SlideShare uma empresa Scribd logo
1 de 66
Baixar para ler offline
www.ernw.de
Paparazzi over IP
Daniel Mende
dmende@ernw.de
www.ernw.de
Who we are ¬ Old-school network geeks,
working as security researchers for
Germany based ERNW GmbH
 Independent
 Deep technical knowledge
 Structured (assessment) approach
 Business reasonable recommendations
 We understand corporate
¬ Blog: www.insinuator.net
¬ Conference: www.troopers.de
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #2
www.ernw.de
Agenda
¬ Intro
¬ Transport Protocols
¬ Communication Modes & Attacks
¬ Conclusions
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #3
www.ernw.de
Intro
¬ A number of current high-end
cameras have network interfaces.
¬ We did some research as for their
security and potential attack paths.
¬ In the following we focus on Canons
new flagship EOS 1D X, but similar
problems might be found in other
models, of other vendors, too.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #4
www.ernw.de
The Camera
Canon EOS-1D X
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #5
www.ernw.de
The Camera
¬ From Canon USA:
 A built in Ethernet port allows for fast,
easy transfer of images directly to a
PC or via a network to clients from live
events.
 The EOS-1D X is compatible with the
new WFT-E6A Wireless File
Transmitter for wireless LAN transfer
with the IEEE 802.11 a/b/g/n
standards.
A Bit of Marketing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #6
www.ernw.de
The Camera
The Ethernet Port
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #7
www.ernw.de
The Camera
WLAN Adapter
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #8
www.ernw.de
The Target
aka. Mr. Reuters
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #9
www.ernw.de
The Target
¬ One could get the real, unedited
images first.
¬ One could upload (bad) images.
¬ One could turn the camera into a
surveillance device.
What if
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #10
www.ernw.de
Transport
The underlying Protocols
www.ernw.de
Transport
¬ Wired LAN via built-in Ethernet
port or Wireless LAN via WFT-E6A.
¬ Standard TCP/IP (no IPv6, yet).
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #12
www.ernw.de
Traditional Attacks
¬ ARP-spoofing possible.
 No “sticky” ARP entries
¬ ARP-flooding with ~100 packets
per second DoS the network stack.
¬ Btw. stack also dies if IPv6
(multicast) is present.
Layer 2
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #13
www.ernw.de
Traditional Attacks
¬ TCP/IP is used for all network
communication.
¬ Established connections can be
killed via TCP-RST.
Layer 3/4
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #14
www.ernw.de
Communication Modes
www.ernw.de
Communication Modes
¬ FTP Upload Mode
¬ DLNA
¬ Built-in webserver
¬ EOS Utility
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #16
www.ernw.de
FTP Upload Mode
www.ernw.de
FTP Upload Mode
¬ Target server and credentials
configured on camera.
¬ Photos taken are uploaded to the
server immediately.
Mode of operation
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #18
www.ernw.de
FTP Upload Mode
¬ As FTP is clear text, credentials
can be sniffed.
¬ As well as the complete data
transmission
¬ Uploaded pictures can be extracted
from network traffic.
Downside
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #19
www.ernw.de
FTP Upload Mode
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #20
www.ernw.de
FTP Upload Mode
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #21
www.ernw.de
DLNA mode
www.ernw.de
DLNA mode
¬ Digital Living Network Alliance®
¬ UPnP used for discovery.
¬ DLNA guidelines for file formats,
encodings, resolutions.
¬ HTTP and XML used to access
media.
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #23
www.ernw.de
DLNA mode
¬ No authentication.
¬ No restrictions.
¬ Every DLNA client can download _all_
images.
¬ Your Browser could be a DLNA client.
Or somebody else's browser. For your
camera.
