SlideShare uma empresa Scribd logo
1 de 119
SCADA and ICS for
Security Experts:
         How to Avoid Cyberdouchery


James Arlen, CISA
Notacon 7 - Cleveland - 2010


                                      1
Disclaimer

I am employed in the Infosec industry,
but not authorized to speak on behalf
of my employer or clients.


Everything I say can be blamed on
great food, mind-control and jet lag.



                                         2
Credentials
15+ years information security specialist
staff operations, consultant, auditor, researcher
utilities vertical (grid operations, generation,
distribution)
financial vertical (banks, trust companies,
trading)
some hacker related stuff like game show host,
etc.

                                                    3
1/ Stop Sounding Stupid




                          4
Scada
got
sexy




        5
Follow
the
money




         6
Who's
an
expert
now?



         7
One
time
at
security
camp


           8
Gotta
get
me
a
piece
of
that
        9
Gotta
get
me
a
piece
of
that
        10
2/ Big Things and

 
 
 Little Things



                      11
Not all ‘scada’ is SCADA




                           12
Big things:
power grid




              13
Big things:
pipeline




              14
Inter-
connected
sensors
and
controls
under
central
            15
Inter-
connected
sensors
and
controls
under
central
            16
Supervisory control and
   data acquisition



                          17
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               18
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               19
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               20
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               21
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               22
Little
Things:
chemical
plant, power
plant,
manufacturi
ng facility

               23
Lots of
individual
capabilities
with some
orchestrati
on

               24
Programma
ble logic
controllers




              25
Programma
ble logic
controllers




              26
Programma
ble logic
controllers




              27
Industrial control
systems/Distributed



                      28
3/ Part of a Bigger
Picture



                      29
So if you
break the
computer,
you break
everything


             30
What
happens
when Edna
falls into
the
reactant
vessel
             31
This is the data

                   32
This is the data

                   33
This is the process

                      34
This is the process

                      35
This is the process

                      36
I know you
can grok
the
protocol,
can you
break the
controls?
             37
I know you
can grok
the
protocol,
can you
break the
controls?
             38
Oh, you
forgot
about
safety



          39
Oh, you
forgot
about
safety



          40
Oh, you
forgot
about
testing



          41
Oh, you
forgot
about
testing



          42
Oh, you
forgot
about
people



          43
Oh, you
forgot
about
people



          44
What if it really is
SCADA?
                       45
Stuff
breaks




         46
All the
&*^$ing
time




          47
And it gets
fixed




              48
And it gets
fixed




              49
And you
never
noticed




          50
And you
never
noticed




          51
And you
never
noticed




          52
And you
never
noticed




          53
But...
WAIT!
What about
the Aurora
Explosion
Demo
Awesome
             54
4/ Practical Positive
Things



                        55
You can
understan
d this stuff




               56
You can
help




          57
They need
you




            58
You need
to suck it
up




             59
It's time to
learn
before
teaching



               60
It's time to
learn
before
teaching



               61
5/ You Wouldn't Believe

 
 
 Me If I Told You



                          62
The
Organizati
on is
against
you


             63
Your prima
donna
attitude is
against
you


              64
Your age is
against
you




              65
It's time to
start
hacking




               66
First you
hack the
org




            67
Then you own their asses

                           68
Then you own their asses

                           69
6/ Movies Would Have

 
 
 You Believe



                       70
It's a mad
mad
graphical
awesome
world


             71
It's a mad
mad
graphical
awesome
world


             72
It's a mad
mad
graphical
awesome
world


             73
It's a mad
mad
graphical
awesome
world


             74
It's a mad
mad
graphical
awesome
world


             75
It's a mad
mad
graphical
awesome
world


             76
It's a mad
mad
graphical
awesome
world


             77
What an afternoon at the
console really feels like
                            78
What an afternoon at the
console really feels like
                            79
What an afternoon at the
console really feels like
                            80
7/ The Media Hypes

 
 
 It As If...



