Physical

Transcription

Physical
GuadalajaraCON
−PHYSICAL SECURITY−
SECURITY−
Look mom,
mom, just like
JASON BOURNE
Alejandro Hernández H. CISSP, GPEN
@nitr0usmx
http://chatsubo-labs.blogspot.com
http://www.brainoverflow.org
Guadalajara, México
April, 2013
1
GuadalajaraCON
About me…
me
Senior Security Consultant at IOActive
~10 years in the security field
I break stuff
2
Table of Contents
This presentation will be a collage of
concepts, own experiences and video
clips
What to protect physically?
Security controls commonly used
Physical security assessment techniques
Interesting and unusual concepts
3
GuadalajaraCON
INTRO VIDEO CLIP
GuadalajaraCON
Jason Bourne - Stealing the Blackbriar Files
4
What to protect physically?
physically?
GuadalajaraCON
People
Earthquakes
Social Engineering
Etc.
Data / Informacion
Physical / Printed documents (contracts, invoices, etc.)
Post-its
Etc.
Technology Infrastructure
Data Center
Robots in Industrial Plants
Etc.
5
GuadalajaraCON
Security controls commonly used
6
GuadalajaraCON
Security controls commonly used
7
GuadalajaraCON
Security controls commonly used
8
VIDEO CLIP
GuadalajaraCON
Jason Bourne - Evacuation Plan
Certain information could be used against you
9
GuadalajaraCON
Physical security assessment techniques
Infiltration and Social Engineering
Fake ID creations
Banners using corporate colors (Web site)
Names / Employee numbers (OSINT)
Print the “Authorization Letter” (fake)
The same of above, but with a ‘C*O’ signature
Be confident in front of the security guard !
Determination
10
GuadalajaraCON
Physical security assessment techniques
Infiltration and Social Engineering
2011…
11
GuadalajaraCON
Physical security assessment techniques
Infiltration and Social Engineering
Another one from 2008…
12
GuadalajaraCON
Physical security assessment techniques
Piggybacking
When a person tags along
with another person who
is authorized to gain entry
into a restricted area, or
pass a certain checkpoint
13
GuadalajaraCON
Physical security assessment techniques
Lock Picking
The art of unlocking a lock
by analyzing and
manipulating the
components of the lock
device without the original
key
14
GuadalajaraCON
IOActive Lock Picking session @ Mt. Baker
[January 2013]
15
VIDEO CLIP
GuadalajaraCON
Lock Picking 101
Safeboxes and doors are also vulnerable
16
VIDEO CLIP
GuadalajaraCON
Vina F in Gringo Warrior
Lock Picking and fun @ DEFCON (Gringo Warrior Game)
17
VIDEO CLIP
GuadalajaraCON
Cyber Security. Evolved. (Deloitte UK)
Combination of all the techniques described previously
18
GuadalajaraCON
Physical security assessment techniques
Dumpster Diving
Looking for information in garbage
Financial statements, corporate
documents, signatures, etc.)
19
GuadalajaraCON
Physical security assessment techniques
Shoulder Surfing
Watch the screen and/or
the pressed keys behind
the victim
20
GuadalajaraCON
Physical security assessment techniques
Shoulder Surfing
Icons guide for Shoulder Surfing (hkm)
http://www.hakim.ws/textos/iconos_del_taskbar.html
21
GuadalajaraCON
Physical security assessment techniques
{key,video} Loggers
Special hardware for capturing
keys/videos from a victim’s
computer
22
GuadalajaraCON
Physical security assessment techniques
Default passwords
Sometimes a demo of
the software is
provided by the vendor
;-)
Biometrics
Industrial devices
CCTV
23
VIDEO CLIP
GuadalajaraCON
Spaceballs super password XD
Some physical security devices also have default passwords
24
VIDEO CLIP
GuadalajaraCON
Control of 48 security cameras in a building in Mexico City
CCTV cameras also have default passwords
25
VIDEO CLIP
GuadalajaraCON
Access to a “High Security” data center in Mexico City using the
administration panel (without password) in the biometric device
Biometric devices are well designed and developed… Some are
misconfigured or implemented incorrectly
26
GuadalajaraCON
Physical security assessment techniques
*Plugs
Small computers with different functionalities
physically connected to an energy plug inside the
building / premises / complex
Malicious USBs
27
GuadalajaraCON
Physical security assessment techniques
Industrial Plants
‘Physical’ segregation between the data (corporate)
and industrial networks
Disabled USB ports
28
GuadalajaraCON
29
DoD Looking to ‘Jump the
Gap’ Into Adversaries’ Closed Networks
Jan 15th, 2013
Iranian President Mahmoud Ahmadinejad visits the Natanz
uranium enrichment facilities, where a “closed”
computer network was infected by malware
introduced via a small flash drive.
30
http://www.defensenews.com/article/20130115/C4ISR01/301150010/DoD-Looking-8216Jump-Gap-8217-Into-Adversaries-8217-Closed-Networks
GuadalajaraCON
GuadalajaraCON
31
GuadalajaraCON
Interesting and Unusual Concepts
Urban Exploration
Ninja assessment
Often shortened as urbex or UE. It may also be
referred to as Infiltration, Building Hacking,
draining (when exploring drains), urban rock climbing
Exploration of man-made structures, usually
abandoned ruins or not usually seen components of
the man-made environment
32
GuadalajaraCON
Interesting and Unusual Concepts
Urban Exploration
33
GuadalajaraCON
Interesting and Unusual Concepts
Urban Exploration
In México….. The Rat Man in the Subway
34
GuadalajaraCON
Interesting and Unusual Concepts
Urban Exploration
http://www.infiltration.org
35
GuadalajaraCON
36
GuadalajaraCON
Interesting and Unusual Concepts
Concepts from one of
the best INFOSEC
books I ever read
37
GuadalajaraCON
Interesting and Unusual Concepts
38
GuadalajaraCON
Interesting and Unusual Concepts
39
GuadalajaraCON
Interesting and Unusual Concepts
40
GuadalajaraCON
Interesting and Unusual Concepts
41
GuadalajaraCON
Interesting and Unusual Concepts
Seen a couple of times
42
GuadalajaraCON
Interesting and Unusual Concepts
43
Moral
… Use the right security controls
44
GuadalajaraCON
GuadalajaraCON
− Thanks −
Alejandro Hernández H. CISSP, GPEN
@nitr0usmx
http://chatsubo-labs.blogspot.com
http://www.brainoverflow.org
Guadalajara, México
April, 2013
45