SlideShare a Scribd company logo
Cracking into
       embedded devices
                     And beyond! - by Adrian Pastor




www.procheckup.com

                                    www.gnucitizen.org
Most devices have web interfaces enabled

  by default
 This applies to consumer and corporate
  appliances




The drive behind this research
The devices are ownable via their web

  interface
 Not just info theft is possible but also
  gaining root/admin privileges




The drive behind this research (2)
Attack doesn‟t end after owning the

  embedded device
 If device not properly segmented, we can
  probe the internal network




Why “and beyond”?
Internet -> target device -> LAN

 Target device: stepping stone / bouncing
  point
 Not many companies consider DMZing
  “miscellaneous” devices




Why “and beyond”? (2)
Most of what we need to probe the LAN

  already on device
 i.e.: Axis camera with shell scripting
  (mish) and PHP support




Why “and beyond”? (3)
Who‟s paying attention to printers,

  cameras, etc? Anyone?
 After all they‟re just primitive devices
 Not taking into account as seriously as
  app / web servers security-wise




Why “and beyond”? (4)
Can be exploited reliably

 Can be hard to detect by IDS
 No need to develop platform-specific
  shellcode




Focus on remotely exploitable web
bugs
Devices‟ web interfaces often developed

    without parameter filtering in mind
    ◦ Real example: Linksys WAG54GS [1]
       Tons of persistent XSS
    Lots of possibilities / attack scenarios





Focus on remotely exploitable web
bugs (2)
Auth bypass

    File retrieval / directory traversal

    XSS - reflected and persistent!

    CSRF - most devices are affected

    Privilege escalation





The juicy bugs!
Any admin setting can be changed

 Ideal when web int. NOT enabled on WAN




Personal Fav. #1:
CSRF + auth bypass
Payload is launched when admin tricked

  to visit 3rd-party evil page
 Evil page makes browser send forged
  request to vulnerable device




Personal Fav. #1:
CSRF + auth bypass (cont)
Web server password-protected but

  enabled on WAN interface
 Attacker doesn’t need to be authenticated
 Malformed request to web server injects
  malicious payload on logs page




Personal Fav. #2:
Persistent XSS on logs page
Admin browses vulnerable page while

  logged in
 Device is compromised – ie: new admin
  account is added
 Example: Axis 2100 IP cameras [2]




Personal Fav. #2:
Persistent XSS on logs page
(cont)
Ironic: security-conscious admins get

    owned




Personal Fav. #2:
Persistent XSS on logs page
(cont)
No interaction required from victim admin

 Usually simple to exploit. i.e.:
    ◦ knowledge of “authenticated” URL
    ◦ Replay request that changes admin setting




Personal Fav. #3:
Auth bypass + WAN web
interface
No need to rely on password

 Ideal when web interface only on LAN
 Targets the internal user who can “see”
  the device‟s web interface
 Some preauth leaks are WAY TOO GOOD
  – ie: WEP keys or admin passwords


Personal Fav. #4:
Preauth leak + XSS on preauth
URL
Steal session IDs

 Overwrite login form‟s „action‟ attribute
 Phishing heaven!
 Real example: Pers. XSS on Aruba 800
  Mobility Controller's login page [3] – by
  Jan Fry
    ◦ You own the controller you own all the WAPs –
      sweet! 



Personal Fav. #4:
Pers. XSS on admin login page
Because not needing to rely on cracking a

  weak password is great
 Let‟s see review a few real examples




Love for auth bypass bugs
Password prompt returned when

  accessing http://victim.foo/
 If creds correct, then redirect to “authed”
  URL




Auth bypass type 1:
unprotected URLs
Problem is no auth data (ie:

  password/session ID) is transmitted
 Simply knowing the admin URLs does the
  job! - ie: http//victim.foo/admin-
  settings.cgi
 Real example: 3COM APXXXX (vuln not
  published yet)


Auth bypass type 1:
unprotected URLs (cont)
Resources (URLs) password protected

 However, assumed to be accessed via a
  certain method – ie : GET
 Requesting resource as POST gives the
  goodies!
 Real example: BT Voyager 2091 Wireless
  ADSL [4]


Auth bypass type 2:
unchecked HTTP methods
Get config file without password:


