SlideShare a Scribd company logo
1 of 33
Download to read offline
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 1
A Trial Investigation System
for Vulnerability on M2M Network
ETNET2015(2015/3/5-6)
  KA-LAB
Kiyotaka ATSUMI
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 2
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 3
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 4
Machine to Machine(M2M) networks
● MCU's performance become powerful more and more.
It's similar to a personal computer a few years ago.
● Network reachability by USB, Ethernet, ZigBee,
Bluetooth, Wifi, and so on.
● Many IoT device's softwares are built in a black box or
in a gray box.
● Building, Updating, Expanding, Recovering are
automatically performed among machines on M2M
networks
● Weak certifications each other
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 5
Terminology
● Integration Test
– Connected all MCU and sensor units
– Checking every transition every state
– investigating into behavior according to specifications.
● Vulnerability Investigation (Including Confidentiality,
Integrity, Availability)
– Mixed noises, Broken connection
– Tampering for communications
– Injecting mal-codes
We do not care its difference of above.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 6
Condition of the investigation
● It's impossible to define all transition among
states in the system.
● IoT devices sometimes implemented by a black
box and/or by a gray box.
● Some problems don't re-appearance by simply
simulations. (It's difficult to use Metasploit)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 7
Target System(External)
Target1(host) Target2(device)
USB Cabling
To the Internet
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 8
To the Internet
Target System
(The structure of software modules)
Display
Management
of Audio and
Visual
Management
of State
And so on...
Controller
Navigation
Application
Others
Application
Target1 Target2
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 9
Characters of the System
● Target1 and Target2 is connected by TCP/IP on USB.
● Target1 and Target2 provide service ports.
● At least 1 port number on Target2 is dynamically
changed when they are initialized.
● They use TCP/IP and other Layer1/Layer2 protocol
such USB.
● Controller of Target1 handle all communications on the
System.
● We'd like to mainly investigate to Target2.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 10
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 11
A Sample of Structure (1)
(Such Metasploit)
Display
Management
of Audio and
Visual
Management
of State
And so on...
Vulnerabilities
Scanner
Target1 Target2
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 12
Problems of Sample (1)
● Vulnerabilities scanner can rarely simulate Target1.
● It's difficult to dynamically adapt to various situation.
● It can carry out only investigations determined
beforehand.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 13
To the Internet
A Sample of Structure (2)
(Like USBProxy)
Display
Management
of Audio and
Visual
Management
of State
And so on...
Controller
Navigation
Application
Others
Application
Target1 Target2
USB MitM
Controller
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 14
Problems of Sample (2)
● Software relaying is very slow.
(30Mbps → 2Mbps)
● It's difficult to follow many various USB
configurations.
Especially, sometimes some smartphones are
dramatic changed to another device.
● It needs to handle USB connections in
Electrical and in Physical.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 15
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 16
To the Internet
Proposed Structure
Display
Management
of Audio and
Visual
Management
of State
And so on...
Controller
Navigation
Application
Others
Application
Target1 Target2
iptables
ka-mitm
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 17
ka-mitm and iptables
● Target1 and ka-mitm are connected by Wifi.
● ka-mitm perform like generic proxy. It can watch
data streams and modify them.
● iptables is set that ka-mitm is a transparent
proxy only specified tcp ports
(It's similar to NAPT and WAF.)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 18
Advantage of ka-mitm
● Perfoming Turing machine handling input / output
data.
● Handling multiple protocols at the same time.
● It's so easy to watch stream data.
● Transferring speed is faster than USBProxy. (about
1 of 4 speed of Wifi).
● It can continuity investigate by automatically
recovering function on M2M networks when their
sessions are broken by this investigation system.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 19
Disadvantage of ka-mitm
● Too free. We can't define good grammar for
injection scripts.
● Only TCP/IP.
● Target1 must set iptables or similar function.
● Sometimes M2M automatically recovering
function does not work when it just reset on
TCP.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 20
How to run
1. Define meta-scripts beforehand.
2. Get stream data passing in ka-mitm.
