SlideShare a Scribd company logo
1 of 66
Download to read offline
www.ernw.de
Paparazzi over IP
Daniel Mende
dmende@ernw.de
www.ernw.de
Who we are ¬ Old-school network geeks,
working as security researchers for
Germany based ERNW GmbH
 Independent
 Deep technical knowledge
 Structured (assessment) approach
 Business reasonable recommendations
 We understand corporate
¬ Blog: www.insinuator.net
¬ Conference: www.troopers.de
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #2
www.ernw.de
Agenda
¬ Intro
¬ Transport Protocols
¬ Communication Modes & Attacks
¬ Conclusions
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #3
www.ernw.de
Intro
¬ A number of current high-end
cameras have network interfaces.
¬ We did some research as for their
security and potential attack paths.
¬ In the following we focus on Canons
new flagship EOS 1D X, but similar
problems might be found in other
models, of other vendors, too.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #4
www.ernw.de
The Camera
Canon EOS-1D X
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #5
www.ernw.de
The Camera
¬ From Canon USA:
 A built in Ethernet port allows for fast,
easy transfer of images directly to a
PC or via a network to clients from live
events.
 The EOS-1D X is compatible with the
new WFT-E6A Wireless File
Transmitter for wireless LAN transfer
with the IEEE 802.11 a/b/g/n
standards.
A Bit of Marketing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #6
www.ernw.de
The Camera
The Ethernet Port
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #7
www.ernw.de
The Camera
WLAN Adapter
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #8
www.ernw.de
The Target
aka. Mr. Reuters
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #9
www.ernw.de
The Target
¬ One could get the real, unedited
images first.
¬ One could upload (bad) images.
¬ One could turn the camera into a
surveillance device.
What if
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #10
www.ernw.de
Transport
The underlying Protocols
www.ernw.de
Transport
¬ Wired LAN via built-in Ethernet
port or Wireless LAN via WFT-E6A.
¬ Standard TCP/IP (no IPv6, yet).
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #12
www.ernw.de
Traditional Attacks
¬ ARP-spoofing possible.
 No “sticky” ARP entries
¬ ARP-flooding with ~100 packets
per second DoS the network stack.
¬ Btw. stack also dies if IPv6
(multicast) is present.
Layer 2
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #13
www.ernw.de
Traditional Attacks
¬ TCP/IP is used for all network
communication.
¬ Established connections can be
killed via TCP-RST.
Layer 3/4
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #14
www.ernw.de
Communication Modes
www.ernw.de
Communication Modes
¬ FTP Upload Mode
¬ DLNA
¬ Built-in webserver
¬ EOS Utility
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #16
www.ernw.de
FTP Upload Mode
www.ernw.de
FTP Upload Mode
¬ Target server and credentials
configured on camera.
¬ Photos taken are uploaded to the
server immediately.
Mode of operation
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #18
www.ernw.de
FTP Upload Mode
¬ As FTP is clear text, credentials
can be sniffed.
¬ As well as the complete data
transmission
¬ Uploaded pictures can be extracted
from network traffic.
Downside
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #19
www.ernw.de
FTP Upload Mode
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #20
www.ernw.de
FTP Upload Mode
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #21
www.ernw.de
DLNA mode
www.ernw.de
DLNA mode
¬ Digital Living Network Alliance®
¬ UPnP used for discovery.
¬ DLNA guidelines for file formats,
encodings, resolutions.
¬ HTTP and XML used to access
media.
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #23
www.ernw.de
DLNA mode
¬ No authentication.
¬ No restrictions.
¬ Every DLNA client can download _all_
images.
¬ Your Browser could be a DLNA client.
Or somebody else's browser. For your