                     81
82
CYB
CYB   CYB   CYB   ER
ER    ER    ER
                  CYB
CYB   CYB   CYB   ER
ER    ER    ER
                  CYB
                        82
CYB
CYB   CYB   CYB   ER
ER    ER    ER
                  CYB
CYB   CYB   CYB   ER
ER    ER    ER
                  CYB
                        82
82
There's a
hacker
behind the
bush



             83
There's a
hacker
behind the
bush



             84
There's a
hacker
behind the
bush



             85
There's a
hacker
behind the
bush



             86
There's a
hacker
behind the
bush



             87
A 14yo in
Mom's
basement




            88
A 14yo in
Mom's
basement




            89
A 14yo in
Mom's
basement




            90
L337 cadre
of soldiers




              91
L337 cadre
of
supersoldi
ers



             92
L337 cadre
of
genetically
engineered
supersoldi
ers

              93
Killer
Tubes




         94
8/ Bad Shit That

 
 
 Actually Happened



                          95
Not
necessarily
public
news.



              96
9/ What Could Have

 
 
 Saved It



                     97
Superheroe
s




             98
Superheroe
s, Ninjas




             99
Superheroe
s, Ninjas
and Pirates




              100
Following
Instruction
s




              101
Or, not sucking at
implementation
                     102
Or, doing
what
you're told




              103
Or, stuff
that has
nothing at
all to do
with
computers

             104
10/ What You Can Do -

 
 
 Little Picture



                        105
Learn

        106
Stop listening to
"experts"
                    107
Modest
changes,
massive
results



           108
11/ What You Can Do -

 
 
 Big Picture



                        109
Stop
feeding the
trolls




              110
Avoid
being ‘that
person’




              111
Press for
sane
acquisition
s



              112
Study past
success




             113
Study past
success




             114
Q&A
      @myrcurial
myrcurial@myrcurial.com




                          115
Credits, Links and
Notices
      http://myrcurial.com and
Me:                              http://cyberdouchery.com
                                 and sometimes http://
                                 liquidmatrix.org/blog
                                 All of you, My Family, Friends, Jeff
                                 Moss (for demanding this talk)
                                 Kaospunk, Froggy, Tyger and the
Thanks:                          Notacon Awesome Team.
                                 Mentors/Luminaries: D. Anderson, M. Fabro, J.
                                 Brodsky, R. Southworth, M. Sachs, C. Jager, B.
                                 Radvanovsky and J. Weiss (all from whom I
                                 twitter, fast music, caffeine, my lovely
                                 borrowed material)
Inspirati
                                 wife and hackerish children, blinky
on:
                                 lights, shiny things, modafinil &
                                 altruism.
      http://creativecommons.org/licenses/by-nc-sa/2.5/ca/                        116

Mais conteúdo relacionado

Destaque

Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
 
Industrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary PresentationIndustrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary PresentationPanduit
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsJames Arlen
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 

Destaque (16)

Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
 
Industrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary PresentationIndustrial Architecture Technical Summary Presentation
Industrial Architecture Technical Summary Presentation
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security Experts
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 

Semelhante a Notacon 7 - SCADA and ICS for Security Experts

Pyramid Song
Pyramid SongPyramid Song
Pyramid SongFITC
 
Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Wil Reynolds
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)GeekWire
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
101: Open Innovation & Startups
101: Open Innovation & Startups101: Open Innovation & Startups
101: Open Innovation & StartupsWolfgang Weicht
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...OpenCredo
 
Yuri vangeest abnamro-05022013.def
Yuri vangeest abnamro-05022013.defYuri vangeest abnamro-05022013.def
Yuri vangeest abnamro-05022013.defYuri van Geest
 
6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next DecadeJeff Hurt
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Vlad Styran
 
Consequences and Principles of Software Quality v0.3
Consequences and Principles of Software Quality v0.3Consequences and Principles of Software Quality v0.3
Consequences and Principles of Software Quality v0.3Yann-Gaël Guéhéneuc
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IPRising Media, Inc.
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015CSO_Presentations
 