Cons
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #24
www.ernw.de
Built-in webserver
Always a good idea…
www.ernw.de
Built-in webserver
¬ Wireless File Transmitter Server
Mode.
¬ Canon USA:
“Use a web browser to capture,
view and download images
remotely”
Canon WFT Server
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #26
www.ernw.de
Built-in webserver
¬ Browser interface uses AJAX.
¬ Embedded webserver only capable
of HTTP GET method.
 Every other request method is
answered with a 404.
Canon WFT Server
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #27
www.ernw.de
Built-in webserver
¬ Authentication via HTTP Basic
(RFC 2617) on login page.
¬ Session cookie is used afterwards.
¬ Cookie looks like sessionID=40b1
 4 (!!!) byte Session ID
 65535 possible IDs
Authentication
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #28
www.ernw.de
Built-in webserver
¬ Session ID Brute force
implemented in 6 lines of python.
¬ To check for all possible IDs takes
about 20 minutes.
 Embedded Webserver is not that
responsive.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #29
www.ernw.de
import requests
target_uri = 'http://192.168.1.103/api/cam/lvoutput'
target_string = 'SESSION_ERR'
for i in xrange(0xffff):
if (i != 0 and i%1000 == 0):
print str(i) + 'IDs checked'
r = requests.get(target_uri, cookies={'sessionID': '%x' %i})
if r.text.find(target_string) == -1:
print 'SessionID is : sessionID=%x' %i
break
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #30
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #31
www.ernw.de
Built-in webserver
¬ Full access to Live View, stored
photos and camera settings.
¬ You surf – We brute.
recap
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #32
www.ernw.de
Built-in webserver
¬ Camera in WFT Server mode.
¬ Valid session opened by user.
¬ Some minutes of time.
Requirements
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #33
www.ernw.de
EOS Utility mode
aka. I wanna be root
www.ernw.de
EOS Utility mode
The Utility
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #35
www.ernw.de
EOS Utility mode
The Utility
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #36
www.ernw.de
EOS Utility mode
¬ Allows remote control of all non-
manual camera functions.
¬ Pictures can be up- and
downloaded.
¬ Possibly even more (sound
recording anyone?)
Overview
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #37
www.ernw.de
EOS Utility mode
¬ SSDP and MDNS used for
discovery.
¬ PTP/IP used for communication.
¬ Needs initial camera <-> software
pairing.
Technical
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #38
www.ernw.de
EOS Utility mode
¬ At first use, credentials needs to be
exchanged between the camera
and the client software.
¬ Camera must be put into pairing
mode via camera menu.
¬ Camera signals the need for
pairing via MDNS.
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #39
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #40
www.ernw.de
EOS Utility mode
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #41
www.ernw.de
EOS Utility mode
¬ Client software connects to camera
via PTP/IP.
¬ PTP/IP Authentication is
successful regardless of the
credentials.
¬ Credentials (hostname, GUID) are
stored on the camera.
Pairing
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #42
www.ernw.de
PTP/IP
Feels like USBoIP )-:
www.ernw.de
PTP/IP
¬ Picture Transfer Protocol over
Internet Protocol.
¬ ISO 15740.
¬ Standardized by International
Imaging Industry Association
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #44
www.ernw.de
PTP/IP
¬ Wrapper for PTP with header:
4 byte length (little endian)
4 byte type (little endian)
data
Packet format
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #45
www.ernw.de
PTP/IP
Layering
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #46
www.ernw.de
PTP/IP
¬ PTPIP_INIT_COMMAND_REQUEST
 Includes authentication data:
16 byte GUID
hostname string
Authentication