     POST /psiBackupInfo HTTP/1.1
     Host: 192.168.1.1
     Connection: close
     Content-Length: 0
     <CRLF>
     <CRLF>


Auth bypass type 2:
unchecked HTTP methods
(cont)
Admin URLs password-protected correctly

 However, admin requests are NOT
 Real example: Linksys WRT54GS [5] – by
  Ginsu Rabbit




Auth bypass type 3:
unprotected requests
Settings URLs requires password:

    GET /wireless.htm

    Submitting admin request does NOT:

    POST /Security.tri
    Content-Length: 24
    SecurityMode=0&layout=en


Auth bypass type 3:
unprotected requests (cont)
Web server OKs multiple representations

  of URL
 i.e.: the following URLs could all be valid:
    ◦   http://victim.foo/path/
    ◦   http://victim.foopath
    ◦   http://victim.foo/path?
    ◦   http://victim.foo/path.
    ◦   http://victim.foo/path?anyparameter=anyvalue
    ◦   http://victim.foo/path/
    ◦   http://victim.foo/path//


Auth bypass type 4: URL
fuzzing
Real example: BT Home Hub and

  Thomson/Alcatel Speedtouch 7G [6]
 i.e.: the following URL gives you the
  config file without supplying creds:
    ◦ http://192.168.1.254/cgi/b/backup/user.ini//




Auth bypass type 4: URL
fuzzing (cont)
No open tcp/udp ports on WAN interface

  by default
 Requirement: attack must be remote
 Most people would give up at this point
 Possible attack vectors, anyone?




BT Home Hub hacking
challenge
OK, WAN is not an option

 How about the LAN interface?
 “Didn‟t you say it must be a remote
  attack?” you must be thinking 




BT Home Hub hacking
challenge (cont)
Think client side!

 Victim user‟s browser his worst enemy
 If you can‟t attack via WAN, let the
  internal user do it via LAN
 The aikido way: blend in, take advantage
  of already-established channels



BT Home Hub hacking
challenge (cont)
The recipe:

    ◦ CSRF
    ◦ Auth bypass
    The weapon:

    ◦ Simple form retrieved via hidden „iframe‟




BT Home Hub hacking
challenge (cont)
The attack:

    ◦ Any user in Home Hub‟s LAN visits malicious
      web page
    ◦ Web page causes user‟s browser submit
      interesting request to Home Hub. i.e.: enable
      remote assistance




BT Home Hub hacking
challenge (cont)
BT Home Hub hacking
challenge (cont)
Demo time!
[1] Persistent XSS and CSRF on Linksys WAG54GS router
  http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-
  wireless-g-adsl-gateway-with-speedbooster-wag54gs

[2] Persistent XSS on Aruba 800 Mobility Controller's login
  page
  http://www.procheckup.com/Vulnerability_PR07-26.php
  http://www.securityfocus.com/bid/26465



[3] Multiple vulnerabilities on Axis 2100 IP cameras
  http://www.procheckup.com/Vulnerability_Axis_2100_rese
  arch.pdf




References
[4] BT Voyager Multiple Remote Authentication Bypass
  Vulnerabilities
  http://www.securityfocus.com/archive/1/440405
  http://www.securityfocus.com/bid/19057/discuss


[5] Linksys WRT54GS POST Request Configuration Change
  Authentication Bypass Vulnerability
  http://www.securityfocus.com/archive/1/442452/30/0/threa
  ded
  http://www.securityfocus.com/bid/19347




References (cont)
[6] BT Home Flub: Pwnin the BT Home Hub
  http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-
  home-hub
  http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-
  home-hub-2
  http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-
  home-hub-3
  http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-
  home-hub-4




References (cont)

More Related Content

What's hot

Neat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
Mikhail Egorov
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
 
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka IrongeekMutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Magno Logan
 
Hacking Wordpress Plugins
Hacking Wordpress PluginsHacking Wordpress Plugins
Hacking Wordpress Plugins
Larry Cashdollar
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
Brent Shaffer
 
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
 
OAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army FrameworkOAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army Framework
Brent Shaffer
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
Security BSides Ahmedabad
 
Everybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs tooEverybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs too
Nahidul Kibria
 
Fun with exploits old and new
Fun with exploits old and newFun with exploits old and new
Fun with exploits old and new
Larry Cashdollar
 
