SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
SHODAN

Computer Search Engine for the
Internet of Things
Amphion Forum
San Francisco
12 December, 2013

Shawn Merdinger
Network Security Analyst
University of Florida Health
Obligatory Speaker Slide
●

UF Health
–

●

Past lives
–

●

Work, School, Independent Research
Cisco Systems, TippingPoint, Independent Consulting

CVEs, Research, Conferences
–

VoIP, door access controllers, scada HMI, “other stuff”

–

Current interests
●
●

–

Medical device security research - MedSec on LinkedIN
Shodan

Talks at DerbyCon, DefCon, Educause, etc.
What is Shodan
●

Computer Search Engine
–

Created by John Matherly
●
●

Based in Austin, TX
Public late 2009

–

“Search engine for service banners of scanned
devices accessible via the public Internet”

–

Somewhat controversial...
●

●

Major media coverage, security conference talks, DHS
ICS-CERT advisories, political leaders naming as threat
Tool: utility and outcome are dependent on use and intent
Shodan Technicals
●

Shodan Scans
–

Shodan servers scan Internet, place results in DB
●
●

●

Users search Shodan
–

Web interface or API
●

●

Services (web, telnet, snmp, ftp, mysql, rdp, vnc etc.)
Ports (80, 8080, 443, 161, 21, 23, 3389, 5900, etc)

Free-text, port, org, hostname, country, city, CIDR, etc.

Advanced Integration
●
●
●

Metasploit Shodan Module (John Sawyer, InGuardians)
Maltego
Geolocation mapping via http://maps.shodan.io (beta)
Why You Should Care
●

Shodan has already scanned...everything?
–

Shodan API

–

Shodan's low-cost extras
●
●

–

The business case
●
●

–

Add-ons for in-depth search capability (i.e. Telnet search)
Special discount code for Amphion Forum at end :)
Metrics & deltas with your regular scanning efforts
Export search results for other tools, analysis

Caveats
●
●

Not under your control, timeliness, IPv4 (no IPv6)
One man show by John Matherley
Who Is Talking About Shodan?

If Joe Lieberman is talking about Shodan, you should know what it is.
Project SHINE – ICS/SCADA
●

Project SHINE: SHodan INtelligence Extraction
–

Bob Radvanovsky & Jake Brodsky infracritical / scadasec
●

I provide research support, search terms, etc.

–

Daily search feed to ICS-CERT

–

1,000,000 control systems discovered, 2K new each day
DHS ICS-CERT Shodan Advisories
●

First issued October 2010

●

Several updates & references since
Keeping Perspective...
●

Scanning is old news
–

Attackers
●
●

Constantly scanning you
Shodan just made scanning more
–

–

Legitimate research
●
●
●

HD Moore's scanning projects
Scan repository at UMich via www.scans.io
Academic researchers doing default credential checks!
–

–

Searchable + visible + accessible....without scanning

Columbia, 2010 (Qui, Stoflo) +500K devices with default credentials

We are entering a Golden Age of scanning
●

Tools like zmap, masscan and scan data sharing
Shodan at UF Health
●

Currently looking for “low-hanging fruit”
–
–

●

Printers on public IP
Open Telnet → “Polycom Command Shell”

Lots of ways to leverage more
–
–

●

Automation
Deltas (daily scan diffs)

Limitations
–

External IP only
Sp00ky Findings
●

●

●

●

The following information details sensitive
devices exposed on the Internet
Please exercise discretion and restraint
regarding further disclosure of these devices
and issues
Several findings are still in varying phases of
resolution and remediation, unfortunately, some
may never be resolved
All are in SHINE and reported to ICS-CERT
S2 Security NetBox
●

DefCon 2010 talk: “We don't need no stinkin' badges”
–

Building Door Access Controllers (Web Based)

–

Multiple CVEs, complete compromise of device, S2 Security
vendor threatened to sue me, even blocked my Twitter follow...

–

Real value of Shodan
●

Proved not “deep inside corporate network” (Today 800+ )

“When hackers put viruses on your home computer it's a nuisance; when they
unlock doors at your facility it's a nightmare”
– John Moss, CEO of S2 Security
VoIP Phones
●

Lots of VoIP phones: individual, conference, video

●

Late 2010 I focused on Snom
–

VOIPSA blog
●

Remote tap script: call via phone's web server, record call, etc.