Safety and you
Safety and youSafety and you
Safety and youAnbr Cama
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoDeja vu Security
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningDevFest DC
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
Don't make me think. There's no need.
Don't make me think. There's no need.Don't make me think. There's no need.
Don't make me think. There's no need.Codemotion
 

Semelhante a Notacon 7 - SCADA and ICS for Security Experts (20)

Pyramid Song
Pyramid SongPyramid Song
Pyramid Song
 
Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012
 
100 ways to kill a concept
100 ways to kill a concept100 ways to kill a concept
100 ways to kill a concept
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
101: Open Innovation & Startups
101: Open Innovation & Startups101: Open Innovation & Startups
101: Open Innovation & Startups
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
 
Yuri vangeest abnamro-05022013.def
Yuri vangeest abnamro-05022013.defYuri vangeest abnamro-05022013.def
Yuri vangeest abnamro-05022013.def
 
6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
Consequences and Principles of Software Quality v0.3
Consequences and Principles of Software Quality v0.3Consequences and Principles of Software Quality v0.3
Consequences and Principles of Software Quality v0.3
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
Safety and you
Safety and youSafety and you
Safety and you
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Don't make me think. There's no need.
Don't make me think. There's no need.Don't make me think. There's no need.
Don't make me think. There's no need.
 

Mais de James Arlen

DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail PanelJames Arlen
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowJames Arlen
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfJames Arlen
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitJames Arlen
 

Mais de James Arlen (7)

DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail Panel
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It Wrong
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black Suit
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Notacon 7 - SCADA and ICS for Security Experts

