SlideShare a Scribd company logo
1 of 47
Download to read offline
Looking Into
                                     The Eye
                                   Of The Meter
                                       Don C. Weber
                                     InGuardians, Inc.


Copyright 2012 InGuardians, Inc.                         1
Cutaway and InGuardians




  http://www.linkedin.com/in/cutaway   http://inguardians.com/info
Copyright 2012 InGuardians, Inc.                                     2
Smart Meter Research Findings




                        REDACTED

Copyright 2012 InGuardians, Inc.           3
Research Disclaimer
             • Yes, I conduct assessments on AMI
               components
             • No, I will not tell you for which
               clients
             • No, I will not tell you which vendor
               products I have analyzed
             • Yes, many of these images are
               generic
Copyright 2012 InGuardians, Inc.                         4
Danger Electrocution
   I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions.




                                              Random Image Taken From: http://www.flickr.com/photos/lwr/132854217/

Copyright 2012 InGuardians, Inc.                                                                                     5
Permission-based
                       Research / Penetration Testing
         Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE.
            Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors.
     I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions.




Copyright 2012 InGuardians, Inc.                                                                     6
Agenda

             • Purpose
             • Smart Meters
             • Criminals and Smart
               Meters
             • Attack/Assessment
             • Optical Tool
             • Mitigations

                           Not So Random Image Taken From: http://www.willhackforsushi.com/?p=349
Copyright 2012 InGuardians, Inc.                                                                    7
Purpose: Presentation and Toolkit
   • Smart Meter data acquisition techniques
     have been known since January 5, 2009
           – Advanced Metering Infrastructure Attack
             Methodology [1]
           – Some vendors/utilities/people/teams are still not
             aware
   • Tools to:
           – Test functionality
           – Validate configuration
           – Generate anomalous data
                                   [1] http://inguardians.com/pubs/AMI_Attack_Methodology.pdf
Copyright 2012 InGuardians, Inc.                                                                8
What Criminals Can Attack




       • Access and change data on meter
       • Gain access to wireless communications
       • Subvert field hardware to impact internal
         resources
Copyright 2012 InGuardians, Inc.                     9
Criminal Interest
       •     Free or Reduced Energy              HAS ALREADY
       •     Corporate Espionage                 OCCURRED VIA
                                                 OPTICAL PORT
       •     Access To Back-End Resources
       •     Non-Kinetic Attack
       •     Hacktivism




Copyright 2012 InGuardians, Inc.                                10
Aggregator On Poletop




                                            Random Image Taken From:
                                            http://www.blogcdn.com/www.engadget.com/
                                            media/2009/12/091204-smartgrid-01.jpg



Copyright 2012 InGuardians, Inc.                                                 11
Only One Winks At You




Copyright 2012 InGuardians, Inc.                   12
Where To Start?
                        Steal This?
 State of Texas: Class B Misdemeanor Theft - $50 to $500
            Jail <180 Days and/or Fine <$2000




 Meter near my barber shop. The exposed contacts scared me.

Copyright 2012 InGuardians, Inc.                              13
Components and Interaction
                               DANGER!!!

                                                                    • Data At Rest
                                                                          – Microcontrollers
                                                                          – Memory
                                                                          – Radios
                                                                    • Data In Motion
                                                                          –   MCU to Radio
                                                                          –   MCU to MCU
                                                                          –   MCU to Memory
                                                                          –   Board to Board
                                                                          –   IR to MCU
                                      Image Take From: http://www.ifixit.com/Teardown/XXXXXXX-Smart-Meter-Teardown/5710/1

Copyright 2012 InGuardians, Inc.                                                                                     14
Data At Rest
                   SPI/I2C Serial/
                   Parallel EEPROM –
                   PDIP/SOIJ/SOIC




                                        NAND/NOR/NVRAM/SRAM/
                                        CellularRAM/PSRAM/SuperFlash/
                                        DataFlash – BGA/FBGA/VFBGA
Copyright 2012 InGuardians, Inc.                                        15
Dumping Memory

    Total Phase Aardvark                                   Xeltek SuperPro 5000
        Flash Utility                                          plus Adapter



