Home
C. Paulino, SCADA Security - Florida Gulf Coast University
Contents
1. Y metasploit community zalewski f RAPID7 R75 AM 11 15 2017 Fig 26 Log into Metasploit 29 eS ae File Edt View Favorites Took Help da suggested Stes v GB FGCU Banner E FGCU Directory FGCU Home Page E FGCU Paseword Reset Poe E FGCU Webmail Home E Guiflie E MyVPN E Web Slice Gallery MY voc me sx Pager eyr Tooke r 0 services detected 0 passwords cracked 9 vulnerabilities identifed 0 SMD hashes stolen O SSH keys soten P San 0 mper expose fb Drutetorce Exploit Evidence Collection Cleanup 0 data files acquired 0 closed sessions Git Collect d Cen Recent Events Show ail events Time Event Details Nov 160926 30 user login successful remote login tom 127 0 0 1 show Nev 180925 44 user logout show da D Suggested Sites w E FGCU Banner FGCU Directory FGCU Home Page FGCU Pasoword Reset Pee E FGCU Webmail Home E Guifine E MyVPN E Web Slice Gallery v M Eo Wey Pager Safety aki Adminiatration Y mrmuniny hosts discovered 0 sessions opened 0 services detected 0 passwords cracked D vulnerabilites identifed 0 SMO hashes stolen 0 SSH keys stolen d san import Mengen fb Drutetorce C Lxpiot Evidence Collection Cleanup 0 Gala files acquired 0 closed sessions me Collect y Cem Recent Events Show all events Time Event Details Nov 16032630 user login successful remote login fom 127 0 0 1
2. NN EN Use mm of he Captus mme Oper a porasty captured te Vut Te poeci vm kovu erg paco Open Recent Crocs rw oF mos meer Captus Som m Start Sample Captures Koap STRA Gey b Meth Connector Deci NPY JAB181 0 17A6 955 M O00 DLABIT A nc amommen of example captum Sar on me ete Security Wot vt Weer ee reg m potios agi Cepture Options rein tee a Tagen regen v How to Capture LIN LE Network Media J Nee Rem ren Ne Caper ver Deren WLAN _ Fig 18 Start Wireshark packet capturing 23 Die dd Yew Go Capture Anstyze apen Telephony Tock jetemah Hee Guada Sax 972 QQQMN ggex x Fhe Expression Oer Apply Se Ne Time source Dengen Ze Frame 1 60 bytes on wire 480 bits 60 bytes captured 480 bits on interface O Ethernet 11 Src Pfu cc ae 40 00 80 17 cc ae 40 Ost Broadcast ffiff ff ff ff ff internet Protocol Version 4 Src 69 88 163 30 69 88 163 30 Ost 255 255 255 255 255 255 255 255 User wn Ph te cain Src Port dcutility 1044 Ost Port d2000kernel 3119 pata 9 bytes Fig 19 Open SCADA FrontEnd 24 23 eo pohMypetaca st ie prg P x D rege AC 2 Lopin Page em e e Fig 20 Log into SCADA FrontEnd F edu mr Wypertace st m pt 3 gt D cXIB Hypa TACE Sains LOCAL Data Flow Systems HELE a EC E DL RS R4 ig wana Fig 21 Select view tab in SCADA FrontEnd 25 EN VIEW REPORTS TOOLS CONFIG BUILD PORTAL HE
3. Task 2 V Your Metasploit Community E O Christian Paulino Outlook W File Edit View Favorites Tools Help s i L Suc ested Sites FGCU Banner FGCU Directory FGCU Home Page FGCU Password Reset Por FGCU Webmail Home Gulfline MAN 2 ce Gallery Los ode v Pager Safetyv Tock Qv x EB Project FGCU SCADA v Account zalewski Y Administration Community 2 Help geg Overview 44 Analysis Sessions Campaigns Web Apps ve Modules Tags ij Reports Tasks 0 Home FGCUSCADA Tasks Task2 4 Collect Started 2012 11 16 09 40 18 0500 Bruteforcing Complete 0 sessions opened v Complete Duration less than a minute d Replay 2012 11 16 093 41 03 2 11 16 09 41 03 2012 11 16 09 41 03 11 16 09 41 03 2012 11 16 09 41 03 2012 11 16 09 41 03 2012 11 16 09 41 03 161SNMP 0 09 09 03 05 0 012 11 16 09 41 03 161SNMP 0994 1000 69 88 163 30 161 Trying 147852369 0 0 0 0 0 03 lelSNMP 1615NMP l61SNMP leiSNMP 161SNMP 1615NMP P Trying imissyou Trying pollito P Trying ashlee SNMP Trying tucker Trying cookiel 0992 1000 69 88 61 SNMP Trying shelly 993 1000 69 88 0 161 SNMP Trying catalina 2012 11 16 09 41 03 2012 11 16 09 41 03 2012 11 16 09 41 03 2012 11 16 08 41 03 2012 11 16 09 41 03 2012 11 16 09 41
4. MA 2011 PA Consulting Group and CPNI Good Practice Guide Process Control and SCADA Security PA Consulting Group and CPNI London P Aubin SCADA Communications Security Authentication Encryption Integration www controlmicrosystems com G A Cagalaban Y So S Kim SCADA Network Insecurity Securing Critical Infrastructures through SCADA Security Exploitation Journal of Security Engineering D Kilman J Stamp Framework for SCADA Security Policy Sandia National Laboratories Albuquerque NM C Neuman Understanding Trust and Security in SCADA Systems Information Sciences Institute University of Southern California H Ko Application of Asymmetric key Encryption Method for Internet based SCADA Security Journal of Security Engineering J Caswell Survey of Industrial Control Systems Security www cse wustl edu jain cse571 11 ftp ics index html S Panguluri W R Phillips Jr R M Clark cyber threats and it scada system vulnerability www digitalengineeringlibrary com 33 13 14 15 16 17 18 19 A Saxena O Pal Z Saquib D Patel Customized PKI for SCADA System Int J of Advanced Networking and Applications Volume 01 Issue 05 Pages 282 289 2010 T Kim Securing Communication of SCADA Components in Smart Grid Environment international journal of systems applications engineering amp development Issue 2 Vol 5 2011 R