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #47
www.ernw.de
PTPIP_INIT_COMMAND_REQUEST
2a 00 00 00 01 00 00 00 eb 7a 78 9d 69 cb 64 4e
a3 e0 fc 96 ef 59 79 42 73 00 65 00 72 00 76 00
65 00 72 00 00 00 00 00 01 00
Paket length = 42 byte
Paket type = 0x01 = PTPIP_INIT_COMMAND_REQUEST
GUID
Hostname = “server” @ utf16
Trailer
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #48
www.ernw.de
PTP
www.ernw.de
PTP
¬ Picture Transfer Protocol
¬ Standardized by International
Imaging Industry Association
¬ ISO 15740
¬ Lots of proprietary vendor
extensions.
Explained
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #50
www.ernw.de
PTP
¬ Designed for use over USB
¬ Fixed length
¬ 2 byte Msg Code
¬ 4 byte Session ID
¬ 4 byte Transaction ID
¬ 5 times 4 byte Parameter or Data
Packet format
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #51
www.ernw.de
PTP
¬ Lot of standardized codes like:
 PTP_GetDeviceInfo
 PTP_OpenSession
 PTP_CloseSession
 PTP_GetStorageIDs
¬ Also Vendor specific codes like:
 PTP_CANON_GetCustomizeSpec
 PTP_CANON_GetCustomizeItemInfo
Message Codes
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #52
www.ernw.de
PTP
¬ Thankfully there are some
implementations around.
¬ We decided to go with libgphoto2.
¬ Basic PTP/IP support is included
as well.
Use of
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #53
www.ernw.de
The Attack
aka. gottcha
www.ernw.de
Attack
¬ Client Hostname easy
discoverable, but not needed.
 Camera also excepts connections with
a different hostname.
¬ GUID unknown to client software.
¬ Obfuscated GUID is broadcasted by
the cam via UPNP.
Getting the Credentials
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #55
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #56
www.ernw.de
tmp = mdns_info.getProperties()['tid.canon.com'].split('-')
guid = []
l = lambda s: [ s[i:i+2:] for i in xrange(0,len(s),2) ][::-1]
for i in xrange(0,3):
guid += l(tmp[i])
guid += tmp[3]
guid += tmp[4]
guid = "".join(guid)
guid = eb7a789d69cb644ea3e0fc96ef597942
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #57
www.ernw.de
The Attack
¬ Camera only allows one
connection.
¬ Already connected client needs to
be disconnected.
¬ TCP-RST the established PTP/IP
connection.
Connecting to the Camera
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #58
www.ernw.de
Attack
¬ Listen for the Cam on MDNS.
¬ De-obfuscate Authentication data.
¬ Disconnect connected Client
Software.
¬ Connect via PTP/IP.
¬ Have Phun (-;
Process
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #59
www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #60
www.ernw.de
Attack outlined
¬ Photograph uses hotel / Starbucks
WLAN, which isn’t unlikely during
events (think of Grammy Awards
few days ago).
¬ Almost anybody in the same LAN
can download the images from the
camera (and even more).
So you can write it down
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #61
www.ernw.de
Countermeasures
¬ Enable network functionality only
in trusted Networks.
¬ Use WPA and a secure passphrase
for (your trusted) WLAN.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #62
www.ernw.de
Conclusions ¬ High-end cameras are yet another daily
life item equipped with networking
capabilities incl. full-blown IP stacks.
¬ Once more, their device-specific network
technologies have been designed and
implemented without (too much) security
in mind.
¬ Again, this leads to (classes of) attacks
previously unknown to their non-
networked counterparts.
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #63
www.ernw.de
Next Steps
New series of DSLRs (EOS 6D)
 Built-in Wireless Access Point
 New communication protocol for
IOS/Android App
New series of camcorder(XA20, XA25)
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #64
www.ernw.de
There’s never enough time…
5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #65
THANK YOU… ...for yours!
www.ernw.de
Questions?
© ERNW GmbH
| Breslauer Str.
28 | D-69124 66