                                       Custom Extractors




Copyright 2012 InGuardians, Inc.                                              16
Memory Layout Logic
  • Data Storage Standards
          – C12.19 Tables in Transit
                  • Standard Tables –
                    formatted and documented
                  • Manufacturer Tables –
                    formatted but not
                    externally documented
          – Custom
                  • Obfuscated Information
                    and Tables
                  • Extended memory for
                    firmware
                  • SWAP Space

Copyright 2012 InGuardians, Inc.                         17
Data In Motion

                                           Component To Component




         Board to Board

                                             Random image take from some random Internet site

Copyright 2012 InGuardians, Inc.                                                                18
Data Eavesdropping – Step One




           Simple Tapping with Logic Analyzer

Copyright 2012 InGuardians, Inc.                19
Data Eavesdropping – Step Two
      Persistent tapping by
      soldering leads to
      components




   Provides consistent
   monitoring for research
   and development
Copyright 2012 InGuardians, Inc.   20
ANSI C12 Communication Protocols

                                   C12.21: Is Worse –
                                   because people
                                   think it is “secure”




                                                          C12.22: ANSI
     C12.18: Is Okay –                                    committee has
     because you know                                     stated vendors
     what you are                                         should be
     getting.                                             implementing this
Copyright 2012 InGuardians, Inc.                                          21
Logic Analyzer - Async Serial
                                   • Analyzers can decode digital signal
                                   • Export data to CSV formatted files




    C12.21
    Identification                       OK                                   End-of-list
    Service                                    Standard
    Response                                   0x00 == C12.18     Version
    Packet                                     0x02 == C12.21               Revision
Copyright 2012 InGuardians, Inc.                                                       22
C12.18 Packet Basics
                           C12.21 Identification Service Request Packet

                                                            •   Start packet character
                                                            •   Identity
                                                            •   Control Field
                                                            •   Sequence Number
                                                            •   Length
                                                            •   Data
                                                                 – Identification Service
                                                            • CCITT CRC




Copyright 2012 InGuardians, Inc.                                                            23
C12.18 Protocol Basics
                                     • C12.18 Request/Response
                                       Pattern
                                       – Identification
                                       – Negotiation
                                       – Logon
                                       – Security
                                       – Action (Read, Write,
                                         Procedure)
                                       – Logoff
                                       – Terminate

Copyright 2012 InGuardians, Inc.                                 24
CSV Parser Functionality




Copyright 2012 InGuardians, Inc.                    25
Replay Tables To Talk To Tables




Copyright 2012 InGuardians, Inc.                      26
Advanced Persistent Tether
                                   • Serial Transmitter
                                     – Receive possible
                                   • Replay C12.18 Packets
                                   • C12.19 Table Interaction
                                     – Read Tables
                                     – Write Tables
                                     – Run Procedures
                                   • Receive Responses via
                                     Logical Analyzer
                                   • Parse Responses by Hand
Copyright 2012 InGuardians, Inc.                            27
Hardware Client Functionality




Copyright 2012 InGuardians, Inc.              28
Wink! Wink! Wink! Wink!




Copyright 2012 InGuardians, Inc.                  29
Lean In For A Closer Look




Copyright 2012 InGuardians, Inc.                  30
ANSI Type 2 Optical Port:
                 Not Your Typical Infra-red Port
                                     Remote Control
                                     Devices




                                   Provides
                                   /dev/ttyUSB0
                                   via FTDI chip


Copyright 2012 InGuardians, Inc.                      31
Open Source Optical Probe?


                                    http://iguanaworks.net/




Copyright 2012 InGuardians, Inc.                              32
What Do We Need To Do This?

             • Serial Transceiver Driver
             • C12.18 Packet Driver
             • C12.18 Client
                     – Reads and parses C12.19 Tables
                     – Writes to C12.19 Tables
                     – Runs C12.19 Procedures
                     – Easy Function Updates
                     – Easy Access To All Functions
Copyright 2012 InGuardians, Inc.                        33
OptiGuard
           A Smart Meter Assessment Toolkit




                                   Image borrowed from: http://www.geekologie.com/2011/01/windows_to_the_soul_eyeball_cl.php

Copyright 2012 InGuardians, Inc.                                                                                         34
Permission-based
                       Research / Penetration Testing
         Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE.
            Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors.
     I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions.