Notas do Editor

  1. [twitter]http://myrcurial.com/N7/SCADA-N7.001.png[/twitter]
  2. [twitter]http://myrcurial.com/N7/SCADA-N7.002.png[/twitter]
  3. [twitter]http://myrcurial.com/N7/SCADA-N7.003.png[/twitter]
  4. This ISN’T a talk about SCADA so much as it is a talk about TALKING ABOUT SCADA. [twitter]http://myrcurial.com/N7/SCADA-N7.004.png[/twitter]
  5. Around 2005, and almost all of a sudden, the infosec industry noticed SCADA. And immediately started identifying it as a market. [twitter]http://myrcurial.com/N7/SCADA-N7.005.png[/twitter]
  6. Of course, the simplest explanation is always the most likely. In this case, it was all about the money - there were regulators starting to breathe heavily (NERC 1200, ISA99) [twitter]http://myrcurial.com/N7/SCADA-N7.006.png[/twitter]
  7. And because a packet is a packet is a packet, there were suddenly a million security experts who were also scada experts. Let’s not even get started on the four letter security religion people and how they jumped on this one. [twitter]http://myrcurial.com/N7/SCADA-N7.007.png[/twitter]
  8. At this point, I was working in control systems security -- electricity in particular and as much as I could, I spent as much free time as possible pointing out these flawed responses to a very real problem. [twitter]http://myrcurial.com/N7/SCADA-N7.008.png[/twitter]
  9. And then the swarm of consultants and infosec dudes and even a few dudettes showed up and started telling me everything they “knew” about control systems security. [twitter]http://myrcurial.com/N7/SCADA-N7.009.png[/twitter]
  10. They tied a nice little bow on my problems, and told me they could fix it - just a few blinky lights and a few more shiny things and I was going to be fine. [twitter]http://myrcurial.com/N7/SCADA-N7.010.png[/twitter]
  11. I told you we were going to talk ABOUT SCADA systems. Here’s the short form. LANGUAGE is important - specificity is something that engineers really enjoy. They’re kind of like car people -- and our industry has been using words like “synchro-mesh transmission” to describe “derrailluer” [twitter]http://myrcurial.com/N7/SCADA-N7.011.png[/twitter]
  12. Between the experts pontificating and the media eating it up, well. [twitter] http://myrcurial.com/N7/SCADA-N7.012.png[/twitter]
  13. HIghly distributed systems used to control geographically dispersed assets (water supply systems, oil and gas pipelines, electrical powergrids, railways, etc. [twitter]http://myrcurial.com/N7/SCADA-N7.013.png[/twitter]
  14. HIghly distributed systems used to control geographically dispersed assets (water supply systems, oil and gas pipelines, electrical powergrids, railways, etc.) [twitter] http://myrcurial.com/N7/SCADA-N7.014.png[/twitter]
  15. Used where centralized data acquisition and control are critical or practical to overall system operation [twitter] http://myrcurial.com/N7/SCADA-N7.015.png[/twitter]
  16. Used where centralized data acquisition and control are critical or practical to overall system operation [twitter] http://myrcurial.com/N7/SCADA-N7.016.png[/twitter]
  17. When you’re talking about LARGE systems that are GEOGRAPHICALLY distributed and used for huge control undertakings like this... that’s scada. [twitter] http://myrcurial.com/N7/SCADA-N7.017.png[/twitter]
  18. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter] http://myrcurial.com/N7/SCADA-N7.018.png[/twitter]
  19. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter] http://myrcurial.com/N7/SCADA-N7.019.png[/twitter]
  20. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter] http://myrcurial.com/N7/SCADA-N7.020.png[/twitter]
  21. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter]http://myrcurial.com/N7/SCADA-N7.021.png[/twitter]
  22. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter] http://myrcurial.com/N7/SCADA-N7.022.png[/twitter]
  23. Control Systems (CS) are used to control manufacturing processessuch as electric power generation, oil and gas refineries, and chemical, food, and automotive production. [twitter] http://myrcurial.com/N7/SCADA-N7.023.png[/twitter]
  24. CSare integrated as a control architecture containing a supervisory level of control overseeing multiple, integrated sub-systems that are responsible for controlling the details of a localized manufacturing process [twitter] http://myrcurial.com/N7/SCADA-N7.024.png[/twitter]
  25. Usually found in a designated critical infrastructure sector, a control system is a collection of devices or components working together for a common process, controlled by a master entity that can direct, regulate, and refine the behavior of those devices or components through observations and commands. [twitter] http://myrcurial.com/N7/SCADA-N7.025.png[/twitter]