3. Generate individual scripts (scripts for short)
from meta-scripts and stream data
4. Continue to investigate by number of scripts
resetting connections.
5. Get results.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 21
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 22
Sample of Meta-Script (1)
[
{
"sort": ["VNC", "Handshake"],
"port": "/59[0-9][0-9]/",
"lead": [],
"trigger": ["to_client","/^RFB 003.00[3578]n$/"],
"injections": [ [["RFB 002.008n"], [""]],
[["RFB 003.001n"], [""]],
[["RFB 003.009n"], [""]],
[["RFB 004.008n"], [""]],
[["RFB 003.00800000...00000n"], [""]]],
"enable": true
},...
]
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 23
Results of Meta-Scripts (1)
(No precondition)
Server->Client: RFB003.008nRFB002.008n
(No answer from client)
(Break in force)
…
(No precondition)
Server->Client: RFB003.008nRFB003.008000000...000n
Client->Server: RFB003.008n
(Continue to run in normal?)
(Break in force)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 24
Sample of Meta-Script (2)
{
"sort": ["VNC", "Handshake"],
"port": "/59[0-9][0-9]/",
"lead": [["to_client", "/^RFB 003.003n$/"]],
"trigger": ["to_server","/^RFB 003.003n$/"],
"injections": [ [["RFB 002.008n"], [""]],
[["RFB 003.001n"], [""]],
[["RFB 003.007n"], [""]],
[["RFB 003.008n"], [""]],
[["RFB 003.009n"], [""]],
[["RFB 004.008n"], [""]],
[["RFB 003.0030000000000000000000000000000...0n"], [""]]],
"enable": true
},
This is unused.
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 25
Sample of Meta-Scripts (3)
{
"sort": ["VNC", "Handshake"],
"port": "/59[0-9][0-9]/",
"lead": [["to_client", "/^RFB 003.008n$/"]],
"trigger": ["to_server", "/^RFB 003.00[378]n$/"],
"injections": [ [["RFB 002.008n"], [""]],
[["RFB 003.001n"], [""]],
[["RFB 003.009n"], [""]],
[["RFB 004.008n"], [""]],
[["RFB 003.008000000000000000000000000...00000n"], [""]]],
"enable": true
},
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 26
Results of Meta-Script (3)
Server->Client: RFB003.008n
Client->Server: RFB003.008nRFB002.008n
(No answer from server)
(Break in force)
…
Server->Client: RFB003.008n
Client->Server: RFB003.008nRFB003.008000000...000n
(Continue to run in normal)
(Break in force)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 27
Sample of Meta-Script (4)
{
"sort": ["VNC", "Handshake"],
"port": "/59[0-9][0-9]/",
"lead": [["to_client", "/^RFB 003.00[78]n$/"],
["to_server", "/^RFB 003.00[78]n$/"]],
"trigger": ["to_server","/^[x01-x05].*$/"],
"injections": [[["x00","x00x00x00x01AAAAAAAAAAAAAAA...A"], [""]],
[["x05x00x01x02x05x06x0F"], [""]],
[["x01x00xFFxFFxFFxFFxFFxFFxFF...xFFxFF"],[""]]],
"enable": true
},
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 28
Results of Meta-Script (4) -1
server->client: RFB 003.008
client->server: RFB 003.008
server->client: ^A^A^M
client->server: x00
client->server:
x00x00x00x01AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAA
server->client: !not supported Authentication Type
(Automatically reset the connection)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 29
Results of Meta-Script (4) -1
server->client: RFB 003.008
client->server: RFB 003.008
server->client:
client->server:
server->client:
client->server:
server->client: � ��� TMDesktop
client->server: !������ �������
server->client: ����
client->server: ?
client->server: � �
server->client: enusenus � ��
client->server: enusenus {� �
(Continue to run in normal?)
(Break in force)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 30
Results of Meta-Script (4) -2
server->client: RFB 003.008
client->server: RFB 003.008
server->client:
client->server: x05x00x01x02x05x06x0F
server->client: !not supported Authentication Type
(Automatically reset the connection)
server->client: RFB 003.008
client->server: RFB 003.008
server->client:
client->server:
server->client:
client->server:
server->client: � ��� TMDesktop
(Continue to run in normal)
(Break in force)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 31
Results of Sample (4) -3
server->client: RFB 003.008
client->server: RFB 003.008
server->client:
client->server:
x01x00xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFx
FFxFFxFFxFFxFFxFFxFFxFxFFxFFxFFxFFxFFxFFxFFxFFxFFx...
server->client:
server->client: !not supported Authentication Type
(Automatically reset the connection)
server->client: RFB 003.008
client->server: RFB 003.008
server->client:
client->server:
server->client:
(Continue to run in normal?)
(Break in force)
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 32
Contents
● Backgrounds
● The systems which was proposed in the past
● The system which I propose
● Sample of running this system
● Problems
ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 33
Problems of proposed system
● Expression ability of the grammar for meta-
scripts is not enough.
● It's impossible to write meta-scripts handling
multiple protocols at the same time.
● Unable to reset connection completely.
● Unable to directly handle other protocols such
USB
This software is released as a alpha version.
https://github.com/kalab1998e/ka-mitm