Copyright 2012 InGuardians, Inc.                                                                     35
OptiGuard Menu
                                           • Notes
                                              – Requires a VALID C12.18
                                                Security Code to modify
                                                tables or run procedures
                                              – Currently only works with some
                                                meters
                                              – Vendor specific functions may be
                                                required
                                              – C12.18 functions are coded for
                                                easy implementation and
                                                modification
                                              – Optical transfer is finicky and
                                                fuzzing / brute forcing is hit or
                                                miss and must be monitored
                                              – Brute force procedure runs have
                                                been known to
                                                disconnect/connect meters
                                              – Brute force procedure runs have
                                                been known to brick meters
Copyright 2012 InGuardians, Inc.                                                    36
Using The Eye Chart




                 •     Can check one code ~ every 2 seconds
                 •     12277 x 2 seconds = 409 minutes = 6.8 hours
                 •     Hmmm, are failed logons logged?
                 •     Does the meter return an error after N attempts
Copyright 2012 InGuardians, Inc.                                         37
Open Wide for a Deep Look Inside




                                   Random Image Taken From:
                                   http://www.gonemovies.com/www/Hoofd/A/PhotoLarge.php?Keuze=KubrickClockwork

Copyright 2012 InGuardians, Inc.                                                                                 38
Mitigations - General
       • Residential meters on businesses
               – Evaluate for increased risk to client
       • Limit Shared Security Codes
               – Difficult to implement a single security
                 per meter
               – Can vary in numerous ways:
                       • Vendor
                       • Commercial and Residential meter
                       • Zip Code
Copyright 2012 InGuardians, Inc.                            39
Mitigations – General (2)

             • Incident Response Planning
                     – Prioritize Critical Field Assets
                     – Incident Response Plan and Training
             • Employee Training
                     – Identify
                     – Report
                     – Respond

Copyright 2012 InGuardians, Inc.                             40
Mitigations - Physical

             • Tamper Alerts
                     – May seem overwhelming, initially
                     – Experience will identify correlating
                       data to escalate appropriately
             • Toggle Optical Port
                     – Use a switch that activates optical
                       interface
                     – Should generate a tamper alert

Copyright 2012 InGuardians, Inc.                              41
Mitigations – Data At Rest

         • Secure Data Storage
                 – Encryption <- must be implemented properly
                 – Hashes <- must be implemented properly
         • Configuration Integrity Checks
                 – Vendor Specific
                 – Some solutions systems already do this
                 – Meters should function with old
                   configuration until approved / denied
Copyright 2012 InGuardians, Inc.                                42
Mitigations – Data In Motion

             • IR Interaction Authorization Tokens
                     – Breaking or Augmenting Standard?
             • Microcontroller to <INSERT HERE>
                     – C12.22
                     – Obfuscated Protocols



Copyright 2012 InGuardians, Inc.                          43
OptiGuard Offspring?
  • Wireless Optical Port Readers
          – Small cheap magnetic devices activated wirelessly
  • Optical Port Spraying
          – IR interaction without touching meter
  • Wireless Hardware Sniffers/MITM
          – Detect updates and modify data in transit
  • Neighborhood Area Network FHSS
    Eavesdropping
          – Channels, Spacing, Modulation, Sync Bytes, Etc
Copyright 2012 InGuardians, Inc.                             44
Vendor Participation

       • The following people helped out in
         various important ways during this
         journey.
               – Ed Beroset, Elster
               – Robert Former, Itron
               – Others who have asked not to be
                 named

Copyright 2012 InGuardians, Inc.                          45
Those Who Must Be Thanked

              Gretchen, Garrison,     Joshua Wright
               and Collier Weber     Matt Carpenter
                Andrew Righter          Tom Liston
                     Atlas          Travis Goodspeed
                Daniel Thanos          InGuardians
                 John Sawyer



Copyright 2012 InGuardians, Inc.                       46
consulting@inguardians.com
               Tell Them Cutaway Sent You




                       Don C. Weber / Cutaway: don@inguardians.com
Copyright 2012 InGuardians, Inc.                                     47

