Tim Jensen, CISSP CBI Shodan: The Hacker’s Search Engine.

66
Tim Jensen, CISSP CBI www.cbihome.com Shodan: The Hacker’s Search Engine

Transcript of Tim Jensen, CISSP CBI Shodan: The Hacker’s Search Engine.

Page 1: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Tim Jensen, CISSPCBI

www.cbihome.com

Shodan: The Hacker’s Search Engine

Page 2: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Disclaimer• Following the steps in this document can get you into legal trouble. • Only connect to systems that you own or have written permission

to conduct testing on• I am not a lawyer, but generally I would say connecting to an HTTP

port and viewing what is there is ok. Entering credentials, brute forcing, exploiting vulnerabilities, or anything else to gain privileged access is illegal.• Reconfiguring systems is definitely illegal!• Disclosing vulnerabilities to companies can get you threatened,

even if you did nothing wrong. Leave it to the professionals if your not willing to go to jail for doing the right thing.• I am not responsible for anything you do, think, or say.

Page 3: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 4: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 5: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Versions

Shodanhq.com

• HTTP only – creds visible across internet• Buggy if looking through

more than 1 page of results• Contains filter

documentation• API key easily shown on

Development page

Shodan.io - Recommended

• HTTPS by default• Considerable

improvements in stability• API key found in Account

Overview

Page 6: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Filters

Page 7: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Ports• Historically limited to HTTP, HTTPS, HTTP-ALT, SSH,

FTP, Telnet• Currently contains nearly all top nmap ports, if not all

Page 8: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 9: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 10: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 11: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 12: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Polycom Systems• Churches• Consulting Firms• Fire Departments• Police Stations• SWAT Ready Room

• Court Houses• Judges Chambers• Jury Room (Epic Fail)

Page 13: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 14: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 15: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 16: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Speaking of Police…

Page 17: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 18: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 19: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 20: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Medical Devices• Scott Ervind gave a talk at DakotaCon 2015 about

using Shodan to locate medical devices. His research results:• Located over 65,000 devices using Shodan• Devices included pacemaker programmers, EKG, medical

pumps, MRI scanner stations, etc.• Not only could data be leaked, but equipment could be

destroyed or re-programed.• Worked with DHS to notify all parties.

Page 21: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 22: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 23: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

NetbiosInformation Gathering

Page 24: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

ludicrous_netbios.xps

Page 25: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Brute ForcingUsername + SMB + Not Domain Joined =

Page 26: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Port 137 – Locate UsernamePort 445 – Locate SMB share to brute forcePort 3389 – Alternately brute force remote desktop

username_w_smb_rdp.xps

Page 27: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 28: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Phone PBX for a good sized phone company

No authentication required

Page 29: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 30: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 31: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Industrial Control Systems

Page 32: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

What is an Industrial Control System (ICS)• Controls ‘facilities’ or

physical equipment such as:• Door systems• Air Conditioning/Heating• Power Generators• Power Plants• Automation Machinery

(Manufacturing)• Lights• Security Alarm Systems

• Key Terms:• SCADA• PLC• PAC• DCS

Page 33: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Project Aurora

Page 34: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 35: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 36: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

BACNETPort 47808

Page 37: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 38: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 39: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 40: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 41: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 42: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 43: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 44: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 45: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 46: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 47: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

The Military

Page 48: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 49: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

11,004 printers$8 for a ream of paper

$88,032 for a single attack across all systems

Page 50: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

380,616 printers$8 for a ream of paper

$3,044,928 for a single attack across all systems

*Doesn’t include toner*

Page 51: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Printers

Page 52: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 53: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 54: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 55: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 56: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Cringe worthy

Page 57: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 58: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 59: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 60: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 61: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 62: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.
Page 63: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

API

Page 64: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

API• Multiple interfaces:• JSON• Python• Ruby• NodeJS

• Well documented

Page 65: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Way to use API for good1. Create a baseline of your network2. Run daily to identify new hosts/ports which have

been exposed to the internet3. Track changes over time and create reports for

successful vs failed border changes

Results could be fed into a SIEM for easy reporting

Page 66: Tim Jensen, CISSP CBI  Shodan: The Hacker’s Search Engine.

Ways to use API for bad1. Create query signature for known vulnerability2. Capture results3. Add IP’s to a file4. Feed IP’s into exploit5. Automate so you can be lazy6. Order Pizza7. Eat Pizza8. Dig through loot