SlideShare a Scribd company logo
1 of 38
Download to read offline
“
”
A Framework For Fingerprinting ICS Honeypots
Mohammad-Reza Zamiri
@d3c0der
$ whoami
• @d3c0der
• Mohammad Reza Zamiri aka d3c0der
• Security researcher at ZDResearch
• Formerly at Iranian Central Bank CERT
• http://scadapot.com
Outline
1. An overview of Honeypots and ICS Honeypots
2. ICS Honeypot fingerprinting methods
3. The Framework
4. Using the framework to find Gaspots online
5. Conclusion
Honeypot?
• Computers masquerading as vulnerable
• Recording all interactions with users
• Two broad categories, based on service and interaction level
• High-interaction
• Low-interaction
Industrial Control System (ICS)
• Monitors & controls the operation of devices
in industrial environments
• ICS were traditionally air-gapped
• i.e. physically isolated from the outside world
• Now linked to the Internet to allow remote
control and monitoring
ICS honeypot
• A significant number of threats are directed towards ICS nowadays
• Due to its direct physical impact on the world
• ICS Honeypots are rare, because they need to model industrial
systems that are not as publicly available
• But they are a great source of discovering attacks against ICS
Why fingerprinting?
• Cyber Threat Intelligence (CTI) services are becoming popular
• Large data used by these services is obtained via OSINT
• The other part via proprietary sensors of the services
• If the attackers recognize these sensors, they will send wrong data to
them and protect against detection
• The stealthiness of a honeypot is also an important factor in an
organization’s overall security strategy
How are bad guys attacking ICS
• Many ICS attacks start with scanning ICS related ports
• Also google hacking is useful
• There are engines like shodan and censys that make searching for
Internet-connected devices easy
• For a huge number of attackers finding an open ICS port is enough
of an starting point
• E.g., https://github.com/d3coder/ICS-Hunter
Classifying Fingerprinting Methods
Looking for default configuration
• Default options for a honeypot are generally
the biggest weakness
• Works well on unconfigured & misconfigured
honeypots
• The bad news is that there are many ICS
honeypots out there with default config!
Identifying the environment
• Scanning network services and checking operating system default
open ports
• Looking for hosting services (e.g., cloud)
• OS detection with NMAP, Xprobe2, p0f, etc.
• Other related characteristics (TCP/IP headers, ICMP echo response
time, etc.)
Incomplete implementation of a protocol
• Low interaction honeypots do not implement complete feature sets
• Industrial network protocols have unique features
• For example many of them do not support encryption or even authentication
• Attackers can start to explore more features of an ICS service and
investigate suspicious cases
Unusual ICS behaviors
• ICS are designed to monitor metrics such as temperature,
pressure, etc.
• The result of a natural metric monitoring must be a dynamic value
• A system that demonstrates fixed/inflexible metrics is emitting
unusual ICS behavior
• Just an open ICS port doesn’t mean a real ICS device
Fingerprinting ICS Honeypots
Common ICS honeypots
• Conpot - ICS honeypot for collecting adversary motives and methods
• GasPot - honeypot designed to simulate a Veeder-Root Guardian AST
• Scada-honeynet – simulates a variety of industrial networks and devices
• Gridpot - Open source tools for realistic-behaving electric grid honeynets
Default config detection example / Conpot
• Previously some default signatures of Conpot were published by other
researchers
• We identified some less-known signatures by investigating Conpot’s
configuration files
Conpot default config detection
(well-known signatures)
CensysShodansignatureportProtocol
185214PLC name: Technodrome
102Siemens S7
162215Plant identification: Mouser Factory
92182Serial number of module: 88111222
Conpot default config detection
(less-known signatures)
CensysShodanSignaturePortProtocol
133240Last-Modified: Tue, 19 May 1993 09:00:00
GMT
80HTTP
-31Connected to [00:13:EA:00:00:050100TELNET
-13Data Received: 680e000000002404IEC104
-83Product name: 1756-L61/B LOGIX556144818Ethernet IP
Checking a less-known signature
• Shodan saying it’s an industrial control system!
• https://www.shodan.io/host/104.250.108.68
• Lets take a look at it’s http response headers
Checking a less-known signature
Identifying the environment example / Conpot
• OS detection is a good way to start
• A network scan can reveal some open
ports that aren't related to ICS
protocols
• Here is the result for a Conpot hosted
on Debian
Incomplete protocol implementation example / Conpot
• In many cases (default config cases) the result of scanning Modbus
on a Conpot with PLCScan is: unknown protocol
Incomplete protocol implementation example/Scada-honeynet
• Source: Digitalbond
Incomplete protocol implementation example/Gaspot
• Gaspot only supports five ATG display format commands
• The response to other command is a hard-coded value :
conn.send("9999FF1Bn")
Unusual ICS behaviours example/Gaspot
• Monitoring a protocol and waiting for chnages is a nice idea (no
change has a bad meaning ! )
• We can do it for every ICS protocol that is providing a physical
quantity such as temperature, pressure , etc
Unusual ICS behaviours example/Gaspot
• First check
Unusual ICS behaviours example/Gaspot
• After 13 hours there is no change in ullage,height,water and temp!
Let’s run the framework!
Our Methodology
• So based on the methods we presented, We tried to
implement these methods in a framework
• First we scan the whole internet by using Masscan for
specified ics ports
• Then we apply our methods on the detected Ip’s by
using our framework
The Framework
• The framework is now available on
github as part of OWASP-Nettacker
project:
• https://github.com/zdresearch/OWASP-
Nettacker/tree/master/lib/payload/sca
nner/ics_honeypot
Detecting Gaspot
• So let’s detect how many Gaspot are
running around the world?
Customizing the Framework
❑Default Configuration check:
• We used the Gaspot configuration file in order to identify the default cases
❑Incomplete protocol implementation:
• We used the "I30100" command, which was not supported by Gaspot
❑Unusual ICS behavior:
• With a time interval of less than 2 hours, we sent two requests with I20100 command to these
systems and then compared the results, so we have a change percentage
❑OS detection :
• We used nmap to detect operating systems for every host with at least one positive
answer to our three previous methods
Gaspot based machines analysis result
HOST: CHANGE
PERCENTAGE:
DEFAULT
CONFIG:
I30100 TRAP: NMAP OS
Detection:
139.59.XX. XX 10.4166666667% TRUE TRUE Linux 3.X|4.X
207.154.XX.
XX
10.4166666667% TRUE TRUE Linux 3.X|4.X
107.170.XX.
XX
10.4166666667% TRUE TRUE Linux 3.X|4.X
138.197.XX.
XX
10.4166666667% TRUE TRUE Linux 3.X|4.X
Real ATG device result examples
HOST: CHANGE
PERCENTAGE:
DEFAULT
CONFIG:
I30100 TRAP: NMAP OS
Detection:
108.58.XX. XX 15.9090909091% FALSE TRUE Larus 54580
NTP server
(97%)
67.158.XX. XX 18.4210526316% TRUE FALSE dell embedded
(97%)
24.39.XX. XX 24.4444444444% FALSE TRUE Lantronix
embedded
(98%)
24.250.XX. XX 32.5% TRUE FALSE Linux 2.6.XOS
The final results
Number of IPv4
addresses:
Host with open
10001 ports:
ATG
devices:
suspicious
cases:
Gaspots:
4,294,967,296 4,133,186 4,838 102 17
How about shodan?
• There was only “9” identified Gaspot on
shodan at the time of our scan
Conclusion
• With an increasing number of skilled hackers focusing on ICS, the
need for more accurate ICS Honeypots is evergrowing
• A closer look at the simulation of ICS protocols and randomization
of default configurations can be useful
Thanks to the following for their uninterrupted support in this research:
Ali Razmjoo Qalaei (Founder, OWASP Honeypot, OWASP Nettacker)
Abbas Naderi Afooshteh (CEO, ZDResearch)
Questions?
info@scadapot.com