More Related Content

What's hot (8)

Rrb loco-pilot-previous-paper
Rrb loco-pilot-previous-paperRrb loco-pilot-previous-paper
Rrb loco-pilot-previous-paper
 
Hypertension
HypertensionHypertension
Hypertension
 
VLSI industry - Digital Design Engineers - draft version
VLSI industry - Digital Design Engineers - draft versionVLSI industry - Digital Design Engineers - draft version
VLSI industry - Digital Design Engineers - draft version
 
ECLS-SHOCK Trial
ECLS-SHOCK TrialECLS-SHOCK Trial
ECLS-SHOCK Trial
 
Cytosorbents OneMedPlace Presentation 2012
Cytosorbents OneMedPlace Presentation 2012Cytosorbents OneMedPlace Presentation 2012
Cytosorbents OneMedPlace Presentation 2012
 
Timing analysis
Timing analysisTiming analysis
Timing analysis
 
Vigas 05-teórico
Vigas 05-teóricoVigas 05-teórico
Vigas 05-teórico
 
FIRE Trial
FIRE TrialFIRE Trial
FIRE Trial
 

Viewers also liked

How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterEnergySec
 
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...Michael Smith
 
Dutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackDutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackMachiel Joosse
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterzeroSteiner
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityMichael Smith
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)Michael Smith
 
Electromagnetic Hypersensitivity and You
Electromagnetic Hypersensitivity and YouElectromagnetic Hypersensitivity and You
Electromagnetic Hypersensitivity and YouSynack
 

Viewers also liked (7)

How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
 
Dutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackDutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedback
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart Meter
 
DefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency SecurityDefCon 2012 - Sub-1 GHz Radio Frequency Security
DefCon 2012 - Sub-1 GHz Radio Frequency Security
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)
 
Electromagnetic Hypersensitivity and You
Electromagnetic Hypersensitivity and YouElectromagnetic Hypersensitivity and You
Electromagnetic Hypersensitivity and You
 

Similar to DefCon 2012 - Power Smart Meter Hacking

Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Denim Group
 
Hacking Exposed Live: Mobile Targeted Threats
Hacking Exposed Live: Mobile Targeted ThreatsHacking Exposed Live: Mobile Targeted Threats
Hacking Exposed Live: Mobile Targeted ThreatsCrowdStrike
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 RisksSantosh Satam
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierThe Lorenzi Group
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Turning Mobile Apps Into Real Business Opportunity and Success
Turning Mobile Apps Into Real Business Opportunity and SuccessTurning Mobile Apps Into Real Business Opportunity and Success
Turning Mobile Apps Into Real Business Opportunity and SuccessAntenna Software
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBrent Spencer
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyTyler Shields
 
Modzify Investor Presentation
Modzify Investor PresentationModzify Investor Presentation
Modzify Investor PresentationModzify
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsdarach
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsLars Bodenhoff
 
The Wonderful World of Wearables
The Wonderful World of WearablesThe Wonderful World of Wearables
The Wonderful World of WearablesCommonsWare
 

Similar to DefCon 2012 - Power Smart Meter Hacking (20)

Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?
 
Hacking Exposed Live: Mobile Targeted Threats
Hacking Exposed Live: Mobile Targeted ThreatsHacking Exposed Live: Mobile Targeted Threats
Hacking Exposed Live: Mobile Targeted Threats
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Turning Mobile Apps Into Real Business Opportunity and Success
Turning Mobile Apps Into Real Business Opportunity and SuccessTurning Mobile Apps Into Real Business Opportunity and Success
Turning Mobile Apps Into Real Business Opportunity and Success
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
Modzify Investor Presentation
Modzify Investor PresentationModzify Investor Presentation
Modzify Investor Presentation
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.js
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
The Wonderful World of Wearables
The Wonderful World of WearablesThe Wonderful World of Wearables
The Wonderful World of Wearables
 

More from Michael Smith

DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsDHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsMichael Smith
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)Michael Smith
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)Michael Smith
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerMichael Smith
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeMichael Smith
 
DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)Michael Smith
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)Michael Smith
 
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKDefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKMichael Smith
 
DefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersDefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersMichael Smith
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesMichael Smith
 