More Related Content

Similar to A trial investigation system for vulnerability on M2M network

Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiKuniyasu Suzaki
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 
IoT with Ruby/mruby - RubyWorld Conference 2015
IoT with Ruby/mruby - RubyWorld Conference 2015IoT with Ruby/mruby - RubyWorld Conference 2015
IoT with Ruby/mruby - RubyWorld Conference 2015哲也 廣田
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDataWorks Summit
 
Functional and non-functional testing with IoT-Testware
Functional and non-functional testing with IoT-TestwareFunctional and non-functional testing with IoT-Testware
Functional and non-functional testing with IoT-TestwareAxel Rennoch
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Anne Nicolas
 
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...aaajjj4
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopInfluxData
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...Puppet
 
Approaching hyperconvergedopenstack
Approaching hyperconvergedopenstackApproaching hyperconvergedopenstack
Approaching hyperconvergedopenstackIkuo Kumagai
 
Viavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptxViavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptxmani723
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfThomasGraf40
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017Jian-Hong Pan
 
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)Kota Tsuyuzaki
 

Similar to A trial investigation system for vulnerability on M2M network (20)

Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by Suzaki
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
IoT with Ruby/mruby - RubyWorld Conference 2015
IoT with Ruby/mruby - RubyWorld Conference 2015IoT with Ruby/mruby - RubyWorld Conference 2015
IoT with Ruby/mruby - RubyWorld Conference 2015
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Functional and non-functional testing with IoT-Testware
Functional and non-functional testing with IoT-TestwareFunctional and non-functional testing with IoT-Testware
Functional and non-functional testing with IoT-Testware
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
 
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
 
Final ppt
Final pptFinal ppt
Final ppt
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
 
CanSecWest (1)
CanSecWest (1)CanSecWest (1)
CanSecWest (1)
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
 
Approaching hyperconvergedopenstack
Approaching hyperconvergedopenstackApproaching hyperconvergedopenstack
Approaching hyperconvergedopenstack
 
Viavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptxViavi_TeraVM Core Emulator.pptx
Viavi_TeraVM Core Emulator.pptx
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
 
XS Boston 2008 Network Topology
XS Boston 2008 Network TopologyXS Boston 2008 Network Topology
XS Boston 2008 Network Topology
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)
Global EC Cluster Updates (OpenStack Mitaka Swift Design Summit)
 

More from Mocke Tech

勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考えるMocke Tech
 
最新ニュースを音読させる
最新ニュースを音読させる最新ニュースを音読させる
最新ニュースを音読させるMocke Tech
 
制御システムのための検知と監視
制御システムのための検知と監視制御システムのための検知と監視
制御システムのための検知と監視Mocke Tech
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Mocke Tech
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2Mocke Tech
 
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)Mocke Tech
 
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムMocke Tech
 
MitM on USB -- introduction of USBProxy
MitM on USB -- introduction of USBProxyMitM on USB -- introduction of USBProxy
MitM on USB -- introduction of USBProxyMocke Tech
 
Making Portable Super Computer
Making Portable Super ComputerMaking Portable Super Computer
Making Portable Super ComputerMocke Tech
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringMocke Tech
 
Online programming examination
Online programming examinationOnline programming examination
Online programming examinationMocke Tech
 
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibratorsMocke Tech
 
20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cableMocke Tech
 

More from Mocke Tech (14)

勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える勤怠管理の音声ガイド -- 音声によるUI/UXを考える
勤怠管理の音声ガイド -- 音声によるUI/UXを考える
 
最新ニュースを音読させる
最新ニュースを音読させる最新ニュースを音読させる
最新ニュースを音読させる
 
制御システムのための検知と監視
制御システムのための検知と監視制御システムのための検知と監視
制御システムのための検知と監視
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2
 
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
対向車線から飛んできたトラック、どう処理したい?(ネタ出し)
 
Slide
SlideSlide
Slide
 
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズムヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
ヘテロなクラスタ環境に適した 並列誤差逆伝搬アルゴリズム
 
MitM on USB -- introduction of USBProxy
MitM on USB -- introduction of USBProxyMitM on USB -- introduction of USBProxy
MitM on USB -- introduction of USBProxy
 
Making Portable Super Computer
Making Portable Super ComputerMaking Portable Super Computer
Making Portable Super Computer
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Online programming examination
Online programming examinationOnline programming examination
Online programming examination
 
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
無線ロータのセキュリティとセーフティ / Safety and security for remote control vibrators
 
20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable20190808.kuruma iotlt.can cable
20190808.kuruma iotlt.can cable
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

