SlideShare a Scribd company logo
1 of 55
Download to read offline
Exploiting and attacking seismological networks ..
Remotely
Bertin B – James jara NetDB Search Engine
DEFCON 24 Las Vegas, Nevada
Disclaimer
- This is not a typical talk
-Probably it is the first research of this kind
-All vulnerabilities have been reported to U.S CERT
-We are not responsible of the actions that
someone can take after attend this talk
-Peace on earth
Agenda
-Who we are
-Motivation
-How we discovered this devices?
-Risk /Impact , who is affected by attacking
this devices ?
-Seismological instrumentation
-Internals /Deployment/Networking
-Vulnerabilities /firmware analysis
-Attack vectors / post exploitation
-Recommendations/conclusions
Bertin Bervis
NetDB Co-founder
@bertinjoseb
James Jara
NetDB Co-founder
@jamesjara
We are from San Jose Costa Rica
Motivation
Why we are interested in seismological networks?
An average attacker is not interested for this attacks
Governments are interested.. you know.. …..!@#$% WAR
Cool and new attack scenario ¨extreme environment¨
You are playing with devices that measure natural disasters
Could lead to a financial sabotage to a specific company/country
The vendors of this instruments doesn’t have any sense of computer security
Remote access, remote exploitation
Ok let’s continue this project…
How we discovered this devices?
DEMO
Fingerprints too many fingerprints
For some strange reason you find a unique fingerprint in millions…
DEMO
So.. WTF is TAURUS ???? Let´s connect to that shit NOW!
Seismometers are instruments that measure motion of the
ground, including those of seismic waves generated
by earthquakes, volcanic eruptions, and other seismic
sources. Records of seismic waves allow seismologists to
map the interior of the Earth, and locate and measure the
size of these different sources.
Wikipedia
Common aplications:
-Earthquake detection
-Geophysics, geothermal development
-Structural analysis
-Mine safety
-Fracking / Drilling
GPS REAL DATA
LOCATION DEMO
Ocean bottom
seismograph
Impact
-No one else has ever done a research about security of this devices or networks
before
-Remote Denial of service
-Remote management
-Several Bugs
-Sabotage seismological country’s network
-Economic impact for Oil and Gas research for specific company
-Drug trafficking submarine detection
-Military
-Unknow
This increased understanding can lead to improved oil and gas recovery.
Vendors found
Internals
Linux based OS
Remote management
SSH TELNET FTP Web Server
GPS
Ocean bottom
Battery /Solar panels
Sophisticated
Deployment options
The Taurus may be deployed as either a stand-alone data recorder or as a network
component.
For stand-alone recording where network access is not required, typically you would
configure the Taurus to run in Buffered mode. It consumes less power in this mode as
the Controller only runs when the Taurus is recording buffered data to the Store.
For networked operation you must configure the Taurus to run in Communications mode
and configure the appropriate network options. In this mode, the Controller is running
continuously. It consumes more power than Buffered mode but allows continuous
access via an IP connection.
You can stream time-series data from a Taurus to a central acquisition server, for
example to write the data to NAQS ringbuffers. To stream Taurus data to NAQS, the
NpToNmxp utility must be running on the NAQS server
• Stream NP Packets – Set Taurus to stream data to the specified destination; enabled ,
not enabled . Factory default is not enabled. • IP Address – The address of the streaming
destination (for example, a NAQS server); a valid IP address in dotted decimal format
Applications software Nanometrics Apollo acquisition server with web interface
Geophysicists depend on seismometers to
monitor earthquakes generated by the motion
of the tectonic plates that form the Earth’s
crust. In order to function, the instruments
need to be leveled prior to operation. That’s
easy enough for a device deployed on dry land,
but when it comes to seismometers placed on
the ocean floor thousands of feet below the
surface, the process gets a bit more
challenging. To solve it, Nanometrics Inc.
(Kanata, Ontario) combines sophisticated
gimbals and microprocessors, along with ultra-
reliable, efficient motors from MICROMO
(Clearwater, FL).
Sensor Earth Deployment
The seismological network