More Related Content

What's hot

CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceSam Bowne
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
Frony Fronius: Exploring ZigBee signals from Solar City
Frony Fronius: Exploring ZigBee signals from Solar CityFrony Fronius: Exploring ZigBee signals from Solar City
Frony Fronius: Exploring ZigBee signals from Solar CityJose Fernandez
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...NoNameCon
 
Cisco router-checklist-procedure-guide-for-network-checkli
Cisco router-checklist-procedure-guide-for-network-checkliCisco router-checklist-procedure-guide-for-network-checkli
Cisco router-checklist-procedure-guide-for-network-checkliHARRY CHAN PUTRA
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!EC-Council
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsJoseph Bugeja
 
Bsides detroit 2013 honeypots
Bsides detroit 2013   honeypotsBsides detroit 2013   honeypots
Bsides detroit 2013 honeypotsTazdrumm3r
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
Design and implementation_of_shellcodes
Design and implementation_of_shellcodesDesign and implementation_of_shellcodes
Design and implementation_of_shellcodesAmr Ali
 
aleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesaleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesJan Seidl
 
Nessus v6 command_line_reference
Nessus v6 command_line_referenceNessus v6 command_line_reference
Nessus v6 command_line_referenceCraig Cannon
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]qqlan
 

What's hot (20)

Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Frony Fronius: Exploring ZigBee signals from Solar City
Frony Fronius: Exploring ZigBee signals from Solar CityFrony Fronius: Exploring ZigBee signals from Solar City
Frony Fronius: Exploring ZigBee signals from Solar City
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Cisco router-checklist-procedure-guide-for-network-checkli
Cisco router-checklist-procedure-guide-for-network-checkliCisco router-checklist-procedure-guide-for-network-checkli
Cisco router-checklist-procedure-guide-for-network-checkli
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting Tools
 