  26. [twitter] http://myrcurial.com/N7/SCADA-N7.026.png[/twitter]
  27. Usually found in a designated critical infrastructure sector, a control system is a collection of devices or components working together for a common process, controlled by a master entity that can direct, regulate, and refine the behavior of those devices or components through observations and commands. [twitter] http://myrcurial.com/N7/SCADA-N7.027.png[/twitter]
  28. These smaller and “contained” entities are the control systems -- they are generally PROCESS oriented. And we need to talk about them as separate entities. THERE ARE WAY MORE OF THESE THAN THERE ARE SCADA SYSTEMS. [twitter] http://myrcurial.com/N7/SCADA-N7.028.png[/twitter]
  29. This is the problem -- more than anything -- this incredible lack of understanding. [twitter] http://myrcurial.com/N7/SCADA-N7.029.png[/twitter]
  30. It doesn’t matter here whether we’re talking about SCADA or Control Systems... The computers are NOT that which is controlled - - And just like in so many other aspects of infosec - they are NOT the reason that YOU are involved. [twitter] http://myrcurial.com/N7/SCADA-N7.030.png[/twitter]
  31. “What happens when Edna falls into the reactant vessel” -- Just as you’d expect. The system STOPS. This is EXACTLY what happens when the computer breaks. [twitter] http://myrcurial.com/N7/SCADA-N7.031.png[/twitter]
  32. [twitter] http://myrcurial.com/N7/SCADA-N7.032.png[/twitter] Protocols (partial list) E/IP DH+ ProfiBus ANSI X3.28 BBC 7200 CDC Types 1 and 2 Conitel 2020/2000/3000 DCP 1 DNP 3.0 Gedac 7020 ICCP Landis & Gyr 8979 OPC ControlNet Tejas 3 and 5 Modbus TRW 9550 UCA
  33. [twitter] http://myrcurial.com/N7/SCADA-N7.033.png[/twitter] Protocols (partial list) E/IP DH+ ProfiBus ANSI X3.28 BBC 7200 CDC Types 1 and 2 Conitel 2020/2000/3000 DCP 1 DNP 3.0 Gedac 7020 ICCP Landis & Gyr 8979 OPC ControlNet Tejas 3 and 5 Modbus TRW 9550 UCA
  34. [twitter] http://myrcurial.com/N7/SCADA-N7.034.png[/twitter] Mapping from the data to the process is HARD. There’s hours/days/weeks/months/YEARS of programming effort there. The protocol bitstream is just that -- a bitstream.
  35. [twitter] http://myrcurial.com/N7/SCADA-N7.035.png[/twitter] How do you know which device does what?
  36. You need to find or see the mapping... not just the raw protocol data. One without the other isn’t terribly useful. Oh, I’m not kidding myself - there are some SERIOUS rockstar protocol reverse engineers out there. There are even some process reverse engineers. In all likelihood, you can BREAK the computer, but can you MAKE the computer do your bidding? [twitter] http://myrcurial.com/N7/SCADA-N7.036.png[/twitter]
  37. And guess what - you’re in a position to break part of it.... can you break all of the additional controls that have been emplaced? ALL OF THEM? [twitter] http://myrcurial.com/N7/SCADA-N7.037.png[/twitter]
  38. BULL. SHIT. [twitter] http://myrcurial.com/N7/SCADA-N7.038.png[/twitter]
  39. There’s a whole additional system under local control THAT IS NOT PART OF THE SCADA OR ICS/DCS system which keep equipment from going all Skynet/Terminator [twitter] http://myrcurial.com/N7/SCADA-N7.039.png[/twitter]
  40. [twitter] http://myrcurial.com/N7/SCADA-N7.040.png[/twitter]
  41. So say that you manage to screw up the process -- the batch you were messing with... it hits the garbage pretty hard. [twitter] http://myrcurial.com/N7/SCADA-N7.041.png[/twitter]
  42. Because the organization cares enough to ensure that it only sends the right product out the door. [twitter] http://myrcurial.com/N7/SCADA-N7.042.png[/twitter]
  43. The most interesting part is that NONE of these systems are actually autonomous - they are all predicated upon having a human element - an operator, a controller, an organic mental component... [twitter] http://myrcurial.com/N7/SCADA-N7.043.png[/twitter]
  44. Partly because of liability issues and partly because Bags of Mostly Water are still much better at in-situ problem solving than any of the future silicon masters currently are. [twitter] http://myrcurial.com/N7/SCADA-N7.044.png[/twitter]
  45. Alright. So you’re a super-hacker. YOU busted the SCADA system. You pwnd them good. [twitter] http://myrcurial.com/N7/SCADA-N7.045.png[/twitter]
  46. Well... here’s the thing. They plan for that to happen. Most systems can handle two simultaneous failures without skipping a beat. [twitter] http://myrcurial.com/N7/SCADA-N7.046.png[/twitter]
  47. Because we’re sorta used to it. [twitter] http://myrcurial.com/N7/SCADA-N7.047.png[/twitter]
  48. Wires come down, and they get repaired. [twitter] http://myrcurial.com/N7/SCADA-N7.048.png[/twitter]