10 common cf server challenges
10 common cf server challenges10 common cf server challenges
10 common cf server challenges
ColdFusionConference
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
Mateusz Olejarka
 
Web-servers & Application Hacking
Web-servers & Application HackingWeb-servers & Application Hacking
Web-servers & Application Hacking
Raghav Bisht
 
Django (Web Applications that are Secure by Default)
Django �(Web Applications that are Secure by Default�)Django �(Web Applications that are Secure by Default�)
Django (Web Applications that are Secure by Default)
Kishor Kumar
 
MITM Attacks on HTTPS: Another Perspective
MITM Attacks on HTTPS: Another PerspectiveMITM Attacks on HTTPS: Another Perspective
MITM Attacks on HTTPS: Another Perspective
GreenD0g
 
Attacking Drupal
Attacking DrupalAttacking Drupal
Attacking Drupal
Greg Foss
 
Entity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applicationsEntity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applications
Mikhail Egorov
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
Tim Plummer
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed
Prathan Phongthiproek
 

What's hot (20)

Neat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
 
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka IrongeekMutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
 
Hacking Wordpress Plugins
Hacking Wordpress PluginsHacking Wordpress Plugins
Hacking Wordpress Plugins
 
Attacking HTML5
Attacking HTML5Attacking HTML5
Attacking HTML5
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
 
OAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army FrameworkOAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army Framework
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
 
Everybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs tooEverybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs too
 
Fun with exploits old and new
Fun with exploits old and newFun with exploits old and new
Fun with exploits old and new
 
10 common cf server challenges
10 common cf server challenges10 common cf server challenges
10 common cf server challenges
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
 
Web-servers & Application Hacking
Web-servers & Application HackingWeb-servers & Application Hacking
Web-servers & Application Hacking
 
Django (Web Applications that are Secure by Default)
Django �(Web Applications that are Secure by Default�)Django �(Web Applications that are Secure by Default�)
Django (Web Applications that are Secure by Default)
 
MITM Attacks on HTTPS: Another Perspective
MITM Attacks on HTTPS: Another PerspectiveMITM Attacks on HTTPS: Another Perspective
MITM Attacks on HTTPS: Another Perspective
 
Attacking Drupal
Attacking DrupalAttacking Drupal
Attacking Drupal
 
Entity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applicationsEntity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applications
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed
 

Viewers also liked

Me And My Cousins
Me And My CousinsMe And My Cousins
Me And My Cousinsjumpback
 
Suegra
SuegraSuegra
Suegra
fervicena
 
Deseos En Esta Navidad 1877
Deseos En Esta Navidad 1877Deseos En Esta Navidad 1877
Deseos En Esta Navidad 1877steffens
 
Presentation Of The Subject
Presentation Of The SubjectPresentation Of The Subject
Presentation Of The Subject
pascual1
 
Belarus / What do we teach about our neighbours?
Belarus / What do we teach about our neighbours?Belarus / What do we teach about our neighbours?
Belarus / What do we teach about our neighbours?
neighbours.vsb.lv
 

Viewers also liked (6)

Accidente
AccidenteAccidente
Accidente
 
Me And My Cousins
Me And My CousinsMe And My Cousins
Me And My Cousins
 
Suegra
SuegraSuegra
Suegra
 
Deseos En Esta Navidad 1877
Deseos En Esta Navidad 1877Deseos En Esta Navidad 1877
Deseos En Esta Navidad 1877
 
Presentation Of The Subject
Presentation Of The SubjectPresentation Of The Subject
Presentation Of The Subject
 
Belarus / What do we teach about our neighbours?
Belarus / What do we teach about our neighbours?Belarus / What do we teach about our neighbours?
Belarus / What do we teach about our neighbours?
 