5. The second step was to perform an exploit test An exploit test involves trying to take advantage of a bug glitch vulnerability etc in order to gain access to a system The exploit test ended after three minutes with the attack being unsuccessful Wireshark Wireshark testing was the last part of the analysis done It was used to analyze packets being sent to and from the SCADA server After starting a packet capturing session the workstation was used to logon to the SCADA server After viewing the current summary of the SCADA system the packet capturing session was terminated The packets were filtered down to just the ones related to the SCADA system These packets were analyzed to show how strong the systems log in security was The security proved to be strong and thus ended the analysis 3 Definition of the Problem A specific SCADA system may have critical importance to the systems infrastructure which make security extremely important Because SCADA systems work on a network they are vulnerable to attack Important information may be stolen an operator may be locked out at a critical time and the control may be disrupted Many SCADA system operations are delicate If one 1s interrupted it may result in large amounts of damaged equipment injury to humans or even death 3 For this project the focus is on network intrusions through viruses worms and other types of malicious code A key element for any network to protect a
6. Launch Bruteforce button at the bottom Figure 30 Last go back to Overview and run an exploit test by clicking the Exploit button under the Penetration section Make sure the only IP address in the target addresses box is the SCADA server address Start the test by clicking the exploit button Figure 31 Refer to the implementation section for the experimentation results 28 Figures for metasploit user manual A m deeg A B herp Nocahost 1790 D C X f Download Metasploit Metesp Christian Paulino Outlook W localhost x C 6 O am Pager Seetyv Tools AU N eege vd There is a problem with this website s security certificate The security certificate presented by this website was not amp sued by trusted certificate authority The security certificate presented by this website was Issued for a different website s address Secunty certificate problems may dicate an attempt to fool you or intercept any data you send to the server We recommend that you close this webpage and do not continue to this website K Venzon Wireless UML290 Firmware Upd Rik e 1 e a P P D ys Ia 1046 AM i A PL mm JAR 4 i2 unm Pac File Edit View Favetites Took Help Ge D Suggested Stes e D FGCU Banner E FGCU Directory FGCU Home Page E FGCU Pasoword Reset Poe E FGCU Webmail Home d Guifine D MyVPN E Web Slice Gallery v P px me Pager Safetjv Tooke e
7. engineering campaigns created New Campaign Show all events Time User Event Nov 16 09 41 06 zalewski module complete auxiliary pro bruteforce Nov 16 09 41 06 zalewski module complete auxiliary scanner snmp snmp login 11 16 2012 Fig 14 Metasploit results overview 20 Appendix A User Manual Wireshark 1 Turn on the SCADA workstation and log in under the username Zaleski with the passwordikselaz 2 Start Wireshark from theWindows start menu Figure 15 3 Once inside Wiresharkfrom the Capture dropdown menu choose the Interface This will bring up the window with Ethernet card information in which the MAC card has to be selected Figure 16 and Figure 17 4 Start the packet capturing process by going the Capture dropdown menu and clicking start Figure 18 This will result in a packet capturing screen Figure 18A 5 Open SCADA FrontEnd from the desktop icon Figure 19 6 Log in under the user name mgr The password is htiimgr Figure 20 7 Open up the customized view for the SCADA server First click the view button and then click the custom button Figure21 Figure 22 and Figure 23 8 Stop the packet capturing process Figure 24 9 Theresults can now be viewed The implementation section shows the experimentation results from the packets captured 21 Figures forwireshark user manual Fig 15 Opening Wireshark The V Zeen Ne X 7 fie fdt Yew Go Capome Analyze Ststetcs Telephon
8. show Nev 180925 44 user logout show Fig 28 FGCU SCADA project page in Metasploit 30 7 File Edit Wew Favorites Took Help Gy suggested Stes w GB FGCU Banner E FGCU Directory FGCU Home Page E FGCU Paseword Reset Poe FGCU Webmail Home E Guifline E MyVPN E Web Slice Gallery v Qe 7 r Pager Safety Tooke Mv ba e g metasploit commun Overview SMMAmiyie Geesen Campaigns Web Apps SP Modules lt Tens Reporte E Tee deenen mua Fei Target Settings Tag andes 40100 33 1 254 Ek 69 88 163 30 A Smow Advanced Options Ve Motaspioit Community 4 4 0 Update 1 2010 2012 Rapid lnc Boston MA str RAPID File Edk View fovea Took Hap da D Suggested Sites w H FGCU Banner FGCU Directory FGCU Home Page FGCU Pasoword Reset Pee E FGCU Webmail Home E Guifine D MyVPN D Web Slice Gallery v M GY Oo o Pager Sem Tooke Qe Target Aderesses enen Depth normai zl f Toggle Am Services Lockout Hank Di se Wiin tS server rap 9 Postgres Poste SC database low Si om DU DR database Low My5SOL My SOL database Medium WI uss Microsofl SQL Serves dalabase Medan 9 Orade Oratie ROUMS Server Low H Hm MTTP server hase authenteaten Lew wrres HTTPS server basic avtheebcaton Low HW Sen Secure Shet server Mecum F ssh PunkkY Secum Shed server ptic try antic ater low D I Tenet Telnet server low wj rm Fdo Tranaten Eed d verom low i9 fors Post Office Protoco