  49. pipelines break for all kinds of reasons - and they get repaired. [twitter] http://myrcurial.com/N7/SCADA-N7.049.png[/twitter]
  50. And nine hundred and ninety nine times out of a hundred... well, more like 99,999 out of 100,000.... you don’t feel it at all. [twitter] http://myrcurial.com/N7/SCADA-N7.050.png[/twitter]
  51. You’ve still got a cozy little house. [twitter] http://myrcurial.com/N7/SCADA-N7.051.png[/twitter]
  52. No one is wandering the streets looking for flesh to feed on. [twitter] http://myrcurial.com/N7/SCADA-N7.052.png[/twitter]
  53. [twitter] http://myrcurial.com/N7/SCADA-N7.053.png[/twitter]
  54. Yup, under very controlled circumstances, with some modest efforts, and a known target surface (relatively turn key systems -- little to no customization) it is possible to make things go BANG. Suggesting that your garden variety NOTACON or DEFCON type hacker can achieve this in an afternoon is... well. Crap. [twitter] http://myrcurial.com/N7/SCADA-N7.054.png[/twitter]
  55. Make sure to go all kind of drifty -- notice SOMETHING in the audience and kinda “Snap” for the next slide. [twitter] http://myrcurial.com/N7/SCADA-N7.055.png[/twitter]
  56. All of you are perfectly smart. You’ve just got to pay attention and focus and HEY, SQUIRREL!!!! [twitter] http://myrcurial.com/N7/SCADA-N7.056.png[/twitter]
  57. Since you’ve solved all of your organizations security problems, you’ve got time. [twitter] http://myrcurial.com/N7/SCADA-N7.057.png[/twitter]
  58. Between the warring factions of business/asset owners, traditional IT departments and control systems IT departments... [twitter] http://myrcurial.com/N7/SCADA-N7.058.png[/twitter]
  59. But. Remember, you’re not the expert. Suck it the heck up. Buy some people some coffee. [twitter] http://myrcurial.com/N7/SCADA-N7.059.png[/twitter]
  60. EVEN though it feels disingenuous, become the student first, the teacher later. [twitter] http://myrcurial.com/N7/SCADA-N7.060.png[/twitter]
  61. Show a willingness to be the friend, the person who UNDERSTANDS that everyone is a unique and special person. [twitter] http://myrcurial.com/N7/SCADA-N7.061.png[/twitter]
  62. Ok. Here’s some things that I’ve discovered in my time as a control systems security dude. [twitter] http://myrcurial.com/N7/SCADA-N7.062.png[/twitter]
  63. Unions. Really. Woodshed talks down on the loading dock. [twitter] http://myrcurial.com/N7/SCADA-N7.063.png[/twitter]
  64. Hey, we’re in infosec, we all think we’re rock stars... right? [twitter] http://myrcurial.com/N7/SCADA-N7.064.png[/twitter]
  65. The VAST majority of the people that I’ve met in the control systems world would be perfectly happy with good ole 8-bit computers that knew their place in the world. You ARE the age of their kids, and therefore, you are a kid. [twitter] http://myrcurial.com/N7/SCADA-N7.065.png[/twitter]
  66. Yeah, you know you wanna. [twitter] http://myrcurial.com/N7/SCADA-N7.066.png[/twitter]
  67. UNDERSTAND the organization -- what the moving pieces are... look outside the IT department... shadow a few of the “workers” -- it’s a system like any other. Get all “Mitnick-y” [twitter] http://myrcurial.com/N7/SCADA-N7.067.png[/twitter]
  68. the doors begin to open... you’re starting to get things done. [twitter] http://myrcurial.com/N7/SCADA-N7.068.png[/twitter]
  69. Because hey... you can learn anything fast -- you’re an infosec rockstar. Make THEM change to suit the needs of the almighty altrusim -- KTLO, hold the Zombies at bay. [twitter] http://myrcurial.com/N7/SCADA-N7.069.png[/twitter]
  70. Just for review... because, believe it or not... you need to TEAR DOWN each of these preconceptions before you can build up what the glory of a real console feels like. [twitter] http://myrcurial.com/N7/SCADA-N7.070.png[/twitter]
  71. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.071.png[/twitter]
  72. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.072.png[/twitter]
  73. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.073.png[/twitter]
  74. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.074.png[/twitter]
  75. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.075.png[/twitter]
  76. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.076.png[/twitter]
  77. And actually, that’s the problem -- infosec people are fixated on the protocol and ignore the user interface. [twitter] http://myrcurial.com/N7/SCADA-N7.077.png[/twitter]
  78. Of course, you can have all different kinds of user interfaces... [twitter] http://myrcurial.com/N7/SCADA-N7.078.png[/twitter]
  79. And since you’ve got nothing but time... you’ve reviewed all of the log files... [twitter] http://myrcurial.com/N7/SCADA-N7.079.png[/twitter]
