Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems

centralohioissa 2,232 views 67 slides Apr 19, 2016
Slide 1
Slide 1 of 67
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67

About This Presentation

Attacking Physical Access Systems


Slide Content

All Your Door Belong To Me – Attacking Physical Access Systems Valerie Thomas Executive Security Consultant @hacktress09

Executive Security Consultant for Securicon 10+ years in Information Security Coauthor of Building A Security Awareness Program Social Engineering trainer Physical access “enthusiast” Introduction

Agenda Why this talk? Topology of a physical access system (PACS) Why PACS deployments are insecure Attack surfaces and exploits Putting it all together for complete takeover

What Is A Physical Access System? A Physical Access Systems (PACS) consists of several components working together to ensure that access is granted or denied to a controlled area when appropriate.

Why Physical Access Systems?

PACS Components Access control point Door Gate Turnstile Credential Reader Credential Access card Electronic fob Personal identification number (PIN) Biometric

Access Cards Low frequency 125kHz Small amount of data Unencrypted High frequency 13.56 MHz Large amount of data Sometimes encrypted

Access Cards

PACS components Access control panel Decodes binary data Compares card data to an access list, then grants or denies entry

Access control server Software provided by manufacturer Usually a Windows server Maintains card records Maintains access groups Card format details Event monitoring Door components Electric strike Door contact Request to exit (RTE) PACS components

How credentials are read https:// media.blackhat.com /us-13/US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Slides.pdf

https:// en.wikipedia.org /?title= Access_control #/media/ File:Access_control_door_wiring.png

https:// en.wikipedia.org /?title= Access_control #/ media File:Access_control_topologies_main_controller_a.png

The Split Personality of Security Computer Security Protects v aluable assets Typically reports to Technology or Financial Officers “You must be really smart” Controls designed and implemented by network security professionals Physical Security Protects v aluable assets Typically reports to Administration or Facilities Organization “You’ll get a better job someday” Controls designed and implemented by electrical contractors

Why PACS deployments are insecure The gap between physical and cyber security is closing The physical security industry is ~15 years behind IT No security maturity model Vendors implement features without security testing Heavily reliant on IT but lack understanding Often deployed and forgotten

HID iClass The card and reader perform mutual authentication using a 64 bit encryption key This key is programmed into the reader at the manufacture Don’t worry - It’s encrypted! Why PACS deployments are insecure

https:// www.blackhat.com /docs/us-15/materials/us-15-Evenchick-Breaking-Access-Controls-With-BLEKey-wp.pdf

Physical security culture Majority are former military/defense Lack technical understanding of PACS Unaccustomed to patching/addressing vulnerabilities Vendor loyal Resistant to change Why PACS deployments are insecure

Attack surfaces and exploits Access cards Readers Request to exit devices Access control panel Access control server Workstations

Access card attacks

Access card attacks - Long Range Weaponized long range reader (read & record) Does not clone/write Read distance is ~2ft Available for Proximity iClass (Standard Security) Indala

Pros Improved read range Stores hundreds of card reads No interaction required – just power on Cons Expensive =( Can misread custom card formats Access card attacks - Long Range

Design 1 – Tastic RFID Thief

Tastic RFID Thief Output File

Tastic RFID Thief Parts list and design details: http ://www.bishopfox.com/resources/tools/rfid-hacking/attack-tools /

Design 2 - RavenHID

RavenHID BLE Mini Add-on ( http://redbearlab.com ) Parts list and design details https ://github.com/ emperorcow / ravenhid

Long Range Power Must have 12V Output

Access card attacks – low tech Most vendors print the card number ON THE CARD

Access card attacks – low tech And on the box

Reader attacks - BLEKey Inserted in-line with the reader Records card data and sends via Bluetooth Replays data Reader DoS

Reader attacks - BLEKey Blackhat presentation https://www.blackhat.com/docs/us-15/materials/us-15-Evenchick-Breaking-Access-Controls-With- BLEKey.pdf Parts list and software https://github.com/linklayer/ BLEKey

Request to exit device attacks

Access control panel a ttacks Remember how important door controllers are? Medium to large environments will have multiple door controllers These controllers are usually reachable from the general address pool Often have very useful data

Hunting Door Controllers Many controllers have features to simplify configuration Embedded web servers FTP SNMP Access is generally open or protected with a weak default password Many allow anonymous FTP

Hunting Door Controllers Keep in mind… These devices can be very fragile – heavy scanning is not recommended Many of the web interfaces will only work in IE Don’t change any settings

Hunting Door Controllers Ports to look for TCP 21 TCP 23 TCP 80 UDP 161 TCP 9999 Keywords in DNS/Nessus Scans Tyco iStar Matrix Lenel

What Can Controllers Tell Us? Card numbers and access log Areas they control IPs of other controllers IPs of the access server Passwords!

Web Interface

Web Interface

Web Interface

Web Interface

VertX https:// github.com /brad- anton / VertX

Hunting Access Servers Usually not as obvious as controllers Majority are Windows Servers Can often obtain the IP from a controller DNS search is a fairly reliable method

Hunting Access Servers DNS/Nessus Keywords CCURE/C-CURE/C*CURE OnGuard AccessControl FacilityCommander Additional keywords at http://www.capterra.com/physical-security-software /

Other PACS Resources PACS information and card data can be found in other areas of the network SharePoint Email Document shares (usually in null session) Guard workstations

Putting it all together Long range reader to collect card data Programmed duplicate cards and created fake employee card Observed security guard daily activity

Putting it all together Placed hardware keyloggers Captured credentials and other useful data Gained access to access server Produced duplicate cards for employees with the most access

Putting it all together

Putting it all together

Game Over

Long road ahead Physical security has a lot of catching up to do Will require huge culture shift Many of the misconfigurations discussed are preventable PACS security checklist (in progress)

[email protected] @hacktress09