9. wire 4864 bits 608 bytes captured 4864 bits on interface 0 s Ethernet II Src HewlettP 25 e0 0d 08 2e 5f 25 e0 0d Dst Pfu_cc ae 40 00 80 17 cc 3e 40 a Transmission Control Protocol Src Port 50354 50354 Dst Port http 80 Seq 1 Ack 1 Len 554 0000 00 80 17 cc ae 40 08 2e 5f 25 e0 00 08 00 45 00 amp Ass E 0010 02 52 2f 65 40 00 80 06 00 00 45 58 a3 1c 45 58 R eQ EX EX 0020 a3 le c4 b2 00 50 56 fc al 8d 03 4e 6b a6 5018 PV KR ANANA AN IA d IF AN AN AT AC RA IN IF 73 Ah AO Ra 723 Y FE T elanc 0 y File C Users ZALEWS 1 AppData Local T Packets 534 Displayed 534 Marked 0 Dropped 0 Profile Default y m n i P CNR EE E F DUU _ Fig 7 Whireshark all packets 13 The Wireshark results were filtered to include only packets sent from the workstation to the SCADA server as shown in Figure 8 The filtering is done by entering a command into the filter text box The filter text box is highlighted green in Figure 8 To filter by IP address both source and destination addresses are required The command used to filter between the workstation and the SCADA server is ip src 69 88 163 28 and ip dst 69 88 163 30 fj Intel 82579LM Gigabit Network Connection Device NPF_ 47A9AF1B 9E17 4670 9655 49FD9BEO8A98 Wireshark 1 8 3 SVN Rev 45256 from trunk 1 8 File Edit View Go Capture Analyze Statistics Telephony Tools Internals Help TT CEECEE E
10. 161SNMP l161SNMP 161SNMP 161SNMP 161SNMP 161SNMP 0995 1000 69 88 163 30 161 Trying beckham 996 1000 69 88 163 30 161 S Trying simone 997 1000 69 88 163 30 161 P Trying nursing 9986 1000 69 88 163 30 161 P Trying iloveyou 999 1000 69 88 163 30 161 S Trying eugene 1000 1000 69 88 163 30 161 SNMP Trying torres 09 41 06 Attributing credential sources Rapid7 Support Center RAPID7 wi 6 TREE Fig 12 Metasploitbruteforcetest results The last test is an exploit test An exploit test checks for any faults in the SCADA server and attempts to use them to get into the server The exploit tests against the SCADA server failed which means there weren t any faults detected by Metasploit that could be abused The results of this test are shown in figure 13 The overall results page of all the tests 1s displayed in figure 14 18 Lola EEN ts https localhost 2790 workspaces 2 tacks 3 D Q Certificate error X File Edit View Favorites Tools Help a E Suggested Sites FGCU Banner FGCU Directory FGCU Home Page FGCU Password Reset Por FGCU Webmail Home Gulfline E MyVPN Web Slice Gallery v ef 7 me Pager Safetyy Took v He is y g yVEN i 9 ty Gol 7 Metasploit Task 3 0 Christian Paulino Outlook W x BB Project FGCU SCADA v Account zalewski Y amp Administration Y Community He
11. D Dillinger M A Rumsey COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS Sandia National Laboratories MS O708Albuquerque New Mexico 2003 J Mamos SCADA Information Security Management Guide E Udassin control system attack vectors and examples field site and coporate network www c4 security com 2008 R K Fink D F Spencer R A Wells lessons learned from cyber security assement of scada and energy management systems U S Department of Energy Office of Electricity Delivery and Energy Reliability 2006 35 28 29 30 31 A McIntyre B Becker R Halbgewachs Security Metrics for Process Control Systems Sandia National Laboratories Albuquerque New Mexico 2007 R E Johnson Survey of SCADA security challenges and potential attack vectors Internet Technology and Secured Transactions ICITST International Conference for Date 8 11 Nov 2010 Riverbed Technology Wireshark www wireshark com Rapid7 Metasploit www metasploit com 36
12. ER Qqqam gERX g Filter ip src 69 88 163 28 and ip dst 69 88 163 30 dree Clear Apply Save No Time Source Destination Protocol Length Info 63 9059769 88 163 28 69 88 163 30 TCP 6650354 gt http SYN Seq 0 Win 8192 Len 0 MSS 1460 WS 4 SACK_PERM 1 CSC 4 nn iFrame 6 66 bytes on wire 528 bits 66 bytes captured 528 bits on interface 0 Ethernet II Src HewlettP_25 e0 0d 08 2e 5f 25 e0 0d Dst Pfu cc ae 40 00 80 17 cc ae 40 0000 00 80 17 cc ae 40 08 2e Sf 25 e0 0d 08 0045 00 ie ere 0010 00 34 2f 08 40 00 80 06 00 00 45 58 a3 1c 45 58 A8 EX EX 0020 a3 1e c4 b2 00 50 56 fc al 8c 000000008002 Ele ads xin D n n nn di 11 NN AN no NA AC hd M1 Di Di m n D 0 M File C Users ZALEWS 1 AppData Local T Packets 534 Displayed 151 Marked 0 Dropped 0 ac DTM Profile Default Fig 8 Wireshark workstation to SCADA server packets 14 Next Wireshark was filtered even further to highlight the login packet This is shown in Figure 9 This was found by using the ctrl f function After hitting ctrl f String needs to be selected and then any String that resides in the list of packets can be found In this case it was mgr which is the username The username was searched for until the packet that displayed both the username and the key That packet 1s the one that was used to login E 82579LM Gigabit Network Connection Device NPF 47A9AF1B 9E17 4670 9E55 48FD9BE08A98 Wireshark 1 8 3