  80. And you’re just tired of doing the same ole same ole.... AND YOU”RE LOOKING IN THE WRONG PLACE FOR THE WEIRDNESS. Your effectiveness is in the toilet. Get your shit together. [twitter] http://myrcurial.com/N7/SCADA-N7.080.png[/twitter]
  81. Everyone sing along... CYBER CYBER CYBER CYBER CYBER CYBER CYBER CYBER [twitter] http://myrcurial.com/N7/SCADA-N7.081.png[/twitter]
  82. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  83. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  84. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  85. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  86. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  87. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  88. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  89. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  90. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  91. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  92. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  93. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  94. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  95. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  96. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  97. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  98. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  99. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  100. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  101. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  102. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  103. [twitter] http://myrcurial.com/N7/SCADA-N7.082.png[/twitter]
  104. because there’s hackers everywhere [twitter] http://myrcurial.com/N7/SCADA-N7.083.png[/twitter]
  105. and they buy things from Jinx - official shwag dealer at defcon. [twitter] http://myrcurial.com/N7/SCADA-N7.084.png[/twitter]
  106. And every few months, the same stories pop up. [twitter] http://myrcurial.com/N7/SCADA-N7.085.png[/twitter]
  107. [twitter] http://myrcurial.com/N7/SCADA-N7.086.png[/twitter]
  108. And they just love trotting out these stories... kinda like the local news stations... “EXCESS DI-HYDROGEN OXIDE CAN KILL YOU... AND IT”S EVERYWHERE!!!!!!! MORE NEWS TONIGHT AT ELEVEN ON ACTION ONE NEWS!!!!!!!!” [twitter] http://myrcurial.com/N7/SCADA-N7.087.png[/twitter]
  109. Of course none of the 14 year olds I know (or was) are interested in world domination. They’re hormonally driven. [twitter] http://myrcurial.com/N7/SCADA-N7.088.png[/twitter]
  110. The conservatives want you to think of evil brown people. [twitter] http://myrcurial.com/N7/SCADA-N7.089.png[/twitter]
  111. But really, it’s middle aged white guys that are the hackers --- so easy a white guy can do it. [twitter] http://myrcurial.com/N7/SCADA-N7.090.png[/twitter]
  112. This story in the news Wednesday -- Booz Allen Hamilton is being paid has now landed the contract to build the Air Force’s cyberwar control center. For a measly $14.4 million in taxpayer money, the outfit will help build a new cyberwar bunker for the U.S. Cyber Command, a wing of the Air Force. Additionally, Booz Allen Hamilton won another contract for $20 million to “foster collaboration among telecommunications researchers, University of Maryland faculty members and other academic institutions to improve secure networking and telecommunications and boost information assurance,” Washington Technology reports. While that might sound like a lot of money to set up a mailing list and a wiki, please don’t be cynical. Undoubtedly, McConnell’s crack team of consultants are providing the researchers with around-the-clock bodyguards and state-of-the-art bullet-proof monitors. [twitter][/twitter]
  113. Of course, this is what we’re all APT fraid of. [twitter][/twitter]
  114. And it’s right up near this as likely. [twitter][/twitter]
  115. And well... you know the internet is out to get you. [twitter][/twitter]
  116. [twitter][/twitter]
