?
 Information
 Access
 How do we attack the meter?
 Access mechanisms
 Termineter Framework (w/Demo!)
2
Data Classification: Public
ABOUT YOUR PRESENTER
 Spencer McIntyre (OSCP, OSEE)
Open Source Contributor
 Research lead on SecureState's Research
and Innovation team
 Background/Specialization
 Vulnerability & Tool development
 “Special Projects”
3
Data Classification: Public
SECURESTATE OVERVIEW
Management Consulting Firm: Specializing in Information Security
Est. 2001 – more than 11 years in business
We solve complex information security problems by using technical
services to facilitate strategic decisions.
By identifying the problem in a causal relationship we can provide
tactical and strategic recommendations to position our clients in
achieving their SecureState.
4
Background
5
What is AMI
AMI (Advanced Metering Infrastructure)
Allows two way communication with the meter
○Compared to AMR which only allows for one
way communication
Allows automatic, remote readings and
configuration
Today, we’re focusing on the meter component
6
BACKGROUND
The old days of stealing
with magnets are ending
USA Today estimate $6
billion in power stolen
each year
AMI is still being
deployed in many
locations
7
BACKGROUND
Why?
Assessing the Situation
8
Same two reasons we typically attack
anything
Information
○Control of information
Access
Consumers have physical access
Smart Meters deployments are increasing
Physical access is a security worst-case scenario
9
WHY ATTACK METERS?
Meters store usage information
Information can be modified to affect
billing
Modification results in fraud
Usage can be profiled
Electric meters would be best bet
Peak usage can identify when occupants are
home or building is in use
1
0 INFORMATION
Some meters can access the service
provider’s internal network via Cellular
connection
Not the case when a central unit is used to
collect data
Meter has a SIM card
Requires typical SIM card settings (APN,
username, password, etc.)
Either direct internet access or private
network access
1
1 ACCESS
Attacker with physical
access can open the meter
and retrieve the SIM card
Guess/Bruteforce Settings
APN
Username (if set)
Password (if set)
Internal network access
1
2 CASE STUDY
How?
On the Offense
1
3
At a basic level, there are two mechanisms
Wireless
○Zigbee
○Cellular
Wired
○Optical Interface
Data collectors often also have TCP/IP
connection
○Network accessible
1
4 ACCESSING METERS
What is Zigbee?
Low power/Low cost
wireless mesh network
Ideal for use with
Smart Meters
Low power and mesh-
based architecture
makes it ideal
Pretty reliable
1
5 ZIGBEE
Central collector
Allows for single cell
connection
Consumer grade devices
Readers
Thermostats
Not typically used for inter-
meter communications
Mesh network does require
meters to relay information
1
6 ZIGBEE
Association is dependent on a few things
Pairing Window
Encryption Key (sometimes)
Pairing window is often
configured/controlled by the service
provider
Not all service providers agree on acceptable
length
Ranges from 1 week to infinite
1
7 ZIGBEE ACCESS
Encryption is often available but must be
enabled
Based on AES
Security types include:
○None
○Encrypted
○Encrypted with authentication check
○Unencrypted with authentication check
Keys can be negotiated/distributed
Uncommon with meters, they are often
statically set by the provider
1
8 ZIGBEE ACCESS
Killerbee is invaluable for assessing the
Zigbee portion
zbstumbler
Finding devices
zbscapy
Killerbee + Scapy
Offers live capturing, injection and encryption
options
1
9 WEAPON OF CHOICE: KILLERBEE
2
0 ZBSCAPY
21
DATA COLLECTORS
Data collectors aggregate information
Often use C12.22 and are network
accessible
C12.22 is still an unexplored attack
surface
A combination of authentication, encryption and device IDs make
attacks difficult
Attacks are still possible however
22
DATA COLLECTOR SNIFFING
Network enabled serial
sniffing
No authentication
required
Contacted the vendor
Meters can be accessed using a physical
connection
ANSI Type-2 Optical Probe (sounds dirty)
Couple of standards in use here
C12.18
○Defines standards for accessing data
(requests/responses)
C12.19
○Defines standards for data formats
2
3 WIRED ACCESS
Tables are broken up into “decades”
based on IDs
General Configuration 0-9
Security Tables 40-49
○Defines access permissions
History and Event Logs 70-79
Telephone/Modem Control 90-99
About 10 more defined by C12.19-2008
Standard
2
4 C12.19 BACKGROUND
Optical Probes are
expensive (~$500)
Can be created for
cheaper?
Use infrared
transceivers
2
5 PHYSICAL EQUIPMENT
The “Termineter” Framework provides
access to meters over C12.18
Modeled after the Metasploit Framework
for ease of use
Implemented in Python
Includes full C12.18 stack and C12.19 library
Released last week
Open Source (GPLv3)
http://code.google.com/p/termineter
2
6 INTRODUCTION: TERMINETER
Currently interacts with meters via a
serial connection
Core features implemented as modules
14 modules in total
Modules mostly focus on reading/writing
to C12.19 tables
Everything involves reading/writing to
tables
Even running “Procedures”
2
7 TERMINETER: FEATURES
Included Modules:
Basic information
retrieval
Brute forcing
authentication
Reading/Writing to
tables (low-level)
Dump tables and
perform a “diff”
2
8 TERMINETER: MODULES
Modules require some knowledge (not quite
script-kiddie ready)
Mostly of valid data to write to tables
Procedures can be tricky, check the
documentation
Some modules can automate common
tasks
Changing the Meter’s ID
Setting the Meter’s operating mode
2
9 TERMINETER: MODULES
Common security issues
Some table values can be modified without
proper authentication (via invalid password)
Some meters ignore username and user ID field
with authenticating users
No lock out, just logging of failed attempts
3
0 TERMINATING WITH TERMINETER
Let the demos begin!
3
1 TERMINETER DEMO
Getting this far has been a fight
Future plans include
Zigbee integration
Support for character sets beyond 7-bit
Additional modules
○Easier access to procedures
3
2 TERMINETER FUTURE
3
3
References
Killerbee:
http://code.google.com/p/killerbee
ANSI C12.18 Standard
ANSI C12.19 Standard
3
4
Thank you for your time!
Spencer McIntyre
Email: SMcIntyre@SecureState.com
Twitter: @zeroSteiner
Termineter Homepage: http://code.google.com/p/termineter
3
5
Q U E S T I O N S
A N S W E R S