Mais conteúdo relacionado

Destaque

Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Alan Carbery
 
andrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolioandrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology PortfolioAndrea Slaven
 
ENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated BibliographyENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated Bibliographyaharrislibrarian
 
Identifying Gifted Students
Identifying Gifted StudentsIdentifying Gifted Students
Identifying Gifted StudentsAngela Housand
 
Europaiunionjeopardy_Englishl
Europaiunionjeopardy_EnglishlEuropaiunionjeopardy_Englishl
Europaiunionjeopardy_Englishlszabjass
 
Citation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCitation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCollege of the Rockies
 
Annotated bibliographies
Annotated bibliographiesAnnotated bibliographies
Annotated bibliographieskhornberger
 
Creating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCreating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCollege of the Rockies
 
Duke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionDuke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionShawn Miller
 
module in english grade 8
module in english grade 8module in english grade 8
module in english grade 8Kyla Basco
 
Grade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyGrade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyMelanio Florino
 

Destaque (14)

Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...Authentic Assessment: building a longitudinal information literacy assessment...
Authentic Assessment: building a longitudinal information literacy assessment...
 
andrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolioandrea slaven Instructional Technology Portfolio
andrea slaven Instructional Technology Portfolio
 
ENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated BibliographyENG 101 -- Essay 3 Annotated Bibliography
ENG 101 -- Essay 3 Annotated Bibliography
 
ORE Connections February 2010
ORE Connections February 2010ORE Connections February 2010
ORE Connections February 2010
 
Identifying Gifted Students
Identifying Gifted StudentsIdentifying Gifted Students
Identifying Gifted Students
 
Europaiunionjeopardy_Englishl
Europaiunionjeopardy_EnglishlEuropaiunionjeopardy_Englishl
Europaiunionjeopardy_Englishl
 
Citation Basics for Audio / Visual Material
Citation Basics for Audio / Visual MaterialCitation Basics for Audio / Visual Material
Citation Basics for Audio / Visual Material
 
My project proposal
My project proposalMy project proposal
My project proposal
 
Annotated bibliographies
Annotated bibliographiesAnnotated bibliographies
Annotated bibliographies
 
Creating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA StyleCreating an Annotated Bibliography in APA Style
Creating an Annotated Bibliography in APA Style
 
Duke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai TransitionDuke's eLearning Roadmap and the Sakai Transition
Duke's eLearning Roadmap and the Sakai Transition
 
module in english grade 8
module in english grade 8module in english grade 8
module in english grade 8
 
Grade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 OnlyGrade 8 English teachers guide Q1 Only
Grade 8 English teachers guide Q1 Only
 

Semelhante a [HES2013] Paparazzi over ip by Daniel Mende

fiware-lab-dev-4.pdf
fiware-lab-dev-4.pdffiware-lab-dev-4.pdf
fiware-lab-dev-4.pdfssuser8c74ba
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymenta8us
 
Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens journalrubezh
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113a8us
 
fiware-lab-dev-3.pdf
fiware-lab-dev-3.pdffiware-lab-dev-3.pdf
fiware-lab-dev-3.pdfssuser8c74ba
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsWes Morgan
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsAll Things Open
 
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...michelemanzotti
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEsAPNIC
 
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Cohesive Networks
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response TimeBoni Bruno
 

Semelhante a [HES2013] Paparazzi over ip by Daniel Mende (20)

fiware-lab-dev-4.pdf
fiware-lab-dev-4.pdffiware-lab-dev-4.pdf
fiware-lab-dev-4.pdf
 
4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith4. PROFIBUS DP and PA network design - Andy Smith
4. PROFIBUS DP and PA network design - Andy Smith
 
Profibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy SmithProfibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy Smith
 
W04 Profinet in process automation - Pete Brown, Siemens
W04   Profinet in process automation - Pete Brown, SiemensW04   Profinet in process automation - Pete Brown, Siemens
W04 Profinet in process automation - Pete Brown, Siemens
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deployment
 
Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens Продвигая вперед искусство безопасности. Siemens
Продвигая вперед искусство безопасности. Siemens
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113
 
fiware-lab-dev-3.pdf
fiware-lab-dev-3.pdffiware-lab-dev-3.pdf
fiware-lab-dev-3.pdf
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting Tools
 
The Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting ToolsThe Gurubox Project: Open Source Troubleshooting Tools
The Gurubox Project: Open Source Troubleshooting Tools
 
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cryp...
 
4. profibus dp pa network design chris mc comb
4. profibus dp pa network design   chris mc comb4. profibus dp pa network design   chris mc comb
4. profibus dp pa network design chris mc comb
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEs
 
Introduction to PROFIBUS for process automation Andy Verwer
Introduction to PROFIBUS for process automation   Andy VerwerIntroduction to PROFIBUS for process automation   Andy Verwer
Introduction to PROFIBUS for process automation Andy Verwer
 
SOME_IP_29408.pdf
SOME_IP_29408.pdfSOME_IP_29408.pdf
SOME_IP_29408.pdf
 
C12 Profinet diagnostics during the entire life cycle of production lines a...
C12   Profinet diagnostics during the entire life cycle of production lines a...C12   Profinet diagnostics during the entire life cycle of production lines a...
C12 Profinet diagnostics during the entire life cycle of production lines a...
 