Ocean Bottom seismic network - Autonomous Underwater Vehicles (AUVs)
Athena: Event Cataloging and Notification
Management
Challenge: In order to function, the
instruments need to be leveled prior to
operation. Not easy when it is thousands feet
on the ocean floor.
Solution: To solve it, Nanometrics Inc. (Kanata,
Ontario) combines sophisticated gimbals and
microprocessors, along with ultra-reliable,
efficient motors from MICROMO (Clearwater,
FL)
Results: A Trillium 240 was deployed at the
South Pole and it operated perfectly. The turn-
on temperature was -58°C (-136°F). The system
temperature settled eventually to -50° C (-
122°F) and stayed there for a long period of
time. The motors turned on and did exactly
what they were supposed to do
OCEAN BOTTOM DEPLOYMENT VIDEO DEMO
To deploy the Trillium OBS (black cylinder),
users attach the seismometer to a metal sled
that carries it down to the sea floor. At the end
of the experiment, the transponder signal
triggers the release of ballast and the
instrument floats to the surface. (Courtesy of
Nanometrics Inc.
Inside the Solution
Seismometers capture transient phenomenon. If an instrument
malfunctions, whether it’s at the bottom of
the ocean or atop a polar ice cap, that data
is lost forever.“You need to be absolutely sure the sensor will
perform perfectly every time,” says Jeff Potter, director of marketing at
Nanometrics. “Seismometers also need to be small and consume very little
power when they level themselves, and that’s where MICROMO has helped.”
The leveling mechanism integrates the following devices:
The AM1020-V-6-65, a in a 10-mm-diameter, two- phase stepper motor that
provides a peak torque of 1.6 mNm. With 20 steps per revolution, and
PRECIstep technology, the motor offers reliable, accurate motion, even in harsh
environments.
A 10/1 planetary gearbox provides a 256:1 reduction ratio in a 10-mm-
diameter package.
Vulnerability research
-We want a shell in that thing
-The firmware was not easy to find in the internet
-This equipment is very expensive
-Not everyone can buy these things directly to the
vendor, you need to be an organization/academics .
-Let tell you the story about how i was be able to get the
firmware …..
FUCK YEAH!!!!!!
WTF?
BUSTED…but too late for them
Too much talk!!
root@root
DEMO TIME
dolphin18
There is backdoor, factory user is not in official documentation.
Test some vulnerabilities.. You know..
PWD !! Shellshock
Bugs and errors everywhere
GURALP Systems are easy to find looking in the SSL certificate metadata in NetDB
Ok , now we are root so .. What’s next ?
PROTOCOL / COMMUNICATIONS
The Standard for the Exchange of Earthquake
Data (SEED) is a data format intended primarily
for the archival and exchange of seismological
time series data and related metadata. The
format is maintained by the International
Federation of Digital Seismograph Networks
and documented in the SEED Manual (PDF
format). Originally designed in the late 1980s,
the format has been enhanced and refined a
number of times and remains in widespread
use.
Data identification nomenclature
The SEED format uses 4 name components to uniquely identify a time series and
provide attribution to the owner of the data:
Network code: a 1 or 2 character code identifying the network/owner of the data.
These codes are assigned by the FDSN to provide uniqueness to seismological data, new
codes may be requested.
Station code: a 1 to 5 character identifier for the station recording the data.
Location ID: a 2 character code used to uniquely identify different data streams at a
single station. These IDs are commonly used to logically separate multiple instruments
or sensor sets at a single station.
Channel codes: a 3 character combination used to identify the 1) band and general
sample rate 2) the instrument type and 3) the orientation of the sensor. A convention
for these codes has been established and is documented in Appendix A of
the SEED Manual.
What if……
Guralp systems SCREAM protocol for transmitting seismic data over the internet
Conclusions
-We are be able to locate this devices anywhere in the world
-We are in control of the device , the network and the
software running on it.
-There is no SSL in communications
-This devices help engineers to save people and understand
the earth
-Vendors please… code better and think in security
Recommendations
THANKS
SEE YOU NEXT TIME !!