camera.
Cons
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #24
www.ernw.de
Built-in webserver
Always a good idea…
www.ernw.de
Built-in webserver
¬ Wireless File Transmitter Server
Mode.
¬ Canon USA:
“Use a web browser to capture,
view and download images
remotely”
Canon WFT Server
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #26
www.ernw.de
Built-in webserver
¬ Browser interface uses AJAX.
¬ Embedded webserver only capable
of HTTP GET method.
 Every other request method is
answered with a 404.
Canon WFT Server
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #27
www.ernw.de
Built-in webserver
¬ Authentication via HTTP Basic
(RFC 2617) on login page.
¬ Session cookie is used afterwards.
¬ Cookie looks like sessionID=40b1
 4 (!!!) byte Session ID
 65535 possible IDs
Authentication
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #28
www.ernw.de
Built-in webserver
¬ Session ID Brute force
implemented in 6 lines of python.
¬ To check for all possible IDs takes
about 20 minutes.
 Embedded Webserver is not that
responsive.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #29
www.ernw.de
import requests
target_uri = 'http://192.168.1.103/api/cam/lvoutput'
target_string = 'SESSION_ERR'
for i in xrange(0xffff):
if (i != 0 and i%1000 == 0):
print str(i) + 'IDs checked'
r = requests.get(target_uri, cookies={'sessionID': '%x' %i})
if r.text.find(target_string) == -1:
print 'SessionID is : sessionID=%x' %i
break
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #30
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #31
www.ernw.de
Built-in webserver
¬ Full access to Live View, stored
photos and camera settings.
¬ You surf – We brute.
recap
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #32
www.ernw.de
Built-in webserver
¬ Camera in WFT Server mode.
¬ Valid session opened by user.
¬ Some minutes of time.
Requirements
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #33
www.ernw.de
EOS Utility mode
aka. I wanna be root
www.ernw.de
EOS Utility mode
The Utility
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #35
www.ernw.de
EOS Utility mode
The Utility
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #36
www.ernw.de
EOS Utility mode
¬ Allows remote control of all non-
manual camera functions.
¬ Pictures can be up- and
downloaded.
¬ Possibly even more (sound
recording anyone?)
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #37
www.ernw.de
EOS Utility mode
¬ SSDP and MDNS used for
discovery.
¬ PTP/IP used for communication.
¬ Needs initial camera <-> software
pairing.
Technical
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #38
www.ernw.de
EOS Utility mode
¬ At first use, credentials needs to be
exchanged between the camera
and the client software.
¬ Camera must be put into pairing
mode via camera menu.
¬ Camera signals the need for
pairing via MDNS.
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #39
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #40
www.ernw.de
EOS Utility mode
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #41
www.ernw.de
EOS Utility mode
¬ Client software connects to camera
via PTP/IP.
¬ PTP/IP Authentication is
successful regardless of the
credentials.
¬ Credentials (hostname, GUID) are
stored on the camera.
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #42
www.ernw.de
PTP/IP
Feels like USBoIP )-:
www.ernw.de
PTP/IP
¬ Picture Transfer Protocol over
Internet Protocol.
¬ ISO 15740.
¬ Standardized by International
Imaging Industry Association
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #44
www.ernw.de
PTP/IP
¬ Wrapper for PTP with header:
4 byte length (little endian)
4 byte type (little endian)
data
Packet format
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #45
www.ernw.de
PTP/IP
Layering
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #46
www.ernw.de
PTP/IP
¬ PTPIP_INIT_COMMAND_REQUEST
 Includes authentication data:
16 byte GUID
hostname string
Authentication