13. J Robles M Choi E Cho S Kim G Park S Yeo Vulnerabilities 1n SCADA and Critical Infrastructure Systems International Journal of Future Generation Communication and Networking J St Sauver SCADA Security NLANR Internet2 Joint Techs MeetingColumbus OH July 21 2004 A N Mahmood C Leckie J Hu Z Tari M Atiquzzaman Network Traffic Analysis and SCADA Security The President s Critical Infrastructure Protection Board 21 Steps to Improve Cyber Security of SCADA Networks The President s Critical Infrastructure Protection Board Riptech Inc Understanding SCADA System Security Vulnerabilities Riptech Inc 2001 34 20 21 22 23 24 25 26 27 Intelligent Systems Research Laboratory Technical Report TR ISRL 04 01 Security Considerations in SCADA Communication Protocols Dept of Computer Engineering and Computer Science University of Louisville Louisville KY 2004 PA Consulting Group and NISCC Good Practice Guide Process Control and SCADA Security PA Consulting Group London office of the manager national communications system Supervisory Control and Data Acquisition SCADA Systems office of the manager national communications system Arlington VA 2004 R K Fink D F Spencer R A Wells lessons learned from cyber security assessments of scada and energy management systems National SCADA Test Bed 2006 W F Young J E Stamp and J
14. LP A DFS Data Flow Systems HELP E Le E wW E oF T ees Fig 22 Select custom view tab in SCADA FrontEnd P E 0 ap zm e eg een o o op eypettaci 194 D ox J MyperTACE Stars LOCAL VIEW REPORTS TOOLS CONFIG BUILD PORTAL HELP A Links HSU Status RUNNING Server Date RUNNING Map Screen Server Time ESCH RUNNING District Screen ISU 0C Power BERD TTT NORMAL Local Area Screen isi AC Pow MM NORMAL CA MGE BL BR D nya Fig 23 SCADA server statistics 26 li Capturing Irom intel 3253790 Gah Network Connechon Were t ATARA IB E1 AE St AETORIEACH Wireshark 187 GVN Rev 45256 from trusk Lil mem file Edi Ve Go Capture graye aksies Telephony Toots bes Hep Be d Qi E rota OM Ti EBRGaamausmes S a piss Cirl K Filer RN ou Craft Eeperzgen Char Apply Serve He Time a Step fug Pater Protocol Length In s a Cul R id 3004 gt ete S i 5 Frame 1 60 bytes on wire ABO bits 60 bytes captured 4B bits on interface 0 Ethernet II Src Ffu cciae dO 0 80 lT ccraec40 Oat Broadcast ff ff TF fF fF fT 3 Internet Protocol Version 4 Sre 69 88 1565 50 63 ER 161 10 Dst 255 255 255 255 255 255 255 255 User Datagram Pra tocol Src Part dewtility 1044 pat Port d2O0 0O0kernel 3109 3 Dara 9 bytes 0000 ff ff ff ff ff
15. Packet filtering process Source http fengnet com book Building Secure Servers with Linux bssrvrlnx CHP 2 SECT 5 html 10 5 Implementation The first step is to see what connections are running on the SCADA server The tests were conducted via Putty on the workstation through an SSH connection The command netstat at was entered and all active networks going through the network device were displayed The results are shown in Figure 4 Fig 4 Active TCP Internet Connections 11 Next the command netstat Al was entered to display the active connections on UDP network communication The results are shown in Figure 5 mjr HyperTACII mgr l netstat 1 Active Internet connections only Servere Proto Recv Q Send Q Local Address Foreign Address state er icdlkulmni Sp LISTEN ECE m myxgi Di LISTEN CE u fW I LISIERH LCE itt pe LISTEN ter printi e LISTEN LCE u ant ei LISTEM c n ftp d LISTEN tej time LISTEN Lop telnet LISTEN CCE j ais E e LISTEN CE J gin LISTEN er J finger LISTEN Cep jut n LISTEM t CE LU P l104 ei e LISTEN ter z5unrpc j LISTEN udr df svolcs ug m 1044 udg j 21043 ud j 1042 ud j sdfepatch d lide j dishzuport P udg 1041 x ude 0 21040 x udp 21035 udg rivasr ude drivert i ude d sdri udr j 103 udr j dh DOE j 2 103 Fig 5 Active Network UDP Connections The last netstat command that was run was netstat XI Thi
16. RTU 3 This is illustrated in Figure 1 SCADA Architecture DAS Fig 1 Typical SCADA system setup Source http isc sans edu diary html storyid 13927 For this project there is one RTU one controller and a workstation connected to the controller The operator uses a web based human machine interface HMI to control and monitor the system The RTU and supervisory station are shown in figure 2 This project focuses on the security aspect of aSCADA system There are many issues in security when it comes to a SCADA system Some examples are e Encryption and Authentication e Network Traffic Analysis e Common Security Vulnerabilities Fig 2 SCADA system RTUin Florida Gulf Coast University CS lab 1 1 Encryption and Authentication Encryption hides the data and authentication forces the sender of data to prove their identity SCADA s communication security standards are set in place to protect the system from spoofing encryption attacks signature attacks and protocol attacks replay of messages data tampering and eavesdropping 6 Spoofing is when a third party pretends to be one of the communication devices An encryption attack is an attempt at cracking the encrypted code that protects the data A signature attack attempts to crack the secret code that proves data hasn t been changed A protocol attack is an injection of unintended messages such as misleading data or unintended controls Replaying messages is when a