●

Hard to find open Snom now – Exposure + tool works
No Auth Cisco Routers & Switches
●

"cisco-ios" "last-modified"
–
–

10,469 devices with HTTP No authentication TODAY
Level 15 access via HTTP
●

“ip http authentication local” would lock down web server

●

3rd party attack example: TinyURL commands to Twitter
No Auth Cisco Devices in Iran
●

“School of Particles and Accelerators” in Tehran, Iran
–

Who might be interested in this?

–

Honeypot?
Cisco Wireless LAN Controllers
Banners Bite Back
●

“Best practices” warning banners = easy fingerprinting

●

Swisscom and hotel routers (1200+)
–

Warning banner has company name and hotel location

–

Telnet for access. No SSH.
●

If they run their routers like this - what other poor practices?
Banners Bite Back
●

Swisscom Miami Convention Center Routers
Telnet To Root On Linux Devices
●

TV, DVR, home routers, VoIP phones, refrigerators, etc.

●

Botnets have leveraged this already (Carna, Aidra)
WebCams
●

Huge numbers, all kinds of uses

●

Personal, Office, Business, Security, SCADA

●

See Dan Tentler's talks and tools
–

Camcreep.py
●
●

Auto screenshot via CLI
wkhtmltoimage
Printers on Public IP
●

Technical Risks
–

●

Advanced research (Andrei Costin, Ph.D - Milan, Italy)
–

●

MFP = Multi-function Printer (FAX, Scan, Email, Storage)

Access docs, change configs, attack via printed document

Risks
–

Print from anywhere, Web printing, run out paper, ink

–

Social engineering: how bad could a printer on Internet be?
Printer Case Study: Penn State
One line of code to print: nc target_ip 9100 < kiddy_porn_image
Siemens HMI SCADA Examples
Power Meter via HTTP
High Profile HVAC Controllers
Sidwell Friends School, Washington DC (HVAC, Lights, Doors)
FBI Newark Office: Niagara Memo
Crematorium on Public IP
●

Siemens HMI
–

VNC default pass “100”, no auth Telnet, MD5 passwords

–

Same system as “pr0f” South Houston SCADA hack (11/2011)
Embassy Network Devices
●

Question: What's running telnet in country X with “embassy” in name?

●

Cuts both ways...
Cisco Lawful Intercept
●

Cisco routers with LI special code and SNMP public
“LI User” = level 16 super-duper Cisco admin level. Supposed to be
invisible to any other user. Taps supposed to use encrypted
SNMPv3 for secure Mediation Device comms.
BlueCoat
●

BlueCoat surveillance devices and human rights impact
–

Syria (and other regimes)
●

Tracking + interception of dissidents' communications

●

“Chilling effect” to “Killing effect”

–

ITAR export violations

–

See Munk School report
75+ US TV Stations' Antennas
●

TV station antenna controllers w/ no auth (telnet or http)
–

Looks like simple home NAS or DVR (Windows CE)
●

–

Multi-step search technique to find – (1) Shodan (2) scan for unique TCP port

Sent ICS-CERT report of issues, IP, Geolocation, FCC info, etc.
CacheTalk Safes
Econolite Traffic Light Controller
●

Yes, it is what you think.
Red Light Enforcement Cameras
●

Delete those pesky speeding tickets!
500+ Gas Station Pumps in Turkey
950+ Cellular Tower Hydrogen Fuel
Cell Power Controllers in Italy
Caterpiller VIMS
●

Web based remote monitoring (control?) over cell modem

●

CAT 79X series are largest trucks in world

●

80+ in Alberta, Canada working tar sands

●

Poor vendor response (contacted by lawyer...not engineer)
Medical Devices, EHRs
●

Reported 1st medical devices on public IP to ICS-CERT
–
–

●

Glucose monitor base-station (Roche)
Fetal monitoring remote access solution (Philips)

Increasing numbers of EHR “patient portals” (EPIC MyChart)
Thanks!
●

Contact
–

Email: shawnmer@ufl.edu

–

Twitter @shawnmer

–

LinkedIN MedSec group

Special Shodan package for Amphion Forum!
1. Register for free Shodan account
2. Login, and then activate by visiting unique URL:
http://www.shodanhq.com/amphion

Weitere ähnliche Inhalte

Was ist angesagt?

Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23Chase Schultz
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsCisco Canada
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applicationsSatish b
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?Reality Net System Solutions
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2nnlog2n
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
 

Was ist angesagt? (9)

Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applications
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 

Andere mochten auch

Shodan
ShodanShodan
ShodanTensor
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Bob Radvanovsky
 
Kablosuz Ağlara Yapılan Saldırılar
Kablosuz Ağlara Yapılan SaldırılarKablosuz Ağlara Yapılan Saldırılar
Kablosuz Ağlara Yapılan SaldırılarBGA Cyber Security
 
Shodan
ShodanShodan
ShodanTensor
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psEd Pimentel
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshoptestuser1223
 
Web For Pentester ile Web Uygulama Güvenliğine Giriş
Web For Pentester ile Web Uygulama Güvenliğine GirişWeb For Pentester ile Web Uygulama Güvenliğine Giriş
Web For Pentester ile Web Uygulama Güvenliğine GirişUmut Ergin
 
Web for Pentester 2 ile Web Uygulama Güvenligine Giris
Web for Pentester 2 ile Web Uygulama Güvenligine GirisWeb for Pentester 2 ile Web Uygulama Güvenligine Giris
Web for Pentester 2 ile Web Uygulama Güvenligine GirisUmut Ergin
 
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)Ömer Çıtak
 
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)Ömer Çıtak
 
Bilgi Sistemleri Güvenliği Metasploit
Bilgi Sistemleri Güvenliği MetasploitBilgi Sistemleri Güvenliği Metasploit
Bilgi Sistemleri Güvenliği Metasploitmsoner
 
Introducción al hacking y la seguridad informatica
Introducción al hacking y la seguridad informaticaIntroducción al hacking y la seguridad informatica
Introducción al hacking y la seguridad informaticaLenin Alevski Huerta Arias
 
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)Ömer Çıtak
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingtalktorohit54
 
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...Nextel S.A.
 

Andere mochten auch (20)

Shodan
ShodanShodan
Shodan
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)
 
Kablosuz Ağlara Yapılan Saldırılar
Kablosuz Ağlara Yapılan SaldırılarKablosuz Ağlara Yapılan Saldırılar
Kablosuz Ağlara Yapılan Saldırılar
 
Shodan
ShodanShodan
Shodan
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_ps
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshop
 
SQL Enjeksiyona karşi savunma
SQL Enjeksiyona karşi savunmaSQL Enjeksiyona karşi savunma
SQL Enjeksiyona karşi savunma
 
Sqlmap Analiz
Sqlmap AnalizSqlmap Analiz
Sqlmap Analiz
 
Cosmos_IoT_Week_TV_0
Cosmos_IoT_Week_TV_0Cosmos_IoT_Week_TV_0
Cosmos_IoT_Week_TV_0
 
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
Can Yıldızlı - Koryak Uzan - Fiziksel Sızma Testi (İntelRad)
 
Web For Pentester ile Web Uygulama Güvenliğine Giriş
Web For Pentester ile Web Uygulama Güvenliğine GirişWeb For Pentester ile Web Uygulama Güvenliğine Giriş
Web For Pentester ile Web Uygulama Güvenliğine Giriş
 
Web for Pentester 2 ile Web Uygulama Güvenligine Giris
Web for Pentester 2 ile Web Uygulama Güvenligine GirisWeb for Pentester 2 ile Web Uygulama Güvenligine Giris
Web for Pentester 2 ile Web Uygulama Güvenligine Giris
 
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)
 
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)
 
Bilgi Sistemleri Güvenliği Metasploit
Bilgi Sistemleri Güvenliği MetasploitBilgi Sistemleri Güvenliği Metasploit
Bilgi Sistemleri Güvenliği Metasploit
 
Introducción al hacking y la seguridad informatica
Introducción al hacking y la seguridad informaticaIntroducción al hacking y la seguridad informatica
Introducción al hacking y la seguridad informatica
 
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
 

Ähnlich wie Discover Internet-Connected Devices with Shodan Computer Search Engine

Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busbyDavid Busby, CISSP
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platformsBen Tullis
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 
HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!F _
 
Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)Ken Belva
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
U Plug, We Play - NED Summit. Cork, Ireland
U Plug, We Play - NED Summit. Cork, IrelandU Plug, We Play - NED Summit. Cork, Ireland
U Plug, We Play - NED Summit. Cork, IrelandDTM Security
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Brian Proctor - GICSP, CISSP, CRISC
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringSuraj Khetani
 
Internet of things - what is really happening
Internet of things - what is really happeningInternet of things - what is really happening
Internet of things - what is really happeningThor Henning Hetland
 
WiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon SonyaWiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon SonyaEC-Council
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 

Ähnlich wie Discover Internet-Connected Devices with Shodan Computer Search Engine (20)

Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platforms
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!
 
Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
U Plug, We Play - NED Summit. Cork, Ireland
U Plug, We Play - NED Summit. Cork, IrelandU Plug, We Play - NED Summit. Cork, Ireland
U Plug, We Play - NED Summit. Cork, Ireland
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Internet of things - what is really happening
Internet of things - what is really happeningInternet of things - what is really happening
Internet of things - what is really happening
 
WiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon SonyaWiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon Sonya
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Hacking
HackingHacking
Hacking
 

Kürzlich hochgeladen

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Kürzlich hochgeladen (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Discover Internet-Connected Devices with Shodan Computer Search Engine

  • 1. SHODAN Computer Search Engine for the Internet of Things Amphion Forum San Francisco 12 December, 2013 Shawn Merdinger Network Security Analyst University of Florida Health
  • 2. Obligatory Speaker Slide ● UF Health – ● Past lives – ● Work, School, Independent Research Cisco Systems, TippingPoint, Independent Consulting CVEs, Research, Conferences – VoIP, door access controllers, scada HMI, “other stuff” – Current interests ● ● – Medical device security research - MedSec on LinkedIN Shodan Talks at DerbyCon, DefCon, Educause, etc.
  • 3. What is Shodan ● Computer Search Engine – Created by John Matherly ● ● Based in Austin, TX Public late 2009 – “Search engine for service banners of scanned devices accessible via the public Internet” – Somewhat controversial... ● ● Major media coverage, security conference talks, DHS ICS-CERT advisories, political leaders naming as threat Tool: utility and outcome are dependent on use and intent
  • 4. Shodan Technicals ● Shodan Scans – Shodan servers scan Internet, place results in DB ● ● ● Users search Shodan – Web interface or API ● ● Services (web, telnet, snmp, ftp, mysql, rdp, vnc etc.) Ports (80, 8080, 443, 161, 21, 23, 3389, 5900, etc) Free-text, port, org, hostname, country, city, CIDR, etc. Advanced Integration ● ● ● Metasploit Shodan Module (John Sawyer, InGuardians) Maltego Geolocation mapping via http://maps.shodan.io (beta)
  • 5. Why You Should Care ● Shodan has already scanned...everything? – Shodan API – Shodan's low-cost extras ● ● – The business case ● ● – Add-ons for in-depth search capability (i.e. Telnet search) Special discount code for Amphion Forum at end :) Metrics & deltas with your regular scanning efforts Export search results for other tools, analysis Caveats ● ● Not under your control, timeliness, IPv4 (no IPv6) One man show by John Matherley
  • 6. Who Is Talking About Shodan? If Joe Lieberman is talking about Shodan, you should know what it is.
  • 7. Project SHINE – ICS/SCADA ● Project SHINE: SHodan INtelligence Extraction – Bob Radvanovsky & Jake Brodsky infracritical / scadasec ● I provide research support, search terms, etc. – Daily search feed to ICS-CERT – 1,000,000 control systems discovered, 2K new each day
  • 8. DHS ICS-CERT Shodan Advisories ● First issued October 2010 ● Several updates & references since
  • 9. Keeping Perspective... ● Scanning is old news – Attackers ● ● Constantly scanning you Shodan just made scanning more – – Legitimate research ● ● ● HD Moore's scanning projects Scan repository at UMich via www.scans.io Academic researchers doing default credential checks! – – Searchable + visible + accessible....without scanning Columbia, 2010 (Qui, Stoflo) +500K devices with default credentials We are entering a Golden Age of scanning ● Tools like zmap, masscan and scan data sharing
  • 10. Shodan at UF Health ● Currently looking for “low-hanging fruit” – – ● Printers on public IP Open Telnet → “Polycom Command Shell” Lots of ways to leverage more – – ● Automation Deltas (daily scan diffs) Limitations – External IP only
  • 11.
  • 12.
  • 13. Sp00ky Findings ● ● ● ● The following information details sensitive devices exposed on the Internet Please exercise discretion and restraint regarding further disclosure of these devices and issues Several findings are still in varying phases of resolution and remediation, unfortunately, some may never be resolved All are in SHINE and reported to ICS-CERT