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #47
www.ernw.de
PTPIP_INIT_COMMAND_REQUEST
2a 00 00 00 01 00 00 00 eb 7a 78 9d 69 cb 64 4e
a3 e0 fc 96 ef 59 79 42 73 00 65 00 72 00 76 00
65 00 72 00 00 00 00 00 01 00
Paket length = 42 byte
Paket type = 0x01 = PTPIP_INIT_COMMAND_REQUEST
GUID
Hostname = “server” @ utf16
Trailer
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #48
www.ernw.de
PTP
www.ernw.de
PTP
¬ Picture Transfer Protocol
¬ Standardized by International
Imaging Industry Association
¬ ISO 15740
¬ Lots of proprietary vendor
extensions.
Explained
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #50
www.ernw.de
PTP
¬ Designed for use over USB
¬ Fixed length
¬ 2 byte Msg Code
¬ 4 byte Session ID
¬ 4 byte Transaction ID
¬ 5 times 4 byte Parameter or Data
Packet format
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #51
www.ernw.de
PTP
¬ Lot of standardized codes like:
 PTP_GetDeviceInfo
 PTP_OpenSession
 PTP_CloseSession
 PTP_GetStorageIDs
¬ Also Vendor specific codes like:
 PTP_CANON_GetCustomizeSpec
 PTP_CANON_GetCustomizeItemInfo
Message Codes
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #52
www.ernw.de
PTP
¬ Thankfully there are some
implementations around.
¬ We decided to go with libgphoto2.
¬ Basic PTP/IP support is included
as well.
Use of
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #53
www.ernw.de
The Attack
aka. gottcha
www.ernw.de
Attack
¬ Client Hostname easy
discoverable, but not needed.
 Camera also excepts connections with
a different hostname.
¬ GUID unknown to client software.
¬ Obfuscated GUID is broadcasted by
the cam via UPNP.
Getting the Credentials
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #55
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #56
www.ernw.de
tmp = mdns_info.getProperties()['tid.canon.com'].split('-')
guid = []
l = lambda s: [ s[i:i+2:] for i in xrange(0,len(s),2) ][::-1]
for i in xrange(0,3):
guid += l(tmp[i])
guid += tmp[3]
guid += tmp[4]
guid = "".join(guid)
guid = eb7a789d69cb644ea3e0fc96ef597942
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #57
www.ernw.de
The Attack
¬ Camera only allows one
connection.
¬ Already connected client needs to
be disconnected.
¬ TCP-RST the established PTP/IP
connection.
Connecting to the Camera
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #58
www.ernw.de
Attack
¬ Listen for the Cam on MDNS.
¬ De-obfuscate Authentication data.
¬ Disconnect connected Client
Software.
¬ Connect via PTP/IP.
¬ Have Phun (-;
Process
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #59
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #60
www.ernw.de
Attack outlined
¬ Photograph uses hotel / Starbucks
WLAN, which isn’t unlikely during
events (think of Grammy Awards
few days ago).
¬ Almost anybody in the same LAN
can download the images from the
camera (and even more).
So you can write it down
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #61
www.ernw.de
Countermeasures
¬ Enable network functionality only
in trusted Networks.
¬ Use WPA and a secure passphrase
for (your trusted) WLAN.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #62
www.ernw.de
Conclusions ¬ High-end cameras are yet another daily
life item equipped with networking
capabilities incl. full-blown IP stacks.
¬ Once more, their device-specific network
technologies have been designed and
implemented without (too much) security
in mind.
¬ Again, this leads to (classes of) attacks
previously unknown to their non-
networked counterparts.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #63
www.ernw.de
Next Steps
New series of DSLRs (EOS 6D)
 Built-in Wireless Access Point
 New communication protocol for
IOS/Android App
New series of camcorder(XA20, XA25)
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #64
www.ernw.de
There’s never enough time…
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #65
THANK YOU… ...for yours!
www.ernw.de
Questions?
© ERNW GmbH
| Breslauer Str.
28 | D-69124 66