17. SCADA Security Christian Paulino Instructor JanuszZalewski CEN 4935 Software Project in Computer Networks Florida Gulf Coast University 10501 FGCU Blvd S Fort Myers FL 33965 6565 Fall 2012 Draft 9 Submission Date December 8 2012 Introduction SCADA stands for Supervisory Control and Data Acquisition SCADA systems are an important part of most nations infrastructures They control a wide variety of operations such as pipelines chemical plants power plants water management systems etc Because a SCADA system provides remote monitoring and control it is perfect for industrial operations that could be hazardous to an operator SCADA has come a long way since it was developed in 1960 Low cost microcomputers made computer control of process and manufacturing operations feasible Programmable logic controllers also known as PLCS introduced relay ladder logic to the control industrial process They allowed engineers to program in relay logic instead of using programming languages and operating systems Initially control systems were only accessed locally With the evolution of the microcomputers PLCs standard computers operating systems and networks SCADA has expanded into distributed systems SCADA now allows real time remote monitoring and control distant operations The typical SCADA system is networked with a master terminal unit M TU one or more controllers for communication and one or more remote terminal units
18. SVN Rev 45256 from trunk 1 8 oo mm SH File Edit View Go Capture Analyze Statistics Telephony Tools Internals Help TT TECE TERETA F HG Qqqn CLE Filter ip src 69 88 163 28 and ip dstz 69 88 163 30 Bpresson Clear Apply Save No Time Source Destination Protocol Length Info Frame 214 608 bytes on wire 4864 bits 608 bytes captured 4864 bits on interface 0 3 Ethernet II Src HewlettP_25 e0 0d 08 2e 5f 25 e0 0d Dst Pfu_cc ae 40 00 80 17 cc ae 40 Internet Protocol Version 4 Src 69 88 163 28 69 88 163 28 Dst 69 88 163 30 69 88 163 30 0000000000000 a Transmission Control Protocol Src Port 50354 50354 Dst Port http 80 Seq 1 Ack 1 Len 554 Hypertext Transfer Protocol S 0000 00 80 17 cc ae 40 08 2e 5f 25 e0 0d 08 0045 00 ES em 0010 02 52 2f 65 40 00 80 06 00 00 45 58 a3 1c 4558 R eQ EX EX 0020 a3 1e c4 b2 00 50 56 fc al 8d d3 4e 6b a6 50 18 PV NK P NANANA AN IA d IF AN AN 47 AC CA IN IF 72 Fh AO Ra 73 Y CET elane O y File C Users ZALEWS 1 AppData Local T Packets 534 Displayed 151 Marked 0 Dropped 0 Profile Default A BR gu T a SET OR Nds ung SC Fig 9 Wireshark login packet 15 The last step is to see how the SCADA server fairs against attacks This is done with a penetration testing tool called Meatasploit Metasploit is a software that has various penetration tests built into it 31 Before running any tests th
19. Y e Administration Y Community 2 Help ETT H Delle Scam import Newpose Q Modules pes Drog New Host Search Hosts Hosts gj Notes d Services Vulnerabilities B Captured Data show 100 ents IPAddress Hostname Operating System VM Purpose Sue Vins Act Notes Updated H mimi K ppe ios 5x device 3 2 minutes apo Scanned Fl 101003310 Minas gsx dete 3 2 minules ago Scanned a 6088 16330 698816930 D un Rec Hat sever 3 minute ago Scanned i 10 100 33 10 JESS PC A Microsoft Windows 7 Starter 7601 Service Pack bt eb JI 4 2 minutes ago Scanned E munit App ios x device 1 2 2 minutes apo Scanned TT 101003352 IR Unknown device 33 2 minules ago Scanned Showing 1 to 6 of 6 entries Metasploit Community 4 4 0 Update 1 2010 2012 Rapid Inc Boston MA t RAPID A 180 n Jl 034 AM 3r 0 jon L 11 16 2012 Fig 11 Metasploit detected IP addresses 17 After the SCADA server 1s detected the penetration tests can start The first test 1s the bruteforce test A brute force tests to see how secure the SCADA server s keys are Metasploit generates a bunch of different keys and attempts to enter the SCADA server with each one In this experiment the test failed That means that the SCADA server is secure against a brute force attack Figure 12 shows the results of the test con a el https localhost 3790 workspaces 2 tesks 2 D Q Certificate error X Metasploit
20. ate partners may not be protected by a firewall e Dial up modem access is unnecessarily granted and dial access policies are often forgone Firewalls are not implemented internally leaving little to no separation between network segments 19 The lack of real time monitoring creates a big security risk If there is a large amount of data coming in from network security devices it may be overwhelming and cause the attempt at monitoring to fail Even if there 1s an intrusion detection system that has been implemented the network security staff can only recognize individual attacks This stops organized attack patterns from being recognized These common vulnerabilities within a SCADA system should be recognized and addressed from the beginning It is important within a SCADA system to go over every detail of risk and implement measures to prevent potential security breaches 19 2 Previous Work This project is a continuation of previous ones by T Bennet 1 and M Humphries 2 The following section briefly outlines what was previously accomplished 2 Hardware The SCADA system for this project has already been setup The RTU control unit and workstation are all able to connect to each other over a network When switches are flipped on the RTU the workstation is able to display the status Besides setting up the SCADA system some analysis has been done Florida Gulf Coast University s SCADA system is setup using Red Hat and Apac
