[Confidence0902] The Glass Cage - Virtualization Security
Nov. 23, 2009•0 likes
0 likes
Be the first to like this
Show More
•2,775 views
views
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download to read offline
Report
Technology
The Glass Cage, the presentation I gave at Confidence 2009-02 about virtualization security, detailing various attack patterns to virtualization infrastructures.
There's a whole ecosystem around virtualization
Management software
Storage managers
Patchers
Conversion software
All of them can be hacked!
SN-2009-02 - ToutVirtual VirtualIQ Pro
Multiple Vulnerabilities
/client/clients.xml
Requested every time VI client connects to a host
<ConfigRoot>
<clientConnection id="0000">
<authdPort>902</authdPort>
<version>3</version>
<patchVersion>3.0.0</patchVersion>
<apiVersion>3.1.0</apiVersion>
<downloadUrl>https://*/client/VMware-
viclient.exe</downloadUrl>
</clientConnection>
</ConfigRoot>
What if we change that XML?
By MitM
or
Post-exploitation on the host
Demo time
Just woke up?
Here's what's going on
VI Client looks for clients.xml
We do some MiTM
We use Burp because it rocks and it's easy
Change the clients.xml
P0wned
VMware Studio
A virtual appliance to build other virtual appliances
Path traversal leading to unauthenticated arbitrary
file upload to any directory
SN-2009-03 by Claudio criscione
Virtualization ASsessment TOolkit
A toolkit for virtualization penetration testing
Currently under development @ Secure Network
Metasploit based
Still in early Alpha stage
Stable modules:
Fingerprinting
Brute Forcer
VMware Studio Exploiter
Let's see them (if we have time!)
Everyone has got some...
Ubuntu just launched its Cloud infrastructure
It leverages Eucalyptus
And we have (at least) an XSS in Eucalytpus
You already knew about that, or at least
thought about that
It already happened multiple times, e.g.
CloudBurst on VMware
CVE-2007-1320 on XEN
Overflow in Cirrus VGA: see a pattern?
One pre-auth request to the HTTP interface will
result in Astaro doing a DNS query
We won't get the results, but it's a nice one-way
covert channel for any blind attack (tnx ikki)
What's most important, no IDS in the network will
detect any anomaly. It's all in-memory