More Related Content

What's hot

Datasheet | Flir Scion PTM | Optics Trade
Datasheet | Flir Scion PTM | Optics TradeDatasheet | Flir Scion PTM | Optics Trade
Datasheet | Flir Scion PTM | Optics TradeOptics-Trade
 
Technical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
Technical data ATN Night Spirit MP-CGT Monoculars | Optics TradeTechnical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
Technical data ATN Night Spirit MP-CGT Monoculars | Optics TradeOptics-Trade
 
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...IRJET Journal
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
 
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTSADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTSHarikrishnan kv
 
Modem Acustici Subacquei EvoLogics
Modem Acustici Subacquei EvoLogics Modem Acustici Subacquei EvoLogics
Modem Acustici Subacquei EvoLogics Codevintec Italiana srl
 
Alert119 Storm Grid09ppt07021609
Alert119 Storm Grid09ppt07021609Alert119 Storm Grid09ppt07021609
Alert119 Storm Grid09ppt07021609Mpike6530
 

What's hot (10)

Datasheet | Flir Scion PTM | Optics Trade
Datasheet | Flir Scion PTM | Optics TradeDatasheet | Flir Scion PTM | Optics Trade
Datasheet | Flir Scion PTM | Optics Trade
 
Technical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
Technical data ATN Night Spirit MP-CGT Monoculars | Optics TradeTechnical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
Technical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
 
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
 
Satrack ppt
Satrack pptSatrack ppt
Satrack ppt
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
 
Data sniffing over air gaps 200524113012
Data sniffing over air gaps 200524113012Data sniffing over air gaps 200524113012
Data sniffing over air gaps 200524113012
 
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTSADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
 
Satrack
SatrackSatrack
Satrack
 
Modem Acustici Subacquei EvoLogics
Modem Acustici Subacquei EvoLogics Modem Acustici Subacquei EvoLogics
Modem Acustici Subacquei EvoLogics
 
Alert119 Storm Grid09ppt07021609
Alert119 Storm Grid09ppt07021609Alert119 Storm Grid09ppt07021609
Alert119 Storm Grid09ppt07021609
 

Similar to DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely

Hack.lu 2016
Hack.lu 2016   Hack.lu 2016
Hack.lu 2016 James Jara
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
Processing Rasters from Satellites, Drones, & More
Processing Rasters from Satellites, Drones, & MoreProcessing Rasters from Satellites, Drones, & More
Processing Rasters from Satellites, Drones, & MoreSafe Software
 
Homeland Heart Beacon Sosce
Homeland Heart Beacon SosceHomeland Heart Beacon Sosce
Homeland Heart Beacon Soscestevenjmcgee
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
SmarRack DCAM Solution
SmarRack DCAM SolutionSmarRack DCAM Solution
SmarRack DCAM SolutionArron Zhao
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringStefano Salsano
 
IoT Architecture for Water Resources Industry
IoT Architecture for Water Resources IndustryIoT Architecture for Water Resources Industry
IoT Architecture for Water Resources IndustryAren Matta
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
Null Feb 13
Null Feb 13Null Feb 13
Null Feb 13Sundar N
 
Application_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfApplication_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfrukmagoud shakkari
 
Dataloggers seminar Report
Dataloggers seminar ReportDataloggers seminar Report
Dataloggers seminar ReportNiranjan Kumar
 
Majorppt
MajorpptMajorppt
Majorpptvik001ind
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
Protecting the Power Grid
Protecting the Power GridProtecting the Power Grid
Protecting the Power GridPureTech Systems
 
audio labler device for visual impare
audio labler device for visual impareaudio labler device for visual impare
audio labler device for visual imparehusnatajwar
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsPower System Operation
 

Similar to DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely (20)

Hack.lu 2016
Hack.lu 2016   Hack.lu 2016
Hack.lu 2016
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Processing Rasters from Satellites, Drones, & More
Processing Rasters from Satellites, Drones, & MoreProcessing Rasters from Satellites, Drones, & More
Processing Rasters from Satellites, Drones, & More
 
Homeland Heart Beacon Sosce
Homeland Heart Beacon SosceHomeland Heart Beacon Sosce
Homeland Heart Beacon Sosce
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
SmarRack DCAM Solution
SmarRack DCAM SolutionSmarRack DCAM Solution
SmarRack DCAM Solution
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoring
 
IoT Architecture for Water Resources Industry
IoT Architecture for Water Resources IndustryIoT Architecture for Water Resources Industry
IoT Architecture for Water Resources Industry
 
Satrack
SatrackSatrack
Satrack
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Null Feb 13
Null Feb 13Null Feb 13
Null Feb 13
 