Bsides detroit 2013 honeypots
Bsides detroit 2013   honeypotsBsides detroit 2013   honeypots
Bsides detroit 2013 honeypots
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
Design and implementation_of_shellcodes
Design and implementation_of_shellcodesDesign and implementation_of_shellcodes
Design and implementation_of_shellcodes
 
aleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the massesaleph - Malware analysis pipelining for the masses
aleph - Malware analysis pipelining for the masses
 
Nessus v6 command_line_reference
Nessus v6 command_line_referenceNessus v6 command_line_reference
Nessus v6 command_line_reference
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
 
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 

Similar to a framework for fingerprinting ICS honeypots

Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...PROIDEA
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsAleksandr Timorin
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.Jakub Kałużny
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceSam Bowne
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
EMBEDDED SYSTEMS - MSc Sem III (Final).ppt
EMBEDDED SYSTEMS - MSc Sem III (Final).pptEMBEDDED SYSTEMS - MSc Sem III (Final).ppt
EMBEDDED SYSTEMS - MSc Sem III (Final).pptNamrata Ajwani
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 

Similar to a framework for fingerprinting ICS honeypots (20)

Coporate Espionage
Coporate EspionageCoporate Espionage
Coporate Espionage
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
EMBEDDED SYSTEMS - MSc Sem III (Final).ppt
EMBEDDED SYSTEMS - MSc Sem III (Final).pptEMBEDDED SYSTEMS - MSc Sem III (Final).ppt
EMBEDDED SYSTEMS - MSc Sem III (Final).ppt
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