More Related Content

Viewers also liked

Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Alan Carbery
 
andrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolioandrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology PortfolioAndrea Slaven
 
ENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated BibliographyENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated Bibliographyaharrislibrarian
 
Identifying Gifted Students
Identifying Gifted StudentsIdentifying Gifted Students
Identifying Gifted StudentsAngela Housand
 
Europaiunionjeopardy_Englishl
Europaiunionjeopardy_EnglishlEuropaiunionjeopardy_Englishl
Europaiunionjeopardy_Englishlszabjass
 
Citation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCitation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCollege of the Rockies
 
Annotated bibliographies
Annotated bibliographiesAnnotated bibliographies
Annotated bibliographieskhornberger
 
Creating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCreating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCollege of the Rockies
 
Duke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionDuke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionShawn Miller
 
module in english grade 8
module in english grade 8module in english grade 8
module in english grade 8Kyla Basco
 
Grade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyGrade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyMelanio Florino
 

Viewers also liked (14)

Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...
 
andrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolioandrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolio
 
ENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated BibliographyENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated Bibliography
 
ORE Connections February 2010
ORE Connections February 2010ORE Connections February 2010
ORE Connections February 2010
 
Identifying Gifted Students
Identifying Gifted StudentsIdentifying Gifted Students
Identifying Gifted Students
 
Europaiunionjeopardy_Englishl
Europaiunionjeopardy_EnglishlEuropaiunionjeopardy_Englishl
Europaiunionjeopardy_Englishl
 
Citation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCitation Basics for Audio / Visual Material
Citation Basics for Audio / Visual Material
 
My project proposal
My project proposalMy project proposal
My project proposal
 
Annotated bibliographies
Annotated bibliographiesAnnotated bibliographies
Annotated bibliographies
 
Creating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCreating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA Style
 
Duke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionDuke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai Transition
 
module in english grade 8
module in english grade 8module in english grade 8
module in english grade 8
 
Grade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyGrade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 Only
 

Similar to [HES2013] Paparazzi over ip by Daniel Mende

fiware-lab-dev-4.pdf
fiware-lab-dev-4.pdffiware-lab-dev-4.pdf
fiware-lab-dev-4.pdfssuser8c74ba
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymenta8us
 
Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens journalrubezh
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113a8us
 
fiware-lab-dev-3.pdf
fiware-lab-dev-3.pdffiware-lab-dev-3.pdf
fiware-lab-dev-3.pdfssuser8c74ba
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsWes Morgan
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsAll Things Open
 
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...michelemanzotti
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEsAPNIC
 
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Cohesive Networks
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response TimeBoni Bruno
 

Similar to [HES2013] Paparazzi over ip by Daniel Mende (20)

fiware-lab-dev-4.pdf
fiware-lab-dev-4.pdffiware-lab-dev-4.pdf
fiware-lab-dev-4.pdf
 
4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith
 
Profibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy SmithProfibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy Smith
 
W04 Profinet in process automation - Pete Brown, Siemens
W04   Profinet in process automation - Pete Brown, SiemensW04   Profinet in process automation - Pete Brown, Siemens
W04 Profinet in process automation - Pete Brown, Siemens
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deployment
 
Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113
 
fiware-lab-dev-3.pdf
fiware-lab-dev-3.pdffiware-lab-dev-3.pdf
fiware-lab-dev-3.pdf
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting Tools
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting Tools
 
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
 
4. profibus dp pa network design chris mc comb
4. profibus dp pa network design   chris mc comb4. profibus dp pa network design   chris mc comb
4. profibus dp pa network design chris mc comb
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEs
 
Introduction to PROFIBUS for process automation Andy Verwer
Introduction to PROFIBUS for process automation   Andy VerwerIntroduction to PROFIBUS for process automation   Andy Verwer
Introduction to PROFIBUS for process automation Andy Verwer
 
SOME_IP_29408.pdf
SOME_IP_29408.pdfSOME_IP_29408.pdf
SOME_IP_29408.pdf
 
C12 Profinet diagnostics during the entire life cycle of production lines a...
C12   Profinet diagnostics during the entire life cycle of production lines a...C12   Profinet diagnostics during the entire life cycle of production lines a...
C12 Profinet diagnostics during the entire life cycle of production lines a...
 