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsMichael Smith
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksMichael Smith
 
DefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYDefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYMichael Smith
 
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingDefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingMichael Smith
 
DefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersDefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersMichael Smith
 
DefCon 2012 - Finding Firmware Vulnerabilities
DefCon 2012 - Finding Firmware VulnerabilitiesDefCon 2012 - Finding Firmware Vulnerabilities
DefCon 2012 - Finding Firmware VulnerabilitiesMichael Smith
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataMichael Smith
 

More from Michael Smith (17)

DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsDHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides)
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
 
DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)DefCon 2012 - Hardware Backdooring (White Paper)
DefCon 2012 - Hardware Backdooring (White Paper)
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)
 
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAKDefCon 2012 - Firmware Vulnerability Hunting with FRAK
DefCon 2012 - Firmware Vulnerability Hunting with FRAK
 
DefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water MetersDefCon 2011 - Vulnerabilities in Wireless Water Meters
DefCon 2011 - Vulnerabilities in Wireless Water Meters
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over Powerlines
 
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
 
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM AttacksDefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
 
DefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPYDefCon 2012 - Bluetooth Monitoring With SCAPY
DefCon 2012 - Bluetooth Monitoring With SCAPY
 
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows HackingDefCon 2012 - Owned In 60 Seconds - Windows Hacking
DefCon 2012 - Owned In 60 Seconds - Windows Hacking
 
DefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO RoutersDefCon 2012 - Rooting SOHO Routers
DefCon 2012 - Rooting SOHO Routers
 
DefCon 2012 - Finding Firmware Vulnerabilities
DefCon 2012 - Finding Firmware VulnerabilitiesDefCon 2012 - Finding Firmware Vulnerabilities
DefCon 2012 - Finding Firmware Vulnerabilities
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android Data
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