  • 14. S2 Security NetBox ● DefCon 2010 talk: “We don't need no stinkin' badges” – Building Door Access Controllers (Web Based) – Multiple CVEs, complete compromise of device, S2 Security vendor threatened to sue me, even blocked my Twitter follow... – Real value of Shodan ● Proved not “deep inside corporate network” (Today 800+ ) “When hackers put viruses on your home computer it's a nuisance; when they unlock doors at your facility it's a nightmare” – John Moss, CEO of S2 Security
  • 15. VoIP Phones ● Lots of VoIP phones: individual, conference, video ● Late 2010 I focused on Snom – VOIPSA blog ● Remote tap script: call via phone's web server, record call, etc. ● Hard to find open Snom now – Exposure + tool works
  • 16. No Auth Cisco Routers & Switches ● "cisco-ios" "last-modified" – – 10,469 devices with HTTP No authentication TODAY Level 15 access via HTTP ● “ip http authentication local” would lock down web server ● 3rd party attack example: TinyURL commands to Twitter
  • 17. No Auth Cisco Devices in Iran ● “School of Particles and Accelerators” in Tehran, Iran – Who might be interested in this? – Honeypot?
  • 18. Cisco Wireless LAN Controllers
  • 19. Banners Bite Back ● “Best practices” warning banners = easy fingerprinting ● Swisscom and hotel routers (1200+) – Warning banner has company name and hotel location – Telnet for access. No SSH. ● If they run their routers like this - what other poor practices?
  • 20. Banners Bite Back ● Swisscom Miami Convention Center Routers
  • 21. Telnet To Root On Linux Devices ● TV, DVR, home routers, VoIP phones, refrigerators, etc. ● Botnets have leveraged this already (Carna, Aidra)
  • 22. WebCams ● Huge numbers, all kinds of uses ● Personal, Office, Business, Security, SCADA ● See Dan Tentler's talks and tools – Camcreep.py ● ● Auto screenshot via CLI wkhtmltoimage
  • 23. Printers on Public IP ● Technical Risks – ● Advanced research (Andrei Costin, Ph.D - Milan, Italy) – ● MFP = Multi-function Printer (FAX, Scan, Email, Storage) Access docs, change configs, attack via printed document Risks – Print from anywhere, Web printing, run out paper, ink – Social engineering: how bad could a printer on Internet be?
  • 24. Printer Case Study: Penn State One line of code to print: nc target_ip 9100 < kiddy_porn_image
  • 25. Siemens HMI SCADA Examples
  • 27. High Profile HVAC Controllers Sidwell Friends School, Washington DC (HVAC, Lights, Doors)
  • 28. FBI Newark Office: Niagara Memo
  • 29. Crematorium on Public IP ● Siemens HMI – VNC default pass “100”, no auth Telnet, MD5 passwords – Same system as “pr0f” South Houston SCADA hack (11/2011)
  • 30. Embassy Network Devices ● Question: What's running telnet in country X with “embassy” in name? ● Cuts both ways...
  • 31. Cisco Lawful Intercept ● Cisco routers with LI special code and SNMP public “LI User” = level 16 super-duper Cisco admin level. Supposed to be invisible to any other user. Taps supposed to use encrypted SNMPv3 for secure Mediation Device comms.
  • 32. BlueCoat ● BlueCoat surveillance devices and human rights impact – Syria (and other regimes) ● Tracking + interception of dissidents' communications ● “Chilling effect” to “Killing effect” – ITAR export violations – See Munk School report
  • 33. 75+ US TV Stations' Antennas ● TV station antenna controllers w/ no auth (telnet or http) – Looks like simple home NAS or DVR (Windows CE) ● – Multi-step search technique to find – (1) Shodan (2) scan for unique TCP port Sent ICS-CERT report of issues, IP, Geolocation, FCC info, etc.
  • 35. Econolite Traffic Light Controller ● Yes, it is what you think.
  • 36. Red Light Enforcement Cameras ● Delete those pesky speeding tickets!
  • 37. 500+ Gas Station Pumps in Turkey
  • 38. 950+ Cellular Tower Hydrogen Fuel Cell Power Controllers in Italy
  • 39. Caterpiller VIMS ● Web based remote monitoring (control?) over cell modem ● CAT 79X series are largest trucks in world ● 80+ in Alberta, Canada working tar sands ● Poor vendor response (contacted by lawyer...not engineer)
  • 40. Medical Devices, EHRs ● Reported 1st medical devices on public IP to ICS-CERT – – ● Glucose monitor base-station (Roche) Fetal monitoring remote access solution (Philips) Increasing numbers of EHR “patient portals” (EPIC MyChart)
  • 41. Thanks! ● Contact – Email: shawnmer@ufl.edu – Twitter @shawnmer – LinkedIN MedSec group Special Shodan package for Amphion Forum! 1. Register for free Shodan account 2. Login, and then activate by visiting unique URL: http://www.shodanhq.com/amphion