  117. [twitter][/twitter] Lack of security policy specific for control domain • SCADA network separated only by VLANs and rudimentary ACLs • No change management policy • Physical security policy richly enforced (but OPSEC does not accommodate for access past defences) • No Security Agreement (SA) with vendor, no SA with contractors Vendor default accounts and passwords have not been changed • Guest accounts still available • No mechanism for schedule in place for updates/upgrades Primary HMIs do not require username/password to get control • HMIs may be secured physically but not electronically • VNC enabled EWS LOTS of “shared” networks... internet access from HMI stations Internet access TO HMI stations “Run your process from your blackberry!” Absence of testing of core OS – Standard SCADA builds are rare (unused SW remains on systems) – No testing in place for remaining applications • Many insecure applications within key control servers – To aid in operator boredom – To aid in operator net access – To aid in data manipulation • Assessments discovered rogue applications trying to call home – Hostile ICMP payloads – Covert channel over DNS Vendor access (direct via VPN) into control network • Access to main switch is by unsecured telnet, and main switch gives all access to all comms – Switches use default access credentials – Traffic is not filtered by port (i.e. port filtering is not enabled • No encryption or authentication on the control network • Dynamic ARP is used with no ARP monitoring • Firewalls have some interesting rules, sometimes very simple: # $fwadd-rule "allow udpfrom _any_ to _any_ 0-65535" # $fwadd-rule "allow tcpfrom _any_ to _any_0-65535" Vendor provides turnkey solution in each customer location • Commonality among deployments –Same remote access mechanism –Same username/password –Same technology (brand, device, etc.) –Same addressing schema –Same vulnerabilities PLCs unknowingly have embedded web servers • PLCs have embedded webserver enabled • Data used as a significant step in enumeration • Compromised embedded servers allow attacker to gain highest trust level Basic flaws in programming can be discovered and leveraged • Vendors (proprietary) are very vulnerable Least privilege Least privilege Buffer overflows Buffer overflows (stack and (stack and heap) heap) Setuid Setuiderrors errors Race conditions Race conditions Poor cryptography Poor cryptography Hard coded IP space Hard coded IP space RPC/DCOM Telnet Telnet GUI GUI Password use/storage Password use/storage File Access File Access X X- -windows windows rsh rsh(instead of (instead of ssh ssh) ) sprintf sprintf / / strcpy strcpy Accept all multicastRPC/DCOM Accept all multicast
  118. Really. All of that stuff is real, seen it with my own eyes. [twitter][/twitter]
  119. Of course. [twitter][/twitter]
  120. [twitter][/twitter]
  121. If we had any real “lateral thinkers” in the mix... [twitter][/twitter]
  122. But none of this is rocket science. In many repects, the control systems industry is living in the past - following the minimums of a modern hardening guideline would be good -- even though you’d likely seriously break the thing you were trying to fix. [twitter][/twitter]
  123. it’s just SUCK. [twitter][/twitter]
  124. And the machines only do as well as their masters. [twitter][/twitter]
  125. And the industry cannot seem to keep up with it’s own awesome. You can operate an HMI from your blackberry, and at the same time, they can’t fix the basics. [twitter][/twitter]
  126. [twitter][/twitter]
  127. I cannot stress this point enough. become an infovore - consume knowledge - RTFM [twitter][/twitter]
  128. Generally speaking, someone who says they are an expert REALLY isn’t. Especially if they are really REALLY proud of being an expert. [twitter][/twitter]
  129. Project timelines are REALLY long, make little changes at the beginning. [twitter][/twitter]
  130. [twitter][/twitter]
  131. [twitter][/twitter] People who are putting themselves ‘out there’ as the mouthpieces... even the ones with actualy (albeit aged) cred... if your bullshit meter is going off, make sure other people know that. It’s on YOU to help catch and ?persecute? the charlatans out of out bidness. Call a Cyberdouche a Cyberdouche.
  132. [twitter][/twitter] You are not Zero Cool, Neo, The Plague, QQQQ John Travolta’s character, or any other uber 733t dude-ette. Impress with persuasion and humility rather than wearing your bravado and hackerdouchery. Also, shameless self-promotion -- please see my previous talk on the subject.
  133. be the water drops. add requirements to the procurement process -- boil the frog. Also -- get to know your procurement people -- make friends EVERYWHERE. [twitter][/twitter]
  134. The overwhelming, vast, unbelievably dense history that we have as an industry is rich with comparable situations, problems found and solved, learn from them... [twitter][/twitter]
  135. Once upon a time, computers did what they were supposed to do. Help us to get there again. [twitter][/twitter]
  136. Thank you all so much for listening to me rant, I’m here for the rest of the day and tomorrow. Ask me anything and I’ll try to answer. [twitter][/twitter]
  137. Dave Anderson, Mark Fabro, Jake Brodsky, Ron Southworth, Marcus Sachs, Chris Jager, Bob Radvanovsky and Joe Weiss [twitter][/twitter]