FBLajSIPScenarior.ppt
FBLajSIPScenarior.pptFBLajSIPScenarior.ppt
FBLajSIPScenarior.ppt
 
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
 
Advantages of a dual sim 4g router.pdf
Advantages of a dual sim 4g router.pdfAdvantages of a dual sim 4g router.pdf
Advantages of a dual sim 4g router.pdf
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response Time
 

More from Hackito Ergo Sum

[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...Hackito Ergo Sum
 
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier MartinHackito Ergo Sum
 
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...Hackito Ergo Sum
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin VernouxHackito Ergo Sum
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” ChiesaHackito Ergo Sum
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...Hackito Ergo Sum
 

More from Hackito Ergo Sum (6)

[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
 
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
 
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
 

Recently uploaded

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 

Recently uploaded (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 

[HES2013] Paparazzi over ip by Daniel Mende

  • 2. www.ernw.de Who we are ¬ Old-school network geeks, working as security researchers for Germany based ERNW GmbH  Independent  Deep technical knowledge  Structured (assessment) approach  Business reasonable recommendations  We understand corporate ¬ Blog: www.insinuator.net ¬ Conference: www.troopers.de 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #2
  • 3. www.ernw.de Agenda ¬ Intro ¬ Transport Protocols ¬ Communication Modes & Attacks ¬ Conclusions 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #3
  • 4. www.ernw.de Intro ¬ A number of current high-end cameras have network interfaces. ¬ We did some research as for their security and potential attack paths. ¬ In the following we focus on Canons new flagship EOS 1D X, but similar problems might be found in other models, of other vendors, too. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #4
  • 5. www.ernw.de The Camera Canon EOS-1D X 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #5
  • 6. www.ernw.de The Camera ¬ From Canon USA:  A built in Ethernet port allows for fast, easy transfer of images directly to a PC or via a network to clients from live events.  The EOS-1D X is compatible with the new WFT-E6A Wireless File Transmitter for wireless LAN transfer with the IEEE 802.11 a/b/g/n standards. A Bit of Marketing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #6
  • 7. www.ernw.de The Camera The Ethernet Port 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #7
  • 8. www.ernw.de The Camera WLAN Adapter 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #8
  • 9. www.ernw.de The Target aka. Mr. Reuters 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #9
  • 10. www.ernw.de The Target ¬ One could get the real, unedited images first. ¬ One could upload (bad) images. ¬ One could turn the camera into a surveillance device. What if 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #10
  • 12. www.ernw.de Transport ¬ Wired LAN via built-in Ethernet port or Wireless LAN via WFT-E6A. ¬ Standard TCP/IP (no IPv6, yet). 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #12
  • 13. www.ernw.de Traditional Attacks ¬ ARP-spoofing possible.  No “sticky” ARP entries ¬ ARP-flooding with ~100 packets per second DoS the network stack. ¬ Btw. stack also dies if IPv6 (multicast) is present. Layer 2 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #13
  • 14. www.ernw.de Traditional Attacks ¬ TCP/IP is used for all network communication. ¬ Established connections can be killed via TCP-RST. Layer 3/4 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #14
  • 16. www.ernw.de Communication Modes ¬ FTP Upload Mode ¬ DLNA ¬ Built-in webserver ¬ EOS Utility Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #16
  • 18. www.ernw.de FTP Upload Mode ¬ Target server and credentials configured on camera. ¬ Photos taken are uploaded to the server immediately. Mode of operation 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #18
  • 19. www.ernw.de FTP Upload Mode ¬ As FTP is clear text, credentials can be sniffed. ¬ As well as the complete data transmission ¬ Uploaded pictures can be extracted from network traffic. Downside 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #19