a framework for fingerprinting ICS honeypots

  • 1. “ ” A Framework For Fingerprinting ICS Honeypots Mohammad-Reza Zamiri @d3c0der
  • 2. $ whoami • @d3c0der • Mohammad Reza Zamiri aka d3c0der • Security researcher at ZDResearch • Formerly at Iranian Central Bank CERT • http://scadapot.com
  • 3. Outline 1. An overview of Honeypots and ICS Honeypots 2. ICS Honeypot fingerprinting methods 3. The Framework 4. Using the framework to find Gaspots online 5. Conclusion
  • 4. Honeypot? • Computers masquerading as vulnerable • Recording all interactions with users • Two broad categories, based on service and interaction level • High-interaction • Low-interaction
  • 5. Industrial Control System (ICS) • Monitors & controls the operation of devices in industrial environments • ICS were traditionally air-gapped • i.e. physically isolated from the outside world • Now linked to the Internet to allow remote control and monitoring
  • 6. ICS honeypot • A significant number of threats are directed towards ICS nowadays • Due to its direct physical impact on the world • ICS Honeypots are rare, because they need to model industrial systems that are not as publicly available • But they are a great source of discovering attacks against ICS
  • 7. Why fingerprinting? • Cyber Threat Intelligence (CTI) services are becoming popular • Large data used by these services is obtained via OSINT • The other part via proprietary sensors of the services • If the attackers recognize these sensors, they will send wrong data to them and protect against detection • The stealthiness of a honeypot is also an important factor in an organization’s overall security strategy
  • 8. How are bad guys attacking ICS • Many ICS attacks start with scanning ICS related ports • Also google hacking is useful • There are engines like shodan and censys that make searching for Internet-connected devices easy • For a huge number of attackers finding an open ICS port is enough of an starting point • E.g., https://github.com/d3coder/ICS-Hunter
  • 10. Looking for default configuration • Default options for a honeypot are generally the biggest weakness • Works well on unconfigured & misconfigured honeypots • The bad news is that there are many ICS honeypots out there with default config!
  • 11. Identifying the environment • Scanning network services and checking operating system default open ports • Looking for hosting services (e.g., cloud) • OS detection with NMAP, Xprobe2, p0f, etc. • Other related characteristics (TCP/IP headers, ICMP echo response time, etc.)
  • 12. Incomplete implementation of a protocol • Low interaction honeypots do not implement complete feature sets • Industrial network protocols have unique features • For example many of them do not support encryption or even authentication • Attackers can start to explore more features of an ICS service and investigate suspicious cases
  • 13. Unusual ICS behaviors • ICS are designed to monitor metrics such as temperature, pressure, etc. • The result of a natural metric monitoring must be a dynamic value • A system that demonstrates fixed/inflexible metrics is emitting unusual ICS behavior • Just an open ICS port doesn’t mean a real ICS device
  • 15. Common ICS honeypots • Conpot - ICS honeypot for collecting adversary motives and methods • GasPot - honeypot designed to simulate a Veeder-Root Guardian AST • Scada-honeynet – simulates a variety of industrial networks and devices • Gridpot - Open source tools for realistic-behaving electric grid honeynets
  • 16. Default config detection example / Conpot • Previously some default signatures of Conpot were published by other researchers • We identified some less-known signatures by investigating Conpot’s configuration files
  • 17. Conpot default config detection (well-known signatures) CensysShodansignatureportProtocol 185214PLC name: Technodrome 102Siemens S7 162215Plant identification: Mouser Factory 92182Serial number of module: 88111222
  • 18. Conpot default config detection (less-known signatures) CensysShodanSignaturePortProtocol 133240Last-Modified: Tue, 19 May 1993 09:00:00 GMT 80HTTP -31Connected to [00:13:EA:00:00:050100TELNET -13Data Received: 680e000000002404IEC104 -83Product name: 1756-L61/B LOGIX556144818Ethernet IP
  • 19. Checking a less-known signature • Shodan saying it’s an industrial control system! • https://www.shodan.io/host/104.250.108.68 • Lets take a look at it’s http response headers
  • 21. Identifying the environment example / Conpot • OS detection is a good way to start • A network scan can reveal some open ports that aren't related to ICS protocols • Here is the result for a Conpot hosted on Debian
  • 22. Incomplete protocol implementation example / Conpot • In many cases (default config cases) the result of scanning Modbus on a Conpot with PLCScan is: unknown protocol
  • 23. Incomplete protocol implementation example/Scada-honeynet • Source: Digitalbond
  • 24. Incomplete protocol implementation example/Gaspot • Gaspot only supports five ATG display format commands • The response to other command is a hard-coded value : conn.send("9999FF1Bn")
  • 25. Unusual ICS behaviours example/Gaspot • Monitoring a protocol and waiting for chnages is a nice idea (no change has a bad meaning ! ) • We can do it for every ICS protocol that is providing a physical quantity such as temperature, pressure , etc
  • 26. Unusual ICS behaviours example/Gaspot • First check
  • 27. Unusual ICS behaviours example/Gaspot • After 13 hours there is no change in ullage,height,water and temp!
  • 28. Let’s run the framework!
  • 29. Our Methodology • So based on the methods we presented, We tried to implement these methods in a framework • First we scan the whole internet by using Masscan for specified ics ports • Then we apply our methods on the detected Ip’s by using our framework
  • 30. The Framework • The framework is now available on github as part of OWASP-Nettacker project: • https://github.com/zdresearch/OWASP- Nettacker/tree/master/lib/payload/sca nner/ics_honeypot
  • 31. Detecting Gaspot • So let’s detect how many Gaspot are running around the world?
  • 32. Customizing the Framework ❑Default Configuration check: • We used the Gaspot configuration file in order to identify the default cases ❑Incomplete protocol implementation: • We used the "I30100" command, which was not supported by Gaspot ❑Unusual ICS behavior: • With a time interval of less than 2 hours, we sent two requests with I20100 command to these systems and then compared the results, so we have a change percentage ❑OS detection : • We used nmap to detect operating systems for every host with at least one positive answer to our three previous methods
  • 33. Gaspot based machines analysis result HOST: CHANGE PERCENTAGE: DEFAULT CONFIG: I30100 TRAP: NMAP OS Detection: 139.59.XX. XX 10.4166666667% TRUE TRUE Linux 3.X|4.X 207.154.XX. XX 10.4166666667% TRUE TRUE Linux 3.X|4.X 107.170.XX. XX 10.4166666667% TRUE TRUE Linux 3.X|4.X 138.197.XX. XX 10.4166666667% TRUE TRUE Linux 3.X|4.X
  • 34. Real ATG device result examples HOST: CHANGE PERCENTAGE: DEFAULT CONFIG: I30100 TRAP: NMAP OS Detection: 108.58.XX. XX 15.9090909091% FALSE TRUE Larus 54580 NTP server (97%) 67.158.XX. XX 18.4210526316% TRUE FALSE dell embedded (97%) 24.39.XX. XX 24.4444444444% FALSE TRUE Lantronix embedded (98%) 24.250.XX. XX 32.5% TRUE FALSE Linux 2.6.XOS
  • 35. The final results Number of IPv4 addresses: Host with open 10001 ports: ATG devices: suspicious cases: Gaspots: 4,294,967,296 4,133,186 4,838 102 17
  • 36. How about shodan? • There was only “9” identified Gaspot on shodan at the time of our scan
  • 37. Conclusion • With an increasing number of skilled hackers focusing on ICS, the need for more accurate ICS Honeypots is evergrowing • A closer look at the simulation of ICS protocols and randomization of default configurations can be useful
  • 38. Thanks to the following for their uninterrupted support in this research: Ali Razmjoo Qalaei (Founder, OWASP Honeypot, OWASP Nettacker) Abbas Naderi Afooshteh (CEO, ZDResearch) Questions? info@scadapot.com