A trial investigation system for vulnerability on M2M network

  • 1. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 1 A Trial Investigation System for Vulnerability on M2M Network ETNET2015(2015/3/5-6)   KA-LAB Kiyotaka ATSUMI
  • 2. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 2 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 3. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 3 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 4. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 4 Machine to Machine(M2M) networks ● MCU's performance become powerful more and more. It's similar to a personal computer a few years ago. ● Network reachability by USB, Ethernet, ZigBee, Bluetooth, Wifi, and so on. ● Many IoT device's softwares are built in a black box or in a gray box. ● Building, Updating, Expanding, Recovering are automatically performed among machines on M2M networks ● Weak certifications each other
  • 5. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 5 Terminology ● Integration Test – Connected all MCU and sensor units – Checking every transition every state – investigating into behavior according to specifications. ● Vulnerability Investigation (Including Confidentiality, Integrity, Availability) – Mixed noises, Broken connection – Tampering for communications – Injecting mal-codes We do not care its difference of above.
  • 6. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 6 Condition of the investigation ● It's impossible to define all transition among states in the system. ● IoT devices sometimes implemented by a black box and/or by a gray box. ● Some problems don't re-appearance by simply simulations. (It's difficult to use Metasploit)
  • 7. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 7 Target System(External) Target1(host) Target2(device) USB Cabling To the Internet
  • 8. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 8 To the Internet Target System (The structure of software modules) Display Management of Audio and Visual Management of State And so on... Controller Navigation Application Others Application Target1 Target2
  • 9. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 9 Characters of the System ● Target1 and Target2 is connected by TCP/IP on USB. ● Target1 and Target2 provide service ports. ● At least 1 port number on Target2 is dynamically changed when they are initialized. ● They use TCP/IP and other Layer1/Layer2 protocol such USB. ● Controller of Target1 handle all communications on the System. ● We'd like to mainly investigate to Target2.
  • 10. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 10 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 11. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 11 A Sample of Structure (1) (Such Metasploit) Display Management of Audio and Visual Management of State And so on... Vulnerabilities Scanner Target1 Target2
  • 12. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 12 Problems of Sample (1) ● Vulnerabilities scanner can rarely simulate Target1. ● It's difficult to dynamically adapt to various situation. ● It can carry out only investigations determined beforehand.
  • 13. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 13 To the Internet A Sample of Structure (2) (Like USBProxy) Display Management of Audio and Visual Management of State And so on... Controller Navigation Application Others Application Target1 Target2 USB MitM Controller
  • 14. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 14 Problems of Sample (2) ● Software relaying is very slow. (30Mbps → 2Mbps) ● It's difficult to follow many various USB configurations. Especially, sometimes some smartphones are dramatic changed to another device. ● It needs to handle USB connections in Electrical and in Physical.
  • 15. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 15 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 16. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 16 To the Internet Proposed Structure Display Management of Audio and Visual Management of State And so on... Controller Navigation Application Others Application Target1 Target2 iptables ka-mitm
  • 17. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 17 ka-mitm and iptables ● Target1 and ka-mitm are connected by Wifi. ● ka-mitm perform like generic proxy. It can watch data streams and modify them. ● iptables is set that ka-mitm is a transparent proxy only specified tcp ports (It's similar to NAPT and WAF.)
  • 18. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 18 Advantage of ka-mitm ● Perfoming Turing machine handling input / output data. ● Handling multiple protocols at the same time. ● It's so easy to watch stream data. ● Transferring speed is faster than USBProxy. (about 1 of 4 speed of Wifi). ● It can continuity investigate by automatically recovering function on M2M networks when their sessions are broken by this investigation system.
  • 19. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 19 Disadvantage of ka-mitm ● Too free. We can't define good grammar for injection scripts. ● Only TCP/IP. ● Target1 must set iptables or similar function. ● Sometimes M2M automatically recovering function does not work when it just reset on TCP.
