In today's 🧡, I'm going to demonstrate how easy it is to identify and compromise industrial control systems, for educational purposes ONLY. No actual compromise will take place, and I've intentionally chosen an example that is no longer valid.

On with the learning.
First, there's a US Government organization called CISA. The acronym's expansion is unimportant; what is important is knowing that they're tasked with our nation's cybersecurity.

CISA will occasionally issue alerts and bulletins about security problems, including with
industrial control systems (ICS) for our nation's critical infrastructure. Here's an example from 2013:

The advisory states that Siemens Synco OZW web server devices for building automation systems have a default password. Interesting! Let's find outcisa.gov/news-events/ic…
what that is.

Pop over to a search engine, and search for "Siemens Synco OZW default password". I'm using Bing, for reasons.

We're looking for an installation/configuration manual for the Siemens OZW products. In this instance, the first result works: Image
Let's look at it. Go to the Table of Contents, and look for the first thing that looks like logging into the device. Here we go: Image
So, we go to page 16. It helpfully shows the default administrator username, and the default password (in this case, two of them depending on firmware version). It even helpfully shows what the login screen will look like: Image
You'd be disgusted to know how many critical control systems get connected to the internet and no one ever bothers to change the default password, or disable the default accounts. They're usually so simple that, with practice, you can generally guess correctly without having to
look it up, sometimes.

Anyway, now we know that these things have a default password, and we know what the credentials are. How do we find the devices online?

There are multiple ways, but one of the easiest is a free service called Shodan.

Go to ,shodan.io
and type in "siemens port:80". Sometimes it's just that simple. A lot of results will come back. In this case, most of them are these devices. We specified "port:80" because, of course, many of these ICS systems don't even bother with HTTPS. Image
Visiting one of them would yield confirmation that these are the devices in question. We won't do that, because that's crossing from passive to active reconnaissance, and that's starting to tread into territory we want to avoid. This is just educational.
If one were to do that, however, you'd see something like this, confirming you've found a relevant device. From there, if you were a hardened criminal and did not care about the law, you could begin trying the default credentials to see if they work. Image
As I mentioned earlier, there are all manner of devices accessible from the internet, many of which have multiple vulnerabilities, including default credentials. And our government (and multiple cybersecurity companies, along with cybersecurity researchers) are quick to
publicly announce these vulnerabilities as soon as they find them, often with enough information to create an exploit for the vulnerability. Sometimes, they even provide the exploit, too!

And there are much more serious devices that building automation (not that one couldn't
cause some serious shenanigans with a building automation system). For example, the US Emergency Alert System (the thing that controls the loud emergency alerts you get on radio, TV, and phones nationwide). The system runs on a series of authenticated devices distributed
to carriers and broadcasters nationwide. These devices have the ability to not just receive, but create and send alerts as well. Pretty much the only thing protecting them is that most people don't know what they're called.

They're called DASDECs. Once you know that, you can
just search for "DASDEC", and sure enough, you'll find them.

They also have default credentials, discoverable via the same method I described above.

This is absolutely not my image; I found it online. However, were one to access one of these devices (DO NOT DO THIS),
one might see a screen similar to this, allowing a person to inject an alert into the Emergency Alert System and specify its delivery date, time, and area: Image
As you can see, all it takes to cripple critical infrastructure is a search engine, a manual, a service like Shodan, and knowledge of a vendor and/or product make/model, and knowledge of a vulnerability and the ability to exploit it. And yes, default credentials are very much
a vulnerability. So much so, they're classified in a vulnerability taxonomy put together by MITRE, an FFRDC: cwe.mitre.org/data/definitio…

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with 4nt1p4tt3rn πŸ΄β€β˜  Appalachistan Wolf Lodge #47

4nt1p4tt3rn πŸ΄β€β˜  Appalachistan Wolf Lodge #47 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @4nt1p4tt3rn

Dec 6
Drones. A brief 🧡.