  • 20. www.ernw.de FTP Upload Mode 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #20
  • 21. www.ernw.de FTP Upload Mode 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #21
  • 23. www.ernw.de DLNA mode ¬ Digital Living Network Alliance® ¬ UPnP used for discovery. ¬ DLNA guidelines for file formats, encodings, resolutions. ¬ HTTP and XML used to access media. Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #23
  • 24. www.ernw.de DLNA mode ¬ No authentication. ¬ No restrictions. ¬ Every DLNA client can download _all_ images. ¬ Your Browser could be a DLNA client. Or somebody else's browser. For your camera. Cons 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #24
  • 26. www.ernw.de Built-in webserver ¬ Wireless File Transmitter Server Mode. ¬ Canon USA: “Use a web browser to capture, view and download images remotely” Canon WFT Server 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #26
  • 27. www.ernw.de Built-in webserver ¬ Browser interface uses AJAX. ¬ Embedded webserver only capable of HTTP GET method.  Every other request method is answered with a 404. Canon WFT Server 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #27
  • 28. www.ernw.de Built-in webserver ¬ Authentication via HTTP Basic (RFC 2617) on login page. ¬ Session cookie is used afterwards. ¬ Cookie looks like sessionID=40b1  4 (!!!) byte Session ID  65535 possible IDs Authentication 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #28
  • 29. www.ernw.de Built-in webserver ¬ Session ID Brute force implemented in 6 lines of python. ¬ To check for all possible IDs takes about 20 minutes.  Embedded Webserver is not that responsive. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #29
  • 30. www.ernw.de import requests target_uri = 'http://192.168.1.103/api/cam/lvoutput' target_string = 'SESSION_ERR' for i in xrange(0xffff): if (i != 0 and i%1000 == 0): print str(i) + 'IDs checked' r = requests.get(target_uri, cookies={'sessionID': '%x' %i}) if r.text.find(target_string) == -1: print 'SessionID is : sessionID=%x' %i break 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #30
  • 31. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #31
  • 32. www.ernw.de Built-in webserver ¬ Full access to Live View, stored photos and camera settings. ¬ You surf – We brute. recap 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #32
  • 33. www.ernw.de Built-in webserver ¬ Camera in WFT Server mode. ¬ Valid session opened by user. ¬ Some minutes of time. Requirements 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #33
  • 35. www.ernw.de EOS Utility mode The Utility 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #35
  • 36. www.ernw.de EOS Utility mode The Utility 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #36
  • 37. www.ernw.de EOS Utility mode ¬ Allows remote control of all non- manual camera functions. ¬ Pictures can be up- and downloaded. ¬ Possibly even more (sound recording anyone?) Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #37
  • 38. www.ernw.de EOS Utility mode ¬ SSDP and MDNS used for discovery. ¬ PTP/IP used for communication. ¬ Needs initial camera <-> software pairing. Technical 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #38
  • 39. www.ernw.de EOS Utility mode ¬ At first use, credentials needs to be exchanged between the camera and the client software. ¬ Camera must be put into pairing mode via camera menu. ¬ Camera signals the need for pairing via MDNS. Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #39
  • 40. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #40
  • 41. www.ernw.de EOS Utility mode Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #41
  • 42. www.ernw.de EOS Utility mode ¬ Client software connects to camera via PTP/IP. ¬ PTP/IP Authentication is successful regardless of the credentials. ¬ Credentials (hostname, GUID) are stored on the camera. Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #42
  • 44. www.ernw.de PTP/IP ¬ Picture Transfer Protocol over Internet Protocol. ¬ ISO 15740. ¬ Standardized by International Imaging Industry Association 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #44
  • 45. www.ernw.de PTP/IP ¬ Wrapper for PTP with header: 4 byte length (little endian) 4 byte type (little endian) data Packet format 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #45