Application_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfApplication_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdf
 
Data recovery
Data recoveryData recovery
Data recovery
 
Dataloggers seminar Report
Dataloggers seminar ReportDataloggers seminar Report
Dataloggers seminar Report
 
Majorppt
MajorpptMajorppt
Majorppt
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
Protecting the Power Grid
Protecting the Power GridProtecting the Power Grid
Protecting the Power Grid
 
audio labler device for visual impare
audio labler device for visual impareaudio labler device for visual impare
audio labler device for visual impare
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid Operations
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsDEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsFelipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsDEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely

  • 1. Exploiting and attacking seismological networks .. Remotely Bertin B – James jara NetDB Search Engine DEFCON 24 Las Vegas, Nevada
  • 2. Disclaimer - This is not a typical talk -Probably it is the first research of this kind -All vulnerabilities have been reported to U.S CERT -We are not responsible of the actions that someone can take after attend this talk -Peace on earth
  • 3. Agenda -Who we are -Motivation -How we discovered this devices? -Risk /Impact , who is affected by attacking this devices ? -Seismological instrumentation -Internals /Deployment/Networking -Vulnerabilities /firmware analysis -Attack vectors / post exploitation -Recommendations/conclusions
  • 4. Bertin Bervis NetDB Co-founder @bertinjoseb James Jara NetDB Co-founder @jamesjara
  • 5. We are from San Jose Costa Rica
  • 6. Motivation Why we are interested in seismological networks? An average attacker is not interested for this attacks Governments are interested.. you know.. …..!@#$% WAR Cool and new attack scenario ¨extreme environment¨ You are playing with devices that measure natural disasters Could lead to a financial sabotage to a specific company/country The vendors of this instruments doesn’t have any sense of computer security Remote access, remote exploitation Ok let’s continue this project…
  • 7. How we discovered this devices? DEMO
  • 8. Fingerprints too many fingerprints
  • 9. For some strange reason you find a unique fingerprint in millions… DEMO
  • 10. So.. WTF is TAURUS ???? Let´s connect to that shit NOW!
  • 11.
  • 12.
  • 13. Seismometers are instruments that measure motion of the ground, including those of seismic waves generated by earthquakes, volcanic eruptions, and other seismic sources. Records of seismic waves allow seismologists to map the interior of the Earth, and locate and measure the size of these different sources. Wikipedia Common aplications: -Earthquake detection -Geophysics, geothermal development -Structural analysis -Mine safety -Fracking / Drilling
  • 14.
  • 15.
  • 16.
  • 17. GPS REAL DATA LOCATION DEMO Ocean bottom seismograph
  • 18. Impact -No one else has ever done a research about security of this devices or networks before -Remote Denial of service -Remote management -Several Bugs -Sabotage seismological country’s network -Economic impact for Oil and Gas research for specific company -Drug trafficking submarine detection -Military -Unknow
  • 19. This increased understanding can lead to improved oil and gas recovery.
  • 21.
  • 22.
  • 23.
  • 24. Internals Linux based OS Remote management SSH TELNET FTP Web Server GPS Ocean bottom Battery /Solar panels
  • 26.
  • 27. Deployment options The Taurus may be deployed as either a stand-alone data recorder or as a network component. For stand-alone recording where network access is not required, typically you would configure the Taurus to run in Buffered mode. It consumes less power in this mode as the Controller only runs when the Taurus is recording buffered data to the Store. For networked operation you must configure the Taurus to run in Communications mode and configure the appropriate network options. In this mode, the Controller is running continuously. It consumes more power than Buffered mode but allows continuous access via an IP connection. You can stream time-series data from a Taurus to a central acquisition server, for example to write the data to NAQS ringbuffers. To stream Taurus data to NAQS, the NpToNmxp utility must be running on the NAQS server • Stream NP Packets – Set Taurus to stream data to the specified destination; enabled , not enabled . Factory default is not enabled. • IP Address – The address of the streaming destination (for example, a NAQS server); a valid IP address in dotted decimal format Applications software Nanometrics Apollo acquisition server with web interface
