Penetration Testing Biometric System

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Confidential Iris Authenticati on System Optics and Digital System.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Copyright © Anviz Global Inc. USA Anviz Online Training Lesson 12 Anviz International Technical Support Team Menu Guide.
System Security Scanning and Discovery Chapter 14.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Chapter 3 Ethics, Privacy & Security
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Course 201 – Administration, Content Inspection and SSL VPN
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
9/18/2015www.protocolnet.com1 PROTOCOL ONLINE SERVICES Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware,
Honeypot and Intrusion Detection System
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Database Vulnerability And Encryption Presented By: Priti Talukder.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
6/3/2016www.ncamsys.com1 Nagaraj CamSys Solutions Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware, network,
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Small Business Security Keith Slagle April 24, 2007.
Network Security & Accounting
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Computer Security By Duncan Hall.
CSCE 201 Identification and Authentication Fall 2015.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
National Diploma Unit 4 Introduction to Software Development Input and output processing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Biometric Time & Attendance Solutions + Access Control
Critical Security Controls
Chapter 7: Identifying Advanced Attacks
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Introduction to Networking
Services Provided by Network Operating Systems
– Chapter 3 – Device Security (B)
Network hardening Chapter 14.
DATS International Portfolio.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
G061 - Network Security.
What is keystroke logging?
Presentation transcript:

Penetration Testing Biometric System By FB1H2S aka Rahul Sasi http://Garage4Hackers.com http://null.co.in/ http://nullcon.net/ http://nullcon.net/

Who am I ? What is this paper about ? I am an Info Security Enthusiast http://fb1h2s.com Rahul Sasi aka FB1H2S working as a consultant . http://www.aaatechnologies.co.in Active participant of Null and other computing groups. A member of Garage4Hackers. http://www.Garage4Hackers.com What this paper contains ? http://nullcon.net/ http://null.co.in/

Explaining the Risk? Finger print deployed every where, attendance and door management. Advantages and Disadvantages of Bio-systems. The devices hold critical information. Employee Attendance Employee Details Employee Salary http://nullcon.net/ http://null.co.in/

Why to audit them ? I am marked 10 days absent , what the |-|3ll is happening! I just Hacked into Biometric Attendance Register and Changed attendance and salary :D of mine and my @#$$ Professor / Not so good co-worker Student / Employee http://nullcon.net/ http://null.co.in/

Classifying the Attacks Local Attacks: Finger Print Sensor USB Data Manager Remote Attacks: Remote IP Management Back End Database Finger Print Manager (Admin Interface) http://nullcon.net/ http://null.co.in/

Biometric System Attack Vectors http://FB1H2S.com/ http://Garag4Hackers.com

Biometric Systems Common Applications Reliable attendance managing system. Biometric Finger print guarded doors, implemented for keyless secure access to doors. http://nullcon.net/ http://null.co.in/

Attacks: The Non Technical part http://nullcon.net/ http://null.co.in/

Local Attack: Finger print sensor Finger print scanners read input using two methodologies: 1) Optical scanner 2) Capacitance scanner Finger print recognition systems are image matching algorithms Cloning a duplicate finger print and cheating the image recognition algorithms http://nullcon.net/ http://null.co.in/

Steeling a Finger Print Your finger impressions falls any were you touch. Ex: on glass http://nullcon.net/ http://null.co.in/

My Approach: Finger Print Logger Biometric sensor looks like this. Placing a thin less refractive index transparent object in front of the sensor and logging finger prints. http://nullcon.net/ http://null.co.in/

Building Finger print logger Refraction: Use Less refractive index thin transparent sheet Log the victims fingerprint using the finger print logger http://nullcon.net/ http://null.co.in/

Steps Building Logger http://nullcon.net/ http://null.co.in/

Special Points to be Considered http://nullcon.net/ http://null.co.in/

Reproducing a Fake Finger print: http://nullcon.net/ http://null.co.in/

Local Attack: USB Data Manager. Biometrics devices have inbuilt data storage, were it stores the Finger print and user information. USB support in order to download and upload finger prints and other log detail to and from the device. Most of the devices do not have any sort of protection mechanism employed to prevent data theft, and those which uses password protection often is deployed with default password. http://nullcon.net/ http://null.co.in/

Attacks: The Technical part http://nullcon.net/ http://null.co.in/

Remote Attack Vectors. http://nullcon.net/ http://null.co.in/

Remote Attack Vectors IP implementation for data transfer Biometric Management Servers Biometric Admin/Interface (Web Based and Desktop based ) Back end Database Man In The Middle Attacks http://nullcon.net/ http://null.co.in/

TCP/IP Implementation for Remote Management: http://nullcon.net/ http://null.co.in/

Remote Administration Implementation Issues The remote administration capability of this device lets biometric servers to authenticate to it and manage remotely. We are completely unaware of the management protocol used as the program is embedded in the Biometric MIPS device. Solutions The admin application knows everything about the remote device so if we could get a copy of that application it will tell us everything we want. http://nullcon.net/ http://null.co.in/

Example Attack Attacking the remote management protocol Example. Situation: The remote administration implementation is unknown. Foot printing: The label on the Biometric device will reveal which company has marketed or build that product. Download a copy of remote management software from vendor site http://nullcon.net/ http://null.co.in/

Example Attack Reverse Engineering the Application Reflector used to disassemble the .Net application Detected TCP/IP setting of device used to communication, It uses port 4370 to communicate http://nullcon.net/ http://null.co.in/

Application uses COM objects which interacts with Device IDA used for dissembling the COM objects Disassembling Import function shows the communication details http://nullcon.net/ http://null.co.in/

Example Device Command extracted Commands to set the device time remotely http://nullcon.net/ http://null.co.in/

Auditing Back End Database From disassembling we were able to find local database password file and encryption key hardcoded in the application. http://nullcon.net/ http://null.co.in/

Biometric Admin/Interface (Web Based and Desktop based ) Another possible point of attacks are on the admin interface, these are either desktop based or Web based. Desktop based applications are common and the possible chances to interact with them require local privileges on the Biometric server. But web based admin panels could be attacked form outside. So an application check on those modules for application vulnerabilities could also help. http://nullcon.net/ http://null.co.in/

Nmap Script: Detecting Biometric Devices on Network: How to detect these device on network for attacking? Nmap Script Output. http://nullcon.net/ http://null.co.in/

Attack Videos http://nullcon.net/ http://null.co.in/

Conclusion The risk and vulnerabilities associated with Biometric Device are explained. This shows the necessity of including these devices to the scope of a Network Audit. http://nullcon.net/ http://null.co.in/