Similar to Cracking into embedded devices and beyond

Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8guest441c58b71
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhibhumika2108
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
Edouard de Lansalut
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
Devnology
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
bilcorry
 
Your WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you checkYour WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you check
Angela Bowman
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
OpenDNS
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
Susam Pal
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
tmd800
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfacesmichelemanzotti
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Devbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First Security
Michael Coates
 
How not to make a hacker friendly application
How not to make a hacker friendly applicationHow not to make a hacker friendly application
How not to make a hacker friendly application
Abhinav Mishra
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdf
cyberhacker7
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
Tony Amoyal
 

Similar to Cracking into embedded devices and beyond (20)

Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
 
Your WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you checkYour WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you check
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Devbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First Security
 
How not to make a hacker friendly application
How not to make a hacker friendly applicationHow not to make a hacker friendly application
How not to make a hacker friendly application
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdf
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 

More from amiable_indian

Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commonsamiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art amiable_indian
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentestersamiable_indian
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...amiable_indian
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writersamiable_indian
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyamiable_indian
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Codingamiable_indian
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learnedamiable_indian
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunityamiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writersamiable_indian
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentationamiable_indian
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian
 
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-TellingNo Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
amiable_indian
 

More from amiable_indian (20)

Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentesters
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentation
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
 
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-TellingNo Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Cracking into embedded devices and beyond

