threats to machine clouds

47
Security Threats to Machine Clouds [email protected]

Upload: sensepost

Post on 12-Nov-2014

781 views

Category:

Technology


0 download

DESCRIPTION

Preliminary research into machine 2 machine clouds presented at B-Sides Cape Town by George Pranchke of SensePost.

TRANSCRIPT

Page 1: Threats to machine clouds

Security Threats to Machine Clouds

[email protected]

Page 2: Threats to machine clouds

about: us

Georg-Christian Pranschke

http://www.sensepost.com/blog/7733.html

Page 3: Threats to machine clouds

what we’re going to talk about

• the cloud• why this talk ?• machine clouds ?• results: cursory “testing”• what does all this mean ?

Page 4: Threats to machine clouds

The Cloud

Page 5: Threats to machine clouds

clobbering the cloud!

Page 6: Threats to machine clouds

cloud security

Page 7: Threats to machine clouds

Why This Talk ?

Page 8: Threats to machine clouds

security threats to machine clouds• fast growing mobile connectivity • greater number of connected devices• management complexity and high costs

• web-based device management for connected devices

• inherits some of the web app threats plus new

ones

Page 9: Threats to machine clouds

Machine Clouds ?

Page 10: Threats to machine clouds

machine clouds?

Page 11: Threats to machine clouds

machine clouds?• home automation• vehicle tracking• tele-medicine• location-based services• “M2M and connected products are changing our world”• “safer, simpler and more productive”• “less cost per year than full-time employee”

• i.e. ATMs monitoring -> access to finances• i.e. medical equipment -> ensuring very best patient care• i.e. smart signs -> law enforcement • i.e. cars -> driving behaviour to insurance carriers

Page 12: Threats to machine clouds
Page 13: Threats to machine clouds

machine cloud ui: the web application

Page 14: Threats to machine clouds

machine - cloud integration

Page 15: Threats to machine clouds

protocol dissection (i)

DHCP response

Page 16: Threats to machine clouds

protocol dissection (ii)

restart request response

Page 17: Threats to machine clouds

machine – cloud interaction (i)

Page 18: Threats to machine clouds

machine – cloud interaction (ii)

Page 19: Threats to machine clouds

connecting a machine

Page 20: Threats to machine clouds

Results: Cursory “Testing”

Page 21: Threats to machine clouds

#include <disclaimer.h>

Page 22: Threats to machine clouds

approach

Business Logic

Application

Infrastructure

web application/web services <<>> “rogue machine”

Page 23: Threats to machine clouds

the environment (i)

Page 24: Threats to machine clouds

the environment (ii)

Page 25: Threats to machine clouds

threat: exposed administrative interfaces

Page 26: Threats to machine clouds

threats: cms layer (i)

Page 27: Threats to machine clouds

threats: cms layer (ii)

Page 28: Threats to machine clouds

threats: cms layer(iii)

Page 29: Threats to machine clouds

threats: web app layer

Page 30: Threats to machine clouds

clickjacking/ui redressing

Page 31: Threats to machine clouds

SDKs (i)

Page 32: Threats to machine clouds

SDKs (ii)

Page 33: Threats to machine clouds

SDKs (iii)

Page 34: Threats to machine clouds

SDKs (iv)

Page 35: Threats to machine clouds

a side note…

Page 36: Threats to machine clouds

transport layer encryption (i)

Page 37: Threats to machine clouds

transport layer encryption (ii)

Page 38: Threats to machine clouds

lame ? (i)

Page 39: Threats to machine clouds

lame ? (ii)

Page 40: Threats to machine clouds

lame ? (iii)

Page 41: Threats to machine clouds

threat: malicious applets

Page 42: Threats to machine clouds

a side note …

Page 43: Threats to machine clouds

threat: rogue machines

Page 44: Threats to machine clouds

putting it all together

• malicious applets• obtain vendor id or …• unauthorised connection• upload of XSS payload or …• XSS -> session hijacking and …

Page 45: Threats to machine clouds

What Does All This Mean ?

Page 46: Threats to machine clouds

what does all this mean

Page 47: Threats to machine clouds

Security Threats to Machine Clouds

Thank You!