DefCon 2012 - Power Smart Meter Hacking

  • 1. Looking Into The Eye Of The Meter Don C. Weber InGuardians, Inc. Copyright 2012 InGuardians, Inc. 1
  • 2. Cutaway and InGuardians http://www.linkedin.com/in/cutaway http://inguardians.com/info Copyright 2012 InGuardians, Inc. 2
  • 3. Smart Meter Research Findings REDACTED Copyright 2012 InGuardians, Inc. 3
  • 4. Research Disclaimer • Yes, I conduct assessments on AMI components • No, I will not tell you for which clients • No, I will not tell you which vendor products I have analyzed • Yes, many of these images are generic Copyright 2012 InGuardians, Inc. 4
  • 5. Danger Electrocution I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. Random Image Taken From: http://www.flickr.com/photos/lwr/132854217/ Copyright 2012 InGuardians, Inc. 5
  • 6. Permission-based Research / Penetration Testing Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE. Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors. I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. Copyright 2012 InGuardians, Inc. 6
  • 7. Agenda • Purpose • Smart Meters • Criminals and Smart Meters • Attack/Assessment • Optical Tool • Mitigations Not So Random Image Taken From: http://www.willhackforsushi.com/?p=349 Copyright 2012 InGuardians, Inc. 7
  • 8. Purpose: Presentation and Toolkit • Smart Meter data acquisition techniques have been known since January 5, 2009 – Advanced Metering Infrastructure Attack Methodology [1] – Some vendors/utilities/people/teams are still not aware • Tools to: – Test functionality – Validate configuration – Generate anomalous data [1] http://inguardians.com/pubs/AMI_Attack_Methodology.pdf Copyright 2012 InGuardians, Inc. 8
  • 9. What Criminals Can Attack • Access and change data on meter • Gain access to wireless communications • Subvert field hardware to impact internal resources Copyright 2012 InGuardians, Inc. 9
  • 10. Criminal Interest • Free or Reduced Energy HAS ALREADY • Corporate Espionage OCCURRED VIA OPTICAL PORT • Access To Back-End Resources • Non-Kinetic Attack • Hacktivism Copyright 2012 InGuardians, Inc. 10
  • 11. Aggregator On Poletop Random Image Taken From: http://www.blogcdn.com/www.engadget.com/ media/2009/12/091204-smartgrid-01.jpg Copyright 2012 InGuardians, Inc. 11
  • 12. Only One Winks At You Copyright 2012 InGuardians, Inc. 12
  • 13. Where To Start? Steal This? State of Texas: Class B Misdemeanor Theft - $50 to $500 Jail <180 Days and/or Fine <$2000 Meter near my barber shop. The exposed contacts scared me. Copyright 2012 InGuardians, Inc. 13
  • 14. Components and Interaction DANGER!!! • Data At Rest – Microcontrollers – Memory – Radios • Data In Motion – MCU to Radio – MCU to MCU – MCU to Memory – Board to Board – IR to MCU Image Take From: http://www.ifixit.com/Teardown/XXXXXXX-Smart-Meter-Teardown/5710/1 Copyright 2012 InGuardians, Inc. 14
  • 15. Data At Rest SPI/I2C Serial/ Parallel EEPROM – PDIP/SOIJ/SOIC NAND/NOR/NVRAM/SRAM/ CellularRAM/PSRAM/SuperFlash/ DataFlash – BGA/FBGA/VFBGA Copyright 2012 InGuardians, Inc. 15
  • 16. Dumping Memory Total Phase Aardvark Xeltek SuperPro 5000 Flash Utility plus Adapter Custom Extractors Copyright 2012 InGuardians, Inc. 16
  • 17. Memory Layout Logic • Data Storage Standards – C12.19 Tables in Transit • Standard Tables – formatted and documented • Manufacturer Tables – formatted but not externally documented – Custom • Obfuscated Information and Tables • Extended memory for firmware • SWAP Space Copyright 2012 InGuardians, Inc. 17
  • 18. Data In Motion Component To Component Board to Board Random image take from some random Internet site Copyright 2012 InGuardians, Inc. 18
  • 19. Data Eavesdropping – Step One Simple Tapping with Logic Analyzer Copyright 2012 InGuardians, Inc. 19
  • 20. Data Eavesdropping – Step Two Persistent tapping by soldering leads to components Provides consistent monitoring for research and development Copyright 2012 InGuardians, Inc. 20
  • 21. ANSI C12 Communication Protocols C12.21: Is Worse – because people think it is “secure” C12.22: ANSI C12.18: Is Okay – committee has because you know stated vendors what you are should be getting. implementing this Copyright 2012 InGuardians, Inc. 21
  • 22. Logic Analyzer - Async Serial • Analyzers can decode digital signal • Export data to CSV formatted files C12.21 Identification OK End-of-list Service Standard Response 0x00 == C12.18 Version Packet 0x02 == C12.21 Revision Copyright 2012 InGuardians, Inc. 22
  • 23. C12.18 Packet Basics C12.21 Identification Service Request Packet • Start packet character • Identity • Control Field • Sequence Number • Length • Data – Identification Service • CCITT CRC Copyright 2012 InGuardians, Inc. 23
  • 24. C12.18 Protocol Basics • C12.18 Request/Response Pattern – Identification – Negotiation – Logon – Security – Action (Read, Write, Procedure) – Logoff – Terminate Copyright 2012 InGuardians, Inc. 24