21. e SCADA server needs to be detected This is done by running a scan with metasploit looking for the SCADA server s IP address which is 69 88 163 30 The results of the scan are shown in figure 10 and the detected IP addresses are shown in figure 11 oe Ka a ebe visite D v Q Cefifiateenor X Metasploit Task1 M Your Metasploit Community WU HE File Edit View Favorites Tools Help o iB 8 Suggested Sites v 2 FGCU Banner 2 FGCU Directory FGCU Home Page 2 FGCU Password Reset Por FGCU Webmail Home Gulfline MyVPN Web Slice Gallery v d v E i mm v Pagev Safety Toolsy Qv amp Project FGCU SCADA v Account zalewski Y amp Administration Y Community Help metasp Overview 44 Analysis Sessions 4j Campaigns e WebApps ve Modules Tags J Reports Tasks 0 Home FGCUSCADA Tasks Task 4 Bruteforce O Exploit planed Discovering Sweep of 10 100 33 1 69 88 163 30 complete 6 new hosts 343 new services of Complete Duration 2 minules Replay S RAPID7 Fig 10 Metasploit scan results 16 mei Metasploit Hos File Hit View Favorites Tools Help dy D Suggested Stes v E FGCU Banner 2 FGCU Directory FGCU Home Page 2 FGCU Password Reset Por FGCU Webmail Home Guffine WI Web Slice Galley v rf mr Pager eyr Tost gt Le Biet didis ere Ompigs Web gps Uie Jg Rees se FQ E Project FGCU SCADA Account zalewski
22. ff men 17 cc ae Ap OB 00 a5 DO E DOLO GF 25 5f BH 00 QO 40 11 QZ ca 45 5H al le fT fT 0 oe EM aa Ob ff Ff Oi 14 c 2f OO 11 6 Jd 216 20 26 38 18 26 55 B8 0050 31 36 55 00 op DO OO OO OO oi op M auia sana or Intel R 525790 M Gigabit Network Conmectio Packetz 513 Displayed 513 Marked fi Profile Default e e Ta Te E L EB erc ow Ham Fig 24 Stop Wireshark packet capturing 27 Metasploit l Open Metasploit from the Windows start menu Navigate to the Metasploit folder and then click Access Metasploit Web UI Figure 25 Log into the Metasploit Web UI under the username zalewski The password is i kswelazl Figure 26 Under the projects tab go to the project FGCU SCADA click on it and scroll down If the project has not been created yet follow these steps Go to the projects tab and click on Create New Project in the dropdown menu Figure 27 and Figure 28 First scan for IP addresses Click on the Scan button under the Discovery section Enter the IP address of the SCADA server and then click the Launch Scan button The SCADA server IP address is 69 88 163 30 Figure 29 Next go back to Overview and run a bruteforce test by clicking the Bruteforce button under the Penetration section Make sure the only IP address in the target addresses box 1s the SCADA server address Click Toggle AII services to select all options and then click the
23. gainst these kinds of risks is the firewall The firewall needs to be configured appropriately based on the needs of the system 4 Prospective Solution Before the security of a system can be enhanced information on the current level of security must be gathered and analyzed Following the documentation of the previous project this project will reproduce the experiment results 2 These results are the data on the security of FGCU s SCADA system This data needs to be analyzed to determine the possible security risks in the system After the security risks are determined this project will implement a way to possibly improve the security The firewall on the SCADA server will be used to do packet filtering Packet filtering examines the packets that are sent to the network It checks the source IP address the destination IP address and the internet protocols carried by the packet 3 This process is shown in Figure 3 The windows firewall can be configured to either permit or deny incoming packets Rules will be created that will allow only the necessary connections for operation of the projects SCADA system to enter This will help ensure connections with malicious intent cannot connect to the system Client j Fire ata ll i Server Packet filter f mi Gees Packer is passed if Packet is sent allowed dropped if denied IP header Src and Dest IP addresses Other header ignored info Packet i5 examined Fig 3
24. he for the webserver The computers are on a Computer Science specific network that is controlled by Extreme Networks The Extreme Networks firewall was determined to provide industrial strength against outside attacks More analysis was done on the connection between the SCADA server and the workstation There was a physical layer of risk only A hacker would have to plug into the Netgear network switch that connects the workstation with the SCADA server This was the hardware analysis of the previous project 2 2 Software The software analysis that was done involved using Netstat Metasploit and Wireshark The Netstat tests were done using an SSH connection with Putty on the workstation 2 2 1 Netstat The first step of the test displayed all active network connections running through the primary network device The second step displayed all active connections on the UDP network communication The third step was to display all the active UNIX domain sockets 2 2 2 Metasploit 2 219 Metasploit was used to perform a penetration test A penetration test is a test that simulates an attack from an outside malicious source The first step was to do a brute force attack What the brute force did was select all known running processes and try to crack their password The processes selected were MySQL HTTP HTTPS SSH Telnet FTP LOGIN SHELL and SNMP After 7 minutes the brute force failed and showed that an attack of that level would not work