FBLajSIPScenarior.ppt
FBLajSIPScenarior.pptFBLajSIPScenarior.ppt
FBLajSIPScenarior.ppt
 
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
Chris Swan's CloudExpo Europe presentation "Waves of adoption for Network Fun...
 
Advantages of a dual sim 4g router.pdf
Advantages of a dual sim 4g router.pdfAdvantages of a dual sim 4g router.pdf
Advantages of a dual sim 4g router.pdf
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response Time
 

Mais de Hackito Ergo Sum

[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...Hackito Ergo Sum
 
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier MartinHackito Ergo Sum
 
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...Hackito Ergo Sum
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin VernouxHackito Ergo Sum
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” ChiesaHackito Ergo Sum
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...Hackito Ergo Sum
 

Mais de Hackito Ergo Sum (6)

[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
 
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin[HES2013] Nifty stuff that you can still do with android by Xavier Martin
[HES2013] Nifty stuff that you can still do with android by Xavier Martin
 
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
[HES2013] Frida IRE – a tool for scriptable dynamic instrumentation in userla...
 
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
 

Último

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 

Último (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 

[HES2013] Paparazzi over ip by Daniel Mende

  • 2. www.ernw.de Who we are ¬ Old-school network geeks, working as security researchers for Germany based ERNW GmbH  Independent  Deep technical knowledge  Structured (assessment) approach  Business reasonable recommendations  We understand corporate ¬ Blog: www.insinuator.net ¬ Conference: www.troopers.de 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #2
  • 3. www.ernw.de Agenda ¬ Intro ¬ Transport Protocols ¬ Communication Modes & Attacks ¬ Conclusions 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #3
  • 4. www.ernw.de Intro ¬ A number of current high-end cameras have network interfaces. ¬ We did some research as for their security and potential attack paths. ¬ In the following we focus on Canons new flagship EOS 1D X, but similar problems might be found in other models, of other vendors, too. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #4
  • 5. www.ernw.de The Camera Canon EOS-1D X 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #5
  • 6. www.ernw.de The Camera ¬ From Canon USA:  A built in Ethernet port allows for fast, easy transfer of images directly to a PC or via a network to clients from live events.  The EOS-1D X is compatible with the new WFT-E6A Wireless File Transmitter for wireless LAN transfer with the IEEE 802.11 a/b/g/n standards. A Bit of Marketing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #6
  • 7. www.ernw.de The Camera The Ethernet Port 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #7
  • 8. www.ernw.de The Camera WLAN Adapter 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #8
  • 9. www.ernw.de The Target aka. Mr. Reuters 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #9
  • 10. www.ernw.de The Target ¬ One could get the real, unedited images first. ¬ One could upload (bad) images. ¬ One could turn the camera into a surveillance device. What if 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #10
  • 12. www.ernw.de Transport ¬ Wired LAN via built-in Ethernet port or Wireless LAN via WFT-E6A. ¬ Standard TCP/IP (no IPv6, yet). 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #12
  • 13. www.ernw.de Traditional Attacks ¬ ARP-spoofing possible.  No “sticky” ARP entries ¬ ARP-flooding with ~100 packets per second DoS the network stack. ¬ Btw. stack also dies if IPv6 (multicast) is present. Layer 2 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #13
  • 14. www.ernw.de Traditional Attacks ¬ TCP/IP is used for all network communication. ¬ Established connections can be killed via TCP-RST. Layer 3/4 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #14
  • 16. www.ernw.de Communication Modes ¬ FTP Upload Mode ¬ DLNA ¬ Built-in webserver ¬ EOS Utility Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #16
  • 18. www.ernw.de FTP Upload Mode ¬ Target server and credentials configured on camera. ¬ Photos taken are uploaded to the server immediately. Mode of operation 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #18