  • 25. CSV Parser Functionality Copyright 2012 InGuardians, Inc. 25
  • 26. Replay Tables To Talk To Tables Copyright 2012 InGuardians, Inc. 26
  • 27. Advanced Persistent Tether • Serial Transmitter – Receive possible • Replay C12.18 Packets • C12.19 Table Interaction – Read Tables – Write Tables – Run Procedures • Receive Responses via Logical Analyzer • Parse Responses by Hand Copyright 2012 InGuardians, Inc. 27
  • 28. Hardware Client Functionality Copyright 2012 InGuardians, Inc. 28
  • 29. Wink! Wink! Wink! Wink! Copyright 2012 InGuardians, Inc. 29
  • 30. Lean In For A Closer Look Copyright 2012 InGuardians, Inc. 30
  • 31. ANSI Type 2 Optical Port: Not Your Typical Infra-red Port Remote Control Devices Provides /dev/ttyUSB0 via FTDI chip Copyright 2012 InGuardians, Inc. 31
  • 32. Open Source Optical Probe? http://iguanaworks.net/ Copyright 2012 InGuardians, Inc. 32
  • 33. What Do We Need To Do This? • Serial Transceiver Driver • C12.18 Packet Driver • C12.18 Client – Reads and parses C12.19 Tables – Writes to C12.19 Tables – Runs C12.19 Procedures – Easy Function Updates – Easy Access To All Functions Copyright 2012 InGuardians, Inc. 33
  • 34. OptiGuard A Smart Meter Assessment Toolkit Image borrowed from: http://www.geekologie.com/2011/01/windows_to_the_soul_eyeball_cl.php Copyright 2012 InGuardians, Inc. 34
  • 35. Permission-based Research / Penetration Testing Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE. Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors. I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. Copyright 2012 InGuardians, Inc. 35
  • 36. OptiGuard Menu • Notes – Requires a VALID C12.18 Security Code to modify tables or run procedures – Currently only works with some meters – Vendor specific functions may be required – C12.18 functions are coded for easy implementation and modification – Optical transfer is finicky and fuzzing / brute forcing is hit or miss and must be monitored – Brute force procedure runs have been known to disconnect/connect meters – Brute force procedure runs have been known to brick meters Copyright 2012 InGuardians, Inc. 36
  • 37. Using The Eye Chart • Can check one code ~ every 2 seconds • 12277 x 2 seconds = 409 minutes = 6.8 hours • Hmmm, are failed logons logged? • Does the meter return an error after N attempts Copyright 2012 InGuardians, Inc. 37
  • 38. Open Wide for a Deep Look Inside Random Image Taken From: http://www.gonemovies.com/www/Hoofd/A/PhotoLarge.php?Keuze=KubrickClockwork Copyright 2012 InGuardians, Inc. 38
  • 39. Mitigations - General • Residential meters on businesses – Evaluate for increased risk to client • Limit Shared Security Codes – Difficult to implement a single security per meter – Can vary in numerous ways: • Vendor • Commercial and Residential meter • Zip Code Copyright 2012 InGuardians, Inc. 39
  • 40. Mitigations – General (2) • Incident Response Planning – Prioritize Critical Field Assets – Incident Response Plan and Training • Employee Training – Identify – Report – Respond Copyright 2012 InGuardians, Inc. 40
  • 41. Mitigations - Physical • Tamper Alerts – May seem overwhelming, initially – Experience will identify correlating data to escalate appropriately • Toggle Optical Port – Use a switch that activates optical interface – Should generate a tamper alert Copyright 2012 InGuardians, Inc. 41
  • 42. Mitigations – Data At Rest • Secure Data Storage – Encryption <- must be implemented properly – Hashes <- must be implemented properly • Configuration Integrity Checks – Vendor Specific – Some solutions systems already do this – Meters should function with old configuration until approved / denied Copyright 2012 InGuardians, Inc. 42
  • 43. Mitigations – Data In Motion • IR Interaction Authorization Tokens – Breaking or Augmenting Standard? • Microcontroller to <INSERT HERE> – C12.22 – Obfuscated Protocols Copyright 2012 InGuardians, Inc. 43
  • 44. OptiGuard Offspring? • Wireless Optical Port Readers – Small cheap magnetic devices activated wirelessly • Optical Port Spraying – IR interaction without touching meter • Wireless Hardware Sniffers/MITM – Detect updates and modify data in transit • Neighborhood Area Network FHSS Eavesdropping – Channels, Spacing, Modulation, Sync Bytes, Etc Copyright 2012 InGuardians, Inc. 44
  • 45. Vendor Participation • The following people helped out in various important ways during this journey. – Ed Beroset, Elster – Robert Former, Itron – Others who have asked not to be named Copyright 2012 InGuardians, Inc. 45
  • 46. Those Who Must Be Thanked Gretchen, Garrison, Joshua Wright and Collier Weber Matt Carpenter Andrew Righter Tom Liston Atlas Travis Goodspeed Daniel Thanos InGuardians John Sawyer Copyright 2012 InGuardians, Inc. 46
  • 47. consulting@inguardians.com Tell Them Cutaway Sent You Don C. Weber / Cutaway: don@inguardians.com Copyright 2012 InGuardians, Inc. 47