Weitere ähnliche Inhalte

Was ist angesagt?

An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
EnergySec
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
James Nesbitt
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 

Was ist angesagt? (20)

IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Mobile First, Security First!
Mobile First, Security First!Mobile First, Security First!
Mobile First, Security First!
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 

Andere mochten auch

Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
EnergySec
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
John-André Bjørkhaug
 

Andere mochten auch (20)

DefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter HackingDefCon 2012 - Power Smart Meter Hacking
DefCon 2012 - Power Smart Meter Hacking
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart Meter
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research report
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response Team
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 

Ähnlich wie How I learned to Stop Worrying and Start Loving the Smart Meter

Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
Gordon Haff
 

Ähnlich wie How I learned to Stop Worrying and Start Loving the Smart Meter (20)

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Home and building automation systems sun slice
Home and building automation systems   sun sliceHome and building automation systems   sun slice
Home and building automation systems sun slice
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptx
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
 
Unit_3.pptx
Unit_3.pptxUnit_3.pptx
Unit_3.pptx
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 

Mehr von EnergySec

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 

Mehr von EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

How I learned to Stop Worrying and Start Loving the Smart Meter

  • 1. Spencer McIntyre, SecureState EnergySec Summit Presentation 9/19/2013 PRESENTATION
  • 2. Data Classification: Public AGENDA  Smart Meters in the “Big Picture”  Role in AMI (Advanced Metering Infrastructure)  Why attack the Meter?  Information  Access  How do we attack the meter?  Access mechanisms  Termineter Framework (w/Demo!) 2
  • 3. Data Classification: Public ABOUT YOUR PRESENTER  Spencer McIntyre (OSCP, OSEE) Open Source Contributor  Research lead on SecureState's Research and Innovation team  Background/Specialization  Vulnerability & Tool development  “Special Projects” 3
  • 4. Data Classification: Public SECURESTATE OVERVIEW Management Consulting Firm: Specializing in Information Security Est. 2001 – more than 11 years in business We solve complex information security problems by using technical services to facilitate strategic decisions. By identifying the problem in a causal relationship we can provide tactical and strategic recommendations to position our clients in achieving their SecureState. 4
  • 6. What is AMI AMI (Advanced Metering Infrastructure) Allows two way communication with the meter ○Compared to AMR which only allows for one way communication Allows automatic, remote readings and configuration Today, we’re focusing on the meter component 6 BACKGROUND
  • 7. The old days of stealing with magnets are ending USA Today estimate $6 billion in power stolen each year AMI is still being deployed in many locations 7 BACKGROUND
  • 9. Same two reasons we typically attack anything Information ○Control of information Access Consumers have physical access Smart Meters deployments are increasing Physical access is a security worst-case scenario 9 WHY ATTACK METERS?
  • 10. Meters store usage information Information can be modified to affect billing Modification results in fraud Usage can be profiled Electric meters would be best bet Peak usage can identify when occupants are home or building is in use 1 0 INFORMATION
  • 11. Some meters can access the service provider’s internal network via Cellular connection Not the case when a central unit is used to collect data Meter has a SIM card Requires typical SIM card settings (APN, username, password, etc.) Either direct internet access or private network access 1 1 ACCESS