  • 28. Geophysicists depend on seismometers to monitor earthquakes generated by the motion of the tectonic plates that form the Earth’s crust. In order to function, the instruments need to be leveled prior to operation. That’s easy enough for a device deployed on dry land, but when it comes to seismometers placed on the ocean floor thousands of feet below the surface, the process gets a bit more challenging. To solve it, Nanometrics Inc. (Kanata, Ontario) combines sophisticated gimbals and microprocessors, along with ultra- reliable, efficient motors from MICROMO (Clearwater, FL).
  • 31. Ocean Bottom seismic network - Autonomous Underwater Vehicles (AUVs)
  • 32. Athena: Event Cataloging and Notification Management
  • 33. Challenge: In order to function, the instruments need to be leveled prior to operation. Not easy when it is thousands feet on the ocean floor. Solution: To solve it, Nanometrics Inc. (Kanata, Ontario) combines sophisticated gimbals and microprocessors, along with ultra-reliable, efficient motors from MICROMO (Clearwater, FL) Results: A Trillium 240 was deployed at the South Pole and it operated perfectly. The turn- on temperature was -58°C (-136°F). The system temperature settled eventually to -50° C (- 122°F) and stayed there for a long period of time. The motors turned on and did exactly what they were supposed to do
  • 34. OCEAN BOTTOM DEPLOYMENT VIDEO DEMO To deploy the Trillium OBS (black cylinder), users attach the seismometer to a metal sled that carries it down to the sea floor. At the end of the experiment, the transponder signal triggers the release of ballast and the instrument floats to the surface. (Courtesy of Nanometrics Inc.
  • 35. Inside the Solution Seismometers capture transient phenomenon. If an instrument malfunctions, whether it’s at the bottom of the ocean or atop a polar ice cap, that data is lost forever.“You need to be absolutely sure the sensor will perform perfectly every time,” says Jeff Potter, director of marketing at Nanometrics. “Seismometers also need to be small and consume very little power when they level themselves, and that’s where MICROMO has helped.” The leveling mechanism integrates the following devices: The AM1020-V-6-65, a in a 10-mm-diameter, two- phase stepper motor that provides a peak torque of 1.6 mNm. With 20 steps per revolution, and PRECIstep technology, the motor offers reliable, accurate motion, even in harsh environments. A 10/1 planetary gearbox provides a 256:1 reduction ratio in a 10-mm- diameter package.
  • 36. Vulnerability research -We want a shell in that thing -The firmware was not easy to find in the internet -This equipment is very expensive -Not everyone can buy these things directly to the vendor, you need to be an organization/academics . -Let tell you the story about how i was be able to get the firmware …..
  • 38. WTF?
  • 42. There is backdoor, factory user is not in official documentation.
  • 43. Test some vulnerabilities.. You know.. PWD !! Shellshock
  • 44. Bugs and errors everywhere
  • 45. GURALP Systems are easy to find looking in the SSL certificate metadata in NetDB
  • 46. Ok , now we are root so .. What’s next ? PROTOCOL / COMMUNICATIONS The Standard for the Exchange of Earthquake Data (SEED) is a data format intended primarily for the archival and exchange of seismological time series data and related metadata. The format is maintained by the International Federation of Digital Seismograph Networks and documented in the SEED Manual (PDF format). Originally designed in the late 1980s, the format has been enhanced and refined a number of times and remains in widespread use.
  • 47. Data identification nomenclature The SEED format uses 4 name components to uniquely identify a time series and provide attribution to the owner of the data: Network code: a 1 or 2 character code identifying the network/owner of the data. These codes are assigned by the FDSN to provide uniqueness to seismological data, new codes may be requested. Station code: a 1 to 5 character identifier for the station recording the data. Location ID: a 2 character code used to uniquely identify different data streams at a single station. These IDs are commonly used to logically separate multiple instruments or sensor sets at a single station. Channel codes: a 3 character combination used to identify the 1) band and general sample rate 2) the instrument type and 3) the orientation of the sensor. A convention for these codes has been established and is documented in Appendix A of the SEED Manual. What if……
  • 48.
  • 49. Guralp systems SCREAM protocol for transmitting seismic data over the internet
  • 50.
  • 51.
  • 52.
  • 53. Conclusions -We are be able to locate this devices anywhere in the world -We are in control of the device , the network and the software running on it. -There is no SSL in communications -This devices help engineers to save people and understand the earth -Vendors please… code better and think in security