  • 20. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 20 How to run 1. Define meta-scripts beforehand. 2. Get stream data passing in ka-mitm. 3. Generate individual scripts (scripts for short) from meta-scripts and stream data 4. Continue to investigate by number of scripts resetting connections. 5. Get results.
  • 21. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 21 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 22. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 22 Sample of Meta-Script (1) [ { "sort": ["VNC", "Handshake"], "port": "/59[0-9][0-9]/", "lead": [], "trigger": ["to_client","/^RFB 003.00[3578]n$/"], "injections": [ [["RFB 002.008n"], [""]], [["RFB 003.001n"], [""]], [["RFB 003.009n"], [""]], [["RFB 004.008n"], [""]], [["RFB 003.00800000...00000n"], [""]]], "enable": true },... ]
  • 23. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 23 Results of Meta-Scripts (1) (No precondition) Server->Client: RFB003.008nRFB002.008n (No answer from client) (Break in force) … (No precondition) Server->Client: RFB003.008nRFB003.008000000...000n Client->Server: RFB003.008n (Continue to run in normal?) (Break in force)
  • 24. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 24 Sample of Meta-Script (2) { "sort": ["VNC", "Handshake"], "port": "/59[0-9][0-9]/", "lead": [["to_client", "/^RFB 003.003n$/"]], "trigger": ["to_server","/^RFB 003.003n$/"], "injections": [ [["RFB 002.008n"], [""]], [["RFB 003.001n"], [""]], [["RFB 003.007n"], [""]], [["RFB 003.008n"], [""]], [["RFB 003.009n"], [""]], [["RFB 004.008n"], [""]], [["RFB 003.0030000000000000000000000000000...0n"], [""]]], "enable": true }, This is unused.
  • 25. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 25 Sample of Meta-Scripts (3) { "sort": ["VNC", "Handshake"], "port": "/59[0-9][0-9]/", "lead": [["to_client", "/^RFB 003.008n$/"]], "trigger": ["to_server", "/^RFB 003.00[378]n$/"], "injections": [ [["RFB 002.008n"], [""]], [["RFB 003.001n"], [""]], [["RFB 003.009n"], [""]], [["RFB 004.008n"], [""]], [["RFB 003.008000000000000000000000000...00000n"], [""]]], "enable": true },
  • 26. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 26 Results of Meta-Script (3) Server->Client: RFB003.008n Client->Server: RFB003.008nRFB002.008n (No answer from server) (Break in force) … Server->Client: RFB003.008n Client->Server: RFB003.008nRFB003.008000000...000n (Continue to run in normal) (Break in force)
  • 27. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 27 Sample of Meta-Script (4) { "sort": ["VNC", "Handshake"], "port": "/59[0-9][0-9]/", "lead": [["to_client", "/^RFB 003.00[78]n$/"], ["to_server", "/^RFB 003.00[78]n$/"]], "trigger": ["to_server","/^[x01-x05].*$/"], "injections": [[["x00","x00x00x00x01AAAAAAAAAAAAAAA...A"], [""]], [["x05x00x01x02x05x06x0F"], [""]], [["x01x00xFFxFFxFFxFFxFFxFFxFF...xFFxFF"],[""]]], "enable": true },
  • 28. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 28 Results of Meta-Script (4) -1 server->client: RFB 003.008 client->server: RFB 003.008 server->client: ^A^A^M client->server: x00 client->server: x00x00x00x01AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAA server->client: !not supported Authentication Type (Automatically reset the connection)
  • 29. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 29 Results of Meta-Script (4) -1 server->client: RFB 003.008 client->server: RFB 003.008 server->client: client->server: server->client: client->server: server->client: � ��� TMDesktop client->server: !������ ������� server->client: ���� client->server: ? client->server: � � server->client: enusenus � �� client->server: enusenus {� � (Continue to run in normal?) (Break in force)
  • 30. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 30 Results of Meta-Script (4) -2 server->client: RFB 003.008 client->server: RFB 003.008 server->client: client->server: x05x00x01x02x05x06x0F server->client: !not supported Authentication Type (Automatically reset the connection) server->client: RFB 003.008 client->server: RFB 003.008 server->client: client->server: server->client: client->server: server->client: � ��� TMDesktop (Continue to run in normal) (Break in force)
  • 31. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 31 Results of Sample (4) -3 server->client: RFB 003.008 client->server: RFB 003.008 server->client: client->server: x01x00xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFx FFxFFxFFxFFxFFxFFxFFxFxFFxFFxFFxFFxFFxFFxFFxFFxFFx... server->client: server->client: !not supported Authentication Type (Automatically reset the connection) server->client: RFB 003.008 client->server: RFB 003.008 server->client: client->server: server->client: (Continue to run in normal?) (Break in force)
  • 32. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 32 Contents ● Backgrounds ● The systems which was proposed in the past ● The system which I propose ● Sample of running this system ● Problems
  • 33. ETNET2015 (c) 2015 kiyotaka@ka-lab.jp 33 Problems of proposed system ● Expression ability of the grammar for meta- scripts is not enough. ● It's impossible to write meta-scripts handling multiple protocols at the same time. ● Unable to reset connection completely. ● Unable to directly handle other protocols such USB This software is released as a alpha version. https://github.com/kalab1998e/ka-mitm