  • 12. Attacker with physical access can open the meter and retrieve the SIM card Guess/Bruteforce Settings APN Username (if set) Password (if set) Internal network access 1 2 CASE STUDY
  • 14. At a basic level, there are two mechanisms Wireless ○Zigbee ○Cellular Wired ○Optical Interface Data collectors often also have TCP/IP connection ○Network accessible 1 4 ACCESSING METERS
  • 15. What is Zigbee? Low power/Low cost wireless mesh network Ideal for use with Smart Meters Low power and mesh- based architecture makes it ideal Pretty reliable 1 5 ZIGBEE
  • 16. Central collector Allows for single cell connection Consumer grade devices Readers Thermostats Not typically used for inter- meter communications Mesh network does require meters to relay information 1 6 ZIGBEE
  • 17. Association is dependent on a few things Pairing Window Encryption Key (sometimes) Pairing window is often configured/controlled by the service provider Not all service providers agree on acceptable length Ranges from 1 week to infinite 1 7 ZIGBEE ACCESS
  • 18. Encryption is often available but must be enabled Based on AES Security types include: ○None ○Encrypted ○Encrypted with authentication check ○Unencrypted with authentication check Keys can be negotiated/distributed Uncommon with meters, they are often statically set by the provider 1 8 ZIGBEE ACCESS
  • 19. Killerbee is invaluable for assessing the Zigbee portion zbstumbler Finding devices zbscapy Killerbee + Scapy Offers live capturing, injection and encryption options 1 9 WEAPON OF CHOICE: KILLERBEE
  • 21. 21 DATA COLLECTORS Data collectors aggregate information Often use C12.22 and are network accessible C12.22 is still an unexplored attack surface A combination of authentication, encryption and device IDs make attacks difficult Attacks are still possible however
  • 22. 22 DATA COLLECTOR SNIFFING Network enabled serial sniffing No authentication required Contacted the vendor
  • 23. Meters can be accessed using a physical connection ANSI Type-2 Optical Probe (sounds dirty) Couple of standards in use here C12.18 ○Defines standards for accessing data (requests/responses) C12.19 ○Defines standards for data formats 2 3 WIRED ACCESS
  • 24. Tables are broken up into “decades” based on IDs General Configuration 0-9 Security Tables 40-49 ○Defines access permissions History and Event Logs 70-79 Telephone/Modem Control 90-99 About 10 more defined by C12.19-2008 Standard 2 4 C12.19 BACKGROUND
  • 25. Optical Probes are expensive (~$500) Can be created for cheaper? Use infrared transceivers 2 5 PHYSICAL EQUIPMENT
  • 26. The “Termineter” Framework provides access to meters over C12.18 Modeled after the Metasploit Framework for ease of use Implemented in Python Includes full C12.18 stack and C12.19 library Released last week Open Source (GPLv3) http://code.google.com/p/termineter 2 6 INTRODUCTION: TERMINETER
  • 27. Currently interacts with meters via a serial connection Core features implemented as modules 14 modules in total Modules mostly focus on reading/writing to C12.19 tables Everything involves reading/writing to tables Even running “Procedures” 2 7 TERMINETER: FEATURES
  • 28. Included Modules: Basic information retrieval Brute forcing authentication Reading/Writing to tables (low-level) Dump tables and perform a “diff” 2 8 TERMINETER: MODULES
  • 29. Modules require some knowledge (not quite script-kiddie ready) Mostly of valid data to write to tables Procedures can be tricky, check the documentation Some modules can automate common tasks Changing the Meter’s ID Setting the Meter’s operating mode 2 9 TERMINETER: MODULES
  • 30. Common security issues Some table values can be modified without proper authentication (via invalid password) Some meters ignore username and user ID field with authenticating users No lock out, just logging of failed attempts 3 0 TERMINATING WITH TERMINETER
  • 31. Let the demos begin! 3 1 TERMINETER DEMO
  • 32. Getting this far has been a fight Future plans include Zigbee integration Support for character sets beyond 7-bit Additional modules ○Easier access to procedures 3 2 TERMINETER FUTURE
  • 33. 3 3
  • 35. Thank you for your time! Spencer McIntyre Email: SMcIntyre@SecureState.com Twitter: @zeroSteiner Termineter Homepage: http://code.google.com/p/termineter 3 5 Q U E S T I O N S A N S W E R S