There's been a lot of talk lately regarding the offensive use of drones, and what can be done about it. For the purposes of this conversation, we'll be discussing three situations: surveillance, loitering munitions, and active targeting using explosives.
For all three, the same problems and solutions exist, with the possible exception of one extra mitigation for loitering munitions.

First, let's talk drones: they are either operated by a human within line of sight of the drone, or remotely by a human piloting the drone via video
feed. A third possibility is that the drone is automatically piloted using GPS to a given target location, leveraging onboard obstacle avoidance tech.

Drones have several attack surfaces: The operator, the wireless signals, the camera, and the drone itself (rotors and airframe).
Read 23 tweets
Nov 6
You know the difference between us and them?

They're highly organized, have a demonstrated capacity to mobilize, and have logistics and support worked out.

We've got a few thousand rounds and a winning attitude.

I'm gonna say it: that's not enough.
They have 501c3s and c6s fundraising and funneling funds and equipment to them.

They have coordinated networks of disparate groups sharing info and intel.

They have the ability to ignore differences to work towards a common goal, against a common enemy.

They have tradecraft.
They have local hierarchical organization and specialization, and work as a team.

They know how to play the game.

They're not waiting for someone to do what needs to be done. They're doing it.

And we're letting them, thinking that one day, someone will raise the battle cry.
Read 4 tweets
Oct 9
I am back from @Brushbeater's Scout course. Was going to stay for the Recce course, but it made more medical sense to complete the Scout course and come back home.

A short 🧡on lessons learned.
@Brushbeater 1. I don't care how in shape you think you are. You are not in shape enough. Less lifting, more cardio. MUCH more cardio. Walking and running in gear, over broken ground.
2. Walking silently and slowly (over broken ground, again, and heavily wooded areas) will work every stabilizer muscle you never knew you had, and fatigue you much more quickly than you expect. You need to practice it, in gear. For at least a mile, preferably more.
Read 19 tweets
Apr 3
Having just made a grand stand on never shopping at grocery stores, I'm gonna show my hypocrisy: We still go to grocery stores.

To our local Publix, for a specific brand of almond milk (due to medical issue) that we have thoroughly researched, and for raw turkey parts, (1/x)
whose source we have also thoroughly researched, and because turkey, by law, cannot be injected.

We also go to a regional chain, Earth Fare, for local organic potatoes and mushrooms, which we cannot get year-round at a farmers market.

We buy flours from Bob's Red Mill.
Our local butcher has, sadly, gone downhill and we no longer trust where they get their meat. Thankfully, we were only relying on them for turkey at this point. We source fish from the guy I mentioned in my other tweet, and beef from a local farm.

We get goat milk
Read 7 tweets
Apr 3
I've said it before, but in light of the mRNA-in-meat stories making the rounds, I'll say it again, because it is literally life-or-death for you and yours:

Stop. Eating. Processed. Foods.

Stop. Buying. Food. At. Grocery. Stores.

You should be able to sustainably feed (1/x)
your family on locally sourced meat, poultry, fish, and produce, with local and/or well-vetted sources for grains and flours.

Research farms in your (200mi. radius) area. Find ones that pasture-raise, grass feed, grass finish, and don't inject.

Buy a top-loading (2/x)
freezer. Even the largest consumer model is about $1k, and that'll easily hold two whole cows.

You'll be getting more product/dollar, it'll be healthier, and you'll be supporting local, non-industrial farmers.

You shouldn't need to go to a grocery store for anything. (3/x)
Read 8 tweets
Apr 3
I'm gonna tell you a little story about the US power grid. there are 8 regional interconnects in CONUS. Those regions are comprised of roughly 11,000 power plants.

Power companies supposedly know and plan for the generation capacity necessary for their coverage area. (1/x)
In simple terms, that means your power company builds and operates enough plants to meet peak need throughout the year.

However, that's the elementary school version. In reality, most power companies are usually only generating enough for average demand for the (2/x)
time of year, weather, and coverage area. This is due to plant closures, maintenance, failures, unexpected weather, etc.

How do they make up the difference? Easy: Power companies operate a trading floor, and an energy market. They buy and sell excess generating (3/x)
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(