  • 1. Cracking into embedded devices And beyond! - by Adrian Pastor www.procheckup.com www.gnucitizen.org
  • 2. Most devices have web interfaces enabled  by default  This applies to consumer and corporate appliances The drive behind this research
  • 3. The devices are ownable via their web  interface  Not just info theft is possible but also gaining root/admin privileges The drive behind this research (2)
  • 4. Attack doesn‟t end after owning the  embedded device  If device not properly segmented, we can probe the internal network Why “and beyond”?
  • 5. Internet -> target device -> LAN   Target device: stepping stone / bouncing point  Not many companies consider DMZing “miscellaneous” devices Why “and beyond”? (2)
  • 6. Most of what we need to probe the LAN  already on device  i.e.: Axis camera with shell scripting (mish) and PHP support Why “and beyond”? (3)
  • 7. Who‟s paying attention to printers,  cameras, etc? Anyone?  After all they‟re just primitive devices  Not taking into account as seriously as app / web servers security-wise Why “and beyond”? (4)
  • 8. Can be exploited reliably   Can be hard to detect by IDS  No need to develop platform-specific shellcode Focus on remotely exploitable web bugs
  • 9. Devices‟ web interfaces often developed  without parameter filtering in mind ◦ Real example: Linksys WAG54GS [1]  Tons of persistent XSS Lots of possibilities / attack scenarios  Focus on remotely exploitable web bugs (2)
  • 10. Auth bypass  File retrieval / directory traversal  XSS - reflected and persistent!  CSRF - most devices are affected  Privilege escalation  The juicy bugs!
  • 11. Any admin setting can be changed   Ideal when web int. NOT enabled on WAN Personal Fav. #1: CSRF + auth bypass
  • 12. Payload is launched when admin tricked  to visit 3rd-party evil page  Evil page makes browser send forged request to vulnerable device Personal Fav. #1: CSRF + auth bypass (cont)
  • 13. Web server password-protected but  enabled on WAN interface  Attacker doesn’t need to be authenticated  Malformed request to web server injects malicious payload on logs page Personal Fav. #2: Persistent XSS on logs page
  • 14. Admin browses vulnerable page while  logged in  Device is compromised – ie: new admin account is added  Example: Axis 2100 IP cameras [2] Personal Fav. #2: Persistent XSS on logs page (cont)
  • 15. Ironic: security-conscious admins get  owned Personal Fav. #2: Persistent XSS on logs page (cont)
  • 16. No interaction required from victim admin   Usually simple to exploit. i.e.: ◦ knowledge of “authenticated” URL ◦ Replay request that changes admin setting Personal Fav. #3: Auth bypass + WAN web interface
  • 17. No need to rely on password   Ideal when web interface only on LAN  Targets the internal user who can “see” the device‟s web interface  Some preauth leaks are WAY TOO GOOD – ie: WEP keys or admin passwords Personal Fav. #4: Preauth leak + XSS on preauth URL
  • 18. Steal session IDs   Overwrite login form‟s „action‟ attribute  Phishing heaven!  Real example: Pers. XSS on Aruba 800 Mobility Controller's login page [3] – by Jan Fry ◦ You own the controller you own all the WAPs – sweet!  Personal Fav. #4: Pers. XSS on admin login page
  • 19. Because not needing to rely on cracking a  weak password is great  Let‟s see review a few real examples Love for auth bypass bugs
  • 20. Password prompt returned when  accessing http://victim.foo/  If creds correct, then redirect to “authed” URL Auth bypass type 1: unprotected URLs
  • 21. Problem is no auth data (ie:  password/session ID) is transmitted  Simply knowing the admin URLs does the job! - ie: http//victim.foo/admin- settings.cgi  Real example: 3COM APXXXX (vuln not published yet) Auth bypass type 1: unprotected URLs (cont)
  • 22. Resources (URLs) password protected   However, assumed to be accessed via a certain method – ie : GET  Requesting resource as POST gives the goodies!  Real example: BT Voyager 2091 Wireless ADSL [4] Auth bypass type 2: unchecked HTTP methods
  • 23. Get config file without password:  POST /psiBackupInfo HTTP/1.1 Host: 192.168.1.1 Connection: close Content-Length: 0 <CRLF> <CRLF> Auth bypass type 2: unchecked HTTP methods (cont)
  • 24. Admin URLs password-protected correctly   However, admin requests are NOT  Real example: Linksys WRT54GS [5] – by Ginsu Rabbit Auth bypass type 3: unprotected requests
  • 25. Settings URLs requires password:  GET /wireless.htm Submitting admin request does NOT:  POST /Security.tri Content-Length: 24 SecurityMode=0&layout=en Auth bypass type 3: unprotected requests (cont)
  • 26. Web server OKs multiple representations  of URL  i.e.: the following URLs could all be valid: ◦ http://victim.foo/path/ ◦ http://victim.foopath ◦ http://victim.foo/path? ◦ http://victim.foo/path. ◦ http://victim.foo/path?anyparameter=anyvalue ◦ http://victim.foo/path/ ◦ http://victim.foo/path// Auth bypass type 4: URL fuzzing
  • 27. Real example: BT Home Hub and  Thomson/Alcatel Speedtouch 7G [6]  i.e.: the following URL gives you the config file without supplying creds: ◦ http://192.168.1.254/cgi/b/backup/user.ini// Auth bypass type 4: URL fuzzing (cont)
  • 28. No open tcp/udp ports on WAN interface  by default  Requirement: attack must be remote  Most people would give up at this point  Possible attack vectors, anyone? BT Home Hub hacking challenge
  • 29. OK, WAN is not an option   How about the LAN interface?  “Didn‟t you say it must be a remote attack?” you must be thinking  BT Home Hub hacking challenge (cont)
  • 30. Think client side!   Victim user‟s browser his worst enemy  If you can‟t attack via WAN, let the internal user do it via LAN  The aikido way: blend in, take advantage of already-established channels BT Home Hub hacking challenge (cont)
  • 31. The recipe:  ◦ CSRF ◦ Auth bypass The weapon:  ◦ Simple form retrieved via hidden „iframe‟ BT Home Hub hacking challenge (cont)
  • 32. The attack:  ◦ Any user in Home Hub‟s LAN visits malicious web page ◦ Web page causes user‟s browser submit interesting request to Home Hub. i.e.: enable remote assistance BT Home Hub hacking challenge (cont)
  • 33. BT Home Hub hacking challenge (cont)
  • 35. [1] Persistent XSS and CSRF on Linksys WAG54GS router http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on- wireless-g-adsl-gateway-with-speedbooster-wag54gs [2] Persistent XSS on Aruba 800 Mobility Controller's login page http://www.procheckup.com/Vulnerability_PR07-26.php http://www.securityfocus.com/bid/26465 [3] Multiple vulnerabilities on Axis 2100 IP cameras http://www.procheckup.com/Vulnerability_Axis_2100_rese arch.pdf References
  • 36. [4] BT Voyager Multiple Remote Authentication Bypass Vulnerabilities http://www.securityfocus.com/archive/1/440405 http://www.securityfocus.com/bid/19057/discuss [5] Linksys WRT54GS POST Request Configuration Change Authentication Bypass Vulnerability http://www.securityfocus.com/archive/1/442452/30/0/threa ded http://www.securityfocus.com/bid/19347 References (cont)
  • 37. [6] BT Home Flub: Pwnin the BT Home Hub http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt- home-hub http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt- home-hub-2 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt- home-hub-3 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt- home-hub-4 References (cont)