  • 46. www.ernw.de PTP/IP Layering 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #46
  • 47. www.ernw.de PTP/IP ¬ PTPIP_INIT_COMMAND_REQUEST  Includes authentication data: 16 byte GUID hostname string Authentication 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #47
  • 48. www.ernw.de PTPIP_INIT_COMMAND_REQUEST 2a 00 00 00 01 00 00 00 eb 7a 78 9d 69 cb 64 4e a3 e0 fc 96 ef 59 79 42 73 00 65 00 72 00 76 00 65 00 72 00 00 00 00 00 01 00 Paket length = 42 byte Paket type = 0x01 = PTPIP_INIT_COMMAND_REQUEST GUID Hostname = “server” @ utf16 Trailer 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #48
  • 50. www.ernw.de PTP ¬ Picture Transfer Protocol ¬ Standardized by International Imaging Industry Association ¬ ISO 15740 ¬ Lots of proprietary vendor extensions. Explained 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #50
  • 51. www.ernw.de PTP ¬ Designed for use over USB ¬ Fixed length ¬ 2 byte Msg Code ¬ 4 byte Session ID ¬ 4 byte Transaction ID ¬ 5 times 4 byte Parameter or Data Packet format 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #51
  • 52. www.ernw.de PTP ¬ Lot of standardized codes like:  PTP_GetDeviceInfo  PTP_OpenSession  PTP_CloseSession  PTP_GetStorageIDs ¬ Also Vendor specific codes like:  PTP_CANON_GetCustomizeSpec  PTP_CANON_GetCustomizeItemInfo Message Codes 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #52
  • 53. www.ernw.de PTP ¬ Thankfully there are some implementations around. ¬ We decided to go with libgphoto2. ¬ Basic PTP/IP support is included as well. Use of 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #53
  • 55. www.ernw.de Attack ¬ Client Hostname easy discoverable, but not needed.  Camera also excepts connections with a different hostname. ¬ GUID unknown to client software. ¬ Obfuscated GUID is broadcasted by the cam via UPNP. Getting the Credentials 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #55
  • 56. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #56
  • 57. www.ernw.de tmp = mdns_info.getProperties()['tid.canon.com'].split('-') guid = [] l = lambda s: [ s[i:i+2:] for i in xrange(0,len(s),2) ][::-1] for i in xrange(0,3): guid += l(tmp[i]) guid += tmp[3] guid += tmp[4] guid = "".join(guid) guid = eb7a789d69cb644ea3e0fc96ef597942 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #57
  • 58. www.ernw.de The Attack ¬ Camera only allows one connection. ¬ Already connected client needs to be disconnected. ¬ TCP-RST the established PTP/IP connection. Connecting to the Camera 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #58
  • 59. www.ernw.de Attack ¬ Listen for the Cam on MDNS. ¬ De-obfuscate Authentication data. ¬ Disconnect connected Client Software. ¬ Connect via PTP/IP. ¬ Have Phun (-; Process 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #59
  • 60. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #60
  • 61. www.ernw.de Attack outlined ¬ Photograph uses hotel / Starbucks WLAN, which isn’t unlikely during events (think of Grammy Awards few days ago). ¬ Almost anybody in the same LAN can download the images from the camera (and even more). So you can write it down 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #61
  • 62. www.ernw.de Countermeasures ¬ Enable network functionality only in trusted Networks. ¬ Use WPA and a secure passphrase for (your trusted) WLAN. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #62
  • 63. www.ernw.de Conclusions ¬ High-end cameras are yet another daily life item equipped with networking capabilities incl. full-blown IP stacks. ¬ Once more, their device-specific network technologies have been designed and implemented without (too much) security in mind. ¬ Again, this leads to (classes of) attacks previously unknown to their non- networked counterparts. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #63
  • 64. www.ernw.de Next Steps New series of DSLRs (EOS 6D)  Built-in Wireless Access Point  New communication protocol for IOS/Android App New series of camcorder(XA20, XA25) 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #64
  • 65. www.ernw.de There’s never enough time… 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #65 THANK YOU… ...for yours!
  • 66. www.ernw.de Questions? © ERNW GmbH | Breslauer Str. 28 | D-69124 66