hacking non-traditional systems

20
Hacking Non-Traditional Systems Luis ‘ connectionSantana

Upload: luis-santana

Post on 08-Jul-2015

550 views

Category:

Technology


0 download

DESCRIPTION

This talk will demonstrate common vulnerabilities in 'non-traditional' systems such as kiosks, embedded systems, and the like and explain why these systems are such low-hanging fruit for security researchers.

TRANSCRIPT

Page 1: Hacking Non-Traditional Systems

Hacking Non-Traditional Systems

Luis ‘connection’ Santana

Page 2: Hacking Non-Traditional Systems

Who Am I?

• Independent Security Researcher

• Security Consultant @ AccuvantLABS

• Newbie Hardware Hacker

• @hacktalkblog on twitter

• ‘Connection’ on the interwebz

Page 3: Hacking Non-Traditional Systems

• Physical Security Sucks!

What’s The Point

Page 4: Hacking Non-Traditional Systems

The Big Problem

• Physical Security

• Accessible USB ports

Page 5: Hacking Non-Traditional Systems

Physical Security

• Rudimentary

• Often A Second Thought

• Completely non-existent

Page 6: Hacking Non-Traditional Systems

• Devices share many vulnerabilities

• Highly trivial

• Plain-text communications

Common Vulnerabilities

Page 7: Hacking Non-Traditional Systems

• Highly trivial

• Old techniques, new devices

• OMIGAWD 0day!

• Electrical Engineering skills not needed

Easy As Pi

Page 8: Hacking Non-Traditional Systems

• Bus Pirate

• Standard serial protocols.

– I2C

–UART

– JTAG

– SPI

• Common ‘Industry’ Protocols

The Protocols

Page 9: Hacking Non-Traditional Systems

‘Kiosk-Like’ Systems

Page 10: Hacking Non-Traditional Systems

• Often touchscreen

• USB FTW

• Local Administrator

• Hidden Menus

• Easy break-outs

• Often Windows XP

• PXE Booting

‘Kiosk-Like’ Systems

Page 11: Hacking Non-Traditional Systems

Accessible USB Ports

• Should be hidden

• Consumers don’t need them

• #DontLeaveShit

Page 12: Hacking Non-Traditional Systems
Page 13: Hacking Non-Traditional Systems

Vending Machines

Page 14: Hacking Non-Traditional Systems

• Debug codes

• Limited security

• No Encrypted Swipe

Vending Machines

Page 15: Hacking Non-Traditional Systems

• Much more than debug menus

Not Just 4-2-3-1

Page 16: Hacking Non-Traditional Systems

Hacking Is Delicious!!!

Page 17: Hacking Non-Traditional Systems

• The Device That Cried ‘SQLi’

Story Time!

Page 18: Hacking Non-Traditional Systems

• Research

• Working With Vendors

• Methodologies

• Funding

• Toolkits

• New Market

What’s Next?

Page 19: Hacking Non-Traditional Systems

• Patrick Fleming– For my first non-traditional system gig

• Accuvant LABS– For letting me poke at hardware and work on this

talk

• You!– For coming to my talk and (hopefully) learning

some new things

Thanks

Page 20: Hacking Non-Traditional Systems

• Any Questions?

• Contact Info:

–Email: [email protected]

–Gtalk: [email protected]

–Twitter: @hacktalkblog

Questions?