  • 19. www.ernw.de FTP Upload Mode ¬ As FTP is clear text, credentials can be sniffed. ¬ As well as the complete data transmission ¬ Uploaded pictures can be extracted from network traffic. Downside 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #19
  • 20. www.ernw.de FTP Upload Mode 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #20
  • 21. www.ernw.de FTP Upload Mode 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #21
  • 23. www.ernw.de DLNA mode ¬ Digital Living Network Alliance® ¬ UPnP used for discovery. ¬ DLNA guidelines for file formats, encodings, resolutions. ¬ HTTP and XML used to access media. Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #23
  • 24. www.ernw.de DLNA mode ¬ No authentication. ¬ No restrictions. ¬ Every DLNA client can download _all_ images. ¬ Your Browser could be a DLNA client. Or somebody else's browser. For your camera. Cons 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #24
  • 26. www.ernw.de Built-in webserver ¬ Wireless File Transmitter Server Mode. ¬ Canon USA: “Use a web browser to capture, view and download images remotely” Canon WFT Server 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #26
  • 27. www.ernw.de Built-in webserver ¬ Browser interface uses AJAX. ¬ Embedded webserver only capable of HTTP GET method.  Every other request method is answered with a 404. Canon WFT Server 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #27
  • 28. www.ernw.de Built-in webserver ¬ Authentication via HTTP Basic (RFC 2617) on login page. ¬ Session cookie is used afterwards. ¬ Cookie looks like sessionID=40b1  4 (!!!) byte Session ID  65535 possible IDs Authentication 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #28
  • 29. www.ernw.de Built-in webserver ¬ Session ID Brute force implemented in 6 lines of python. ¬ To check for all possible IDs takes about 20 minutes.  Embedded Webserver is not that responsive. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #29
  • 30. www.ernw.de import requests target_uri = 'http://192.168.1.103/api/cam/lvoutput' target_string = 'SESSION_ERR' for i in xrange(0xffff): if (i != 0 and i%1000 == 0): print str(i) + 'IDs checked' r = requests.get(target_uri, cookies={'sessionID': '%x' %i}) if r.text.find(target_string) == -1: print 'SessionID is : sessionID=%x' %i break 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #30
  • 31. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #31
  • 32. www.ernw.de Built-in webserver ¬ Full access to Live View, stored photos and camera settings. ¬ You surf – We brute. recap 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #32
  • 33. www.ernw.de Built-in webserver ¬ Camera in WFT Server mode. ¬ Valid session opened by user. ¬ Some minutes of time. Requirements 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #33
  • 35. www.ernw.de EOS Utility mode The Utility 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #35
  • 36. www.ernw.de EOS Utility mode The Utility 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #36
  • 37. www.ernw.de EOS Utility mode ¬ Allows remote control of all non- manual camera functions. ¬ Pictures can be up- and downloaded. ¬ Possibly even more (sound recording anyone?) Overview 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #37
  • 38. www.ernw.de EOS Utility mode ¬ SSDP and MDNS used for discovery. ¬ PTP/IP used for communication. ¬ Needs initial camera <-> software pairing. Technical 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #38
  • 39. www.ernw.de EOS Utility mode ¬ At first use, credentials needs to be exchanged between the camera and the client software. ¬ Camera must be put into pairing mode via camera menu. ¬ Camera signals the need for pairing via MDNS. Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #39
  • 40. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #40
  • 41. www.ernw.de EOS Utility mode Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #41
  • 42. www.ernw.de EOS Utility mode ¬ Client software connects to camera via PTP/IP. ¬ PTP/IP Authentication is successful regardless of the credentials. ¬ Credentials (hostname, GUID) are stored on the camera. Pairing 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #42
  • 44. www.ernw.de PTP/IP ¬ Picture Transfer Protocol over Internet Protocol. ¬ ISO 15740. ¬ Standardized by International Imaging Industry Association 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #44