25. l v server Medam Wi Fre 820 Remote Faecafon server low Si LOGIN USO Romale Logo server Low i seu BSD Remate Shes server Low B vw VMWare Authentcation Daemon Yugh vec NCES server Low W sewer Semple Network Manager Protocct tow arp Apple F ng Protocol low NW PCAe when Dats PCAnywhme Rance high Fig 30 Target address box and services for bruteforce test 31 9 da D Suggested Stes w GB FGCU Banner FGCU Directory FGCU Home Page FGCU Pasoword Reset Poe E FGCU Webmail Home E Guifine D MyVPN E Web Slice Gallery v Ze e OD v Pager Safety Tooke ve D e metasploit Overview Lib Anotyeis 5 Sessione Green Wob Apps Modules Tee ChFspors E Teeks deenen mua Fei Automated Exploit Settings Tae Andrei boss 16330 db Minimum Rehiab ty Great H o Mutusgiet Pro 4 4 0 Update 1 2010 2012 Rapid inc Damon MA Rapid Support Center ste RAPIO7 Fig 31 Target address box for exploit test 32 References 1 2 5 4 5 6 7 5 9 10 11 12 T Bennet Security in SCADA Applications Florida Gulf Coast Unviersity Fort Myers FL 2010 M Humphries Remote Control and Reporting using SCADA Florida Gulf Coast University Fort Myers 2011 R L Krutz Securing SCADA Systems Wiley Publishing Inc Indianapolis IN 2006 E D Knapp Industrial Network Security Elsevier Inc Waltham
26. lp metasploit pro Overview as Analysis Sessions 4j Campaigns sWebApps ve Modules Tags J Reports C Tasks Q Home FGCUSCADA Tasks Task3 E Collect Exploiting Complete 0 sessions opened 1 host targeted 0 hosts skipped of Complete Duration 7 minutes Replay r Ising closed port 9090 for 69 88 163 30 due to firewall rules 0161 Started bind handler 0159 69 88 163 30 443 Loading PHP code 0159 69 88 163 30 443 Waiting for a session may take some time Using closed port 9084 for 69 88 163 30 due to firewall rules 0162 Started bind handler 0162 69 88 163 30 443 Sending PHP payload Using closed port 9099 for 69 88 163 30 due to firewall rules 0163 Started bind handler 0163 69 88 163 30 443 Disclosing the path of the Tiki Wiki on the filesystem Rapid7 Support Center RAPID7 Fig 13 Metasploit exploit test results 19 di S Suggested Sites B FGCU Banner FGCU Directory FGCU HomePage FGCU Password Reset Por 2 FGCU Webmail Home Gulfline E MyVPN Web Slice Gallery v Overview Project FGCU SCADA Discovery 6 hosts discovered 14 services detected 0 vulnerabilities identified Web Apps 2 web sites identified 0 web pages crawled 0 web forms found 0 web vulnerabilities found sessions opened passwords cracked SMB hashes stolen 0 SSH keys stolen j Bruteforce Exploit Social Engineering 0 social
27. n of a challenged message only goes through if the message passes the challenge The Master or RTU are able to issue a challenge Challenges and responses use session keys These two standards help protect the communications of a SCADA server using encryption and authentication 6 1 2 Network TrafficAnalysis It is important to analyze patterns of user activity within the network a SCADA system is on This 1s done by network traffic traces Network traffic analysis can be split into four main categories There is traffic matrix traffic volume traffic dynamics and traffic mixture measurement 17 Traffic matrix measurement is done to estimate the volume of traffic between the origin and destination within a network There are two general approaches to traffic matrix measurement There is network tomography and direct measurement Network tomography indirectly infers end to end traffic demands based on traffic measurements within the network Direct measurement holds information of where traffic flows at each point in the network The points are merged into a central point to find the end point of each flow 17 Traffic volume measurements aims to show the total traffic sent or received on a network This is done by aggregating the total byte or packet count for each source IP address This can be used to identify heavy users and find possible causes of congestion on the network This information can be used to determine the source of a