  • 45. www.ernw.de PTP/IP ¬ Wrapper for PTP with header: 4 byte length (little endian) 4 byte type (little endian) data Packet format 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #45
  • 46. www.ernw.de PTP/IP Layering 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #46
  • 47. www.ernw.de PTP/IP ¬ PTPIP_INIT_COMMAND_REQUEST  Includes authentication data: 16 byte GUID hostname string Authentication 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #47
  • 48. www.ernw.de PTPIP_INIT_COMMAND_REQUEST 2a 00 00 00 01 00 00 00 eb 7a 78 9d 69 cb 64 4e a3 e0 fc 96 ef 59 79 42 73 00 65 00 72 00 76 00 65 00 72 00 00 00 00 00 01 00 Paket length = 42 byte Paket type = 0x01 = PTPIP_INIT_COMMAND_REQUEST GUID Hostname = “server” @ utf16 Trailer 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #48
  • 50. www.ernw.de PTP ¬ Picture Transfer Protocol ¬ Standardized by International Imaging Industry Association ¬ ISO 15740 ¬ Lots of proprietary vendor extensions. Explained 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #50
  • 51. www.ernw.de PTP ¬ Designed for use over USB ¬ Fixed length ¬ 2 byte Msg Code ¬ 4 byte Session ID ¬ 4 byte Transaction ID ¬ 5 times 4 byte Parameter or Data Packet format 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #51
  • 52. www.ernw.de PTP ¬ Lot of standardized codes like:  PTP_GetDeviceInfo  PTP_OpenSession  PTP_CloseSession  PTP_GetStorageIDs ¬ Also Vendor specific codes like:  PTP_CANON_GetCustomizeSpec  PTP_CANON_GetCustomizeItemInfo Message Codes 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #52
  • 53. www.ernw.de PTP ¬ Thankfully there are some implementations around. ¬ We decided to go with libgphoto2. ¬ Basic PTP/IP support is included as well. Use of 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #53
  • 55. www.ernw.de Attack ¬ Client Hostname easy discoverable, but not needed.  Camera also excepts connections with a different hostname. ¬ GUID unknown to client software. ¬ Obfuscated GUID is broadcasted by the cam via UPNP. Getting the Credentials 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #55
  • 56. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #56
  • 57. www.ernw.de tmp = mdns_info.getProperties()['tid.canon.com'].split('-') guid = [] l = lambda s: [ s[i:i+2:] for i in xrange(0,len(s),2) ][::-1] for i in xrange(0,3): guid += l(tmp[i]) guid += tmp[3] guid += tmp[4] guid = "".join(guid) guid = eb7a789d69cb644ea3e0fc96ef597942 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #57
  • 58. www.ernw.de The Attack ¬ Camera only allows one connection. ¬ Already connected client needs to be disconnected. ¬ TCP-RST the established PTP/IP connection. Connecting to the Camera 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #58
  • 59. www.ernw.de Attack ¬ Listen for the Cam on MDNS. ¬ De-obfuscate Authentication data. ¬ Disconnect connected Client Software. ¬ Connect via PTP/IP. ¬ Have Phun (-; Process 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #59
  • 60. www.ernw.de5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #60
  • 61. www.ernw.de Attack outlined ¬ Photograph uses hotel / Starbucks WLAN, which isn’t unlikely during events (think of Grammy Awards few days ago). ¬ Almost anybody in the same LAN can download the images from the camera (and even more). So you can write it down 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #61
  • 62. www.ernw.de Countermeasures ¬ Enable network functionality only in trusted Networks. ¬ Use WPA and a secure passphrase for (your trusted) WLAN. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #62
  • 63. www.ernw.de Conclusions ¬ High-end cameras are yet another daily life item equipped with networking capabilities incl. full-blown IP stacks. ¬ Once more, their device-specific network technologies have been designed and implemented without (too much) security in mind. ¬ Again, this leads to (classes of) attacks previously unknown to their non- networked counterparts. 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #63
  • 64. www.ernw.de Next Steps New series of DSLRs (EOS 6D)  Built-in Wireless Access Point  New communication protocol for IOS/Android App New series of camcorder(XA20, XA25) 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #64
  • 65. www.ernw.de There’s never enough time… 5/27/2013 © ERNW GmbH | Carl-Bosch-Str. 4 | DE-69115 Heidelberg #65 THANK YOU… ...for yours!
  • 66. www.ernw.de Questions? © ERNW GmbH | Breslauer Str. 28 | D-69124 66