28. possible security risk to a SCADA system 17 Traffic dynamics measurement measures the temporal variation in Internet traffic This is used to test the stability of a network The tests check for packet delay packet loss and detecting possible bottlenecks Traffic mixture measurement involves aggregating traffic data over a long period of time These data are used to detect anomalies analyze performance and do security management The data gathered from network traffic analysis can be of vital importance to the security of a SCADA system 17 1 3 Common Security Vulnerabilities Often times information about a company network is easily obtainable through public routine queries This public information can be used by attackers to focus their attacks against the network A website often has data that network intruders will find very useful Some examples are employee names e mail addresses network system names and the company s structure The domain name service DNS can provide IP addresses and server information 19 A SCADA system may have weak network architecture The weakness of the architecture increases the risk that an internet based compromise could also compromise the SCADA system Four common architectural weaknesses include the following e The configuration of file transfer protocol FTP web and e mail servers sometimes unnecessarily provide internal corporate network access e Networks connections with corpor
29. s displayed the active UNIX domain sockets The results are shown in Figure 6 mjrPBHyperTACII mgr netstat sl Active UNIX domain sockets only servers Proto RefCnt Flags Type ctate LI Node Path unix H ACC aT RAH LISTEN TRG LKA l tmp font unix f27100 unix H ACC STREAM LISTER TG KR l var lib mysqgl mysqi sock mgrBHyperTACII mgr I Fig 6 Active UNIX Domain Socket 12 The next step is to see how the workstation and the SCADA server interact A software package called Wireshark was used to this purpose Wireshark is a packet capturing program than can be used to analyzepackets that are sent over a network 30 Figure 7 shows how Wireshark was used to capture the packets in the CS lab where the workstation and SCADA server are located H wg 82579LM Gigabit Network Connection DeviceNPF ATAOAFIB OE17 4670 9E55 BFD9BEOSAGE Wireshark 183 SVN Rev 45256 from ball gee Mew w EI File Edit View Go Capture Analyze Statistics Telephony Tools Week Help Banann GES QeoaFs ER Qaam gERXH Filter pres Clear Apply Save No Source Destination Protocol Length Info Time 214 52 013369 88 163 28 69 88 163 30 HTTP 608 GET skins index php3 login MGR amp key 947194027 amp hashcode 302671a763bclaf0daudio truegbeep false HTTP 1 1 221 52 107369 88 163 30 69 88 163 28 TCP 66 http gt 50360 SYN ACK Seq 0 Ackel Win 30660 Len 0 MSS 1460 SACK_PERM 1 WS 1 5 Sa ET PP EE OS EEN 4 n a Frame 214 608 bytes on
30. third party captures old data and sends it again This vulnerability is especially dangerous for controls Data tampering is when a third party modifies the contents of a message Eavesdropping is when a third party attempts to get some of the data and use it to their advantage 6 The way most of these communication vulnerabilities are prevented 1s by dynamically changing the keys used for signatures and encryption This practice is called key rotation There are currently two standards for SCADA communication There is the AGAI2 IEEE 1711 standard and the DNP3 secure authentication standard AGA12 has a philosophy based on encryption This philosophy incorporates confidentiality key technology cryptographicstandards and validation AGA12 protects messages through authenticating the partner device and randomizing the transactions between them This means that it signs and encrypts all messages 6 DNP3 secure authentication has a philosophy that is based on authentication and challenge This philosophy includes proving identity using challenges and uses key technology DNP3 protects all actions that are considered critical to the SCADA system It uses the protocol application layer challenge Controls and configurations change periodically A signature is used to prevent tampering The way authentication challenge works is relatively straightforward The non critical messages operate normally Critical messages are challenged and the operatio
31. y Josi jetemah Hee BUSCe Seem wipeest2 ED acan amnas R 1 iist gt fe CM E 7 Ppeemen Cem Apes See Cott Sim iost Popular Network Protocol Analyzer CH pee a Interface List ga Open 2 Website Uwe int cf he Capto mmer Oper a prevcusly captured Ye Cam e poeta eco Kier eczmng pecu Open Recent id e z The Laer Gusta erg vemor d raneted Crocs ra cr mos raam to capu fom me Siert Sample Captures kt keet 82579UM Gigabit Network Connection Device NPS 2294 1 8 9017 4670 96055 48 D6GLOR ASA Mb eub EP EEN Security Wot m AON a AA m potis agi Capture Options rein peteg vr Tage regen J How to Capture e by tow to o maient opte whe Network Media Leg Ze re aen e capter en Dera WLAN _ i i Fig 16 Select Interfaces Wireshark 22 ga Open o qp Website Lg int cf t e Capto mmer Oper a pecus captat Sw Vat ce poeta ecu kovn ege pecker Start gj Users Guide EI Chane era cr mcos men to capu om me Sart g Sample Captures Tre net Guse Soca vemor re t bael KISTROA gege Connecton Device NP J1ABU18 9 17 4610 N52 MIDISIDLABIT A nc sncmeet of snap captum Sar On me ete Security Wort r Wemtat a Ser m poos agi Cepture Options KL How to Capture LI Ei Network Media ege fe raer Nr ptum ger Brera WLAN _ D idt Yee Qo apre Analyze aer Telephony Tock jetemah Hee Ww Qi M M rene wih eFt EE aaan eax S fer i i 3 T Diet
Download Pdf Manuals
Related Search
Related Contents
StarTech.com 3 ft Power eSATA Cable - M/M Mini CO2 Monitor User Manual トリップ事故解析システム(PDF/19.9MB) UL 2601-1, UL 60601-1, IEC FDA GUDID User Manual Settings - DualSiM.ro - Telefoane Dual SiM originale! Copyright © All rights reserved.
Failed to retrieve file