SlideShare a Scribd company logo
Exploiting and attacking seismological networks ..
Remotely
Bertin B – James jara NetDB Search Engine
DEFCON 24 Las Vegas, Nevada
Disclaimer
- This is not a typical talk
-Probably it is the first research of this kind
-All vulnerabilities have been reported to U.S CERT
-We are not responsible of the actions that
someone can take after attend this talk
-Peace on earth
Agenda
-Who we are
-Motivation
-How we discovered this devices?
-Risk /Impact , who is affected by attacking
this devices ?
-Seismological instrumentation
-Internals /Deployment/Networking
-Vulnerabilities /firmware analysis
-Attack vectors / post exploitation
-Recommendations/conclusions
Bertin Bervis
NetDB Co-founder
@bertinjoseb
James Jara
NetDB Co-founder
@jamesjara
We are from San Jose Costa Rica
Motivation
Why we are interested in seismological networks?
An average attacker is not interested for this attacks
Governments are interested.. you know.. …..!@#$% WAR
Cool and new attack scenario ¨extreme environment¨
You are playing with devices that measure natural disasters
Could lead to a financial sabotage to a specific company/country
The vendors of this instruments doesn’t have any sense of computer security
Remote access, remote exploitation
Ok let’s continue this project…
How we discovered this devices?
DEMO
Fingerprints too many fingerprints
For some strange reason you find a unique fingerprint in millions…
DEMO
So.. WTF is TAURUS ???? Let´s connect to that shit NOW!
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Seismometers are instruments that measure motion of the
ground, including those of seismic waves generated
by earthquakes, volcanic eruptions, and other seismic
sources. Records of seismic waves allow seismologists to
map the interior of the Earth, and locate and measure the
size of these different sources.
Wikipedia
Common aplications:
-Earthquake detection
-Geophysics, geothermal development
-Structural analysis
-Mine safety
-Fracking / Drilling
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
GPS REAL DATA
LOCATION DEMO
Ocean bottom
seismograph
Impact
-No one else has ever done a research about security of this devices or networks
before
-Remote Denial of service
-Remote management
-Several Bugs
-Sabotage seismological country’s network
-Economic impact for Oil and Gas research for specific company
-Drug trafficking submarine detection
-Military
-Unknow
This increased understanding can lead to improved oil and gas recovery.
Vendors found
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Internals
Linux based OS
Remote management
SSH TELNET FTP Web Server
GPS
Ocean bottom
Battery /Solar panels
Sophisticated
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Deployment options
The Taurus may be deployed as either a stand-alone data recorder or as a network
component.
For stand-alone recording where network access is not required, typically you would
configure the Taurus to run in Buffered mode. It consumes less power in this mode as
the Controller only runs when the Taurus is recording buffered data to the Store.
For networked operation you must configure the Taurus to run in Communications mode
and configure the appropriate network options. In this mode, the Controller is running
continuously. It consumes more power than Buffered mode but allows continuous
access via an IP connection.
You can stream time-series data from a Taurus to a central acquisition server, for
example to write the data to NAQS ringbuffers. To stream Taurus data to NAQS, the
NpToNmxp utility must be running on the NAQS server
• Stream NP Packets – Set Taurus to stream data to the specified destination; enabled ,
not enabled . Factory default is not enabled. • IP Address – The address of the streaming
destination (for example, a NAQS server); a valid IP address in dotted decimal format
Applications software Nanometrics Apollo acquisition server with web interface
Geophysicists depend on seismometers to
monitor earthquakes generated by the motion
of the tectonic plates that form the Earth’s
crust. In order to function, the instruments
need to be leveled prior to operation. That’s
easy enough for a device deployed on dry land,
but when it comes to seismometers placed on
the ocean floor thousands of feet below the
surface, the process gets a bit more
challenging. To solve it, Nanometrics Inc.
(Kanata, Ontario) combines sophisticated
gimbals and microprocessors, along with ultra-
reliable, efficient motors from MICROMO
(Clearwater, FL).
Sensor Earth Deployment
The seismological network
Ocean Bottom seismic network - Autonomous Underwater Vehicles (AUVs)
Athena: Event Cataloging and Notification
Management
Challenge: In order to function, the
instruments need to be leveled prior to
operation. Not easy when it is thousands feet
on the ocean floor.
Solution: To solve it, Nanometrics Inc. (Kanata,
Ontario) combines sophisticated gimbals and
microprocessors, along with ultra-reliable,
efficient motors from MICROMO (Clearwater,
FL)
Results: A Trillium 240 was deployed at the
South Pole and it operated perfectly. The turn-
on temperature was -58°C (-136°F). The system
temperature settled eventually to -50° C (-
122°F) and stayed there for a long period of
time. The motors turned on and did exactly
what they were supposed to do
OCEAN BOTTOM DEPLOYMENT VIDEO DEMO
To deploy the Trillium OBS (black cylinder),
users attach the seismometer to a metal sled
that carries it down to the sea floor. At the end
of the experiment, the transponder signal
triggers the release of ballast and the
instrument floats to the surface. (Courtesy of
Nanometrics Inc.
Inside the Solution
Seismometers capture transient phenomenon. If an instrument
malfunctions, whether it’s at the bottom of
the ocean or atop a polar ice cap, that data
is lost forever.“You need to be absolutely sure the sensor will
perform perfectly every time,” says Jeff Potter, director of marketing at
Nanometrics. “Seismometers also need to be small and consume very little
power when they level themselves, and that’s where MICROMO has helped.”
The leveling mechanism integrates the following devices:
The AM1020-V-6-65, a in a 10-mm-diameter, two- phase stepper motor that
provides a peak torque of 1.6 mNm. With 20 steps per revolution, and
PRECIstep technology, the motor offers reliable, accurate motion, even in harsh
environments.
A 10/1 planetary gearbox provides a 256:1 reduction ratio in a 10-mm-
diameter package.
Vulnerability research
-We want a shell in that thing
-The firmware was not easy to find in the internet
-This equipment is very expensive
-Not everyone can buy these things directly to the
vendor, you need to be an organization/academics .
-Let tell you the story about how i was be able to get the
firmware …..
FUCK YEAH!!!!!!
WTF?
BUSTED…but too late for them
Too much talk!!
root@root
DEMO TIME
dolphin18
There is backdoor, factory user is not in official documentation.
Test some vulnerabilities.. You know..
PWD !! Shellshock
Bugs and errors everywhere
GURALP Systems are easy to find looking in the SSL certificate metadata in NetDB
Ok , now we are root so .. What’s next ?
PROTOCOL / COMMUNICATIONS
The Standard for the Exchange of Earthquake
Data (SEED) is a data format intended primarily
for the archival and exchange of seismological
time series data and related metadata. The
format is maintained by the International
Federation of Digital Seismograph Networks
and documented in the SEED Manual (PDF
format). Originally designed in the late 1980s,
the format has been enhanced and refined a
number of times and remains in widespread
use.
Data identification nomenclature
The SEED format uses 4 name components to uniquely identify a time series and
provide attribution to the owner of the data:
Network code: a 1 or 2 character code identifying the network/owner of the data.
These codes are assigned by the FDSN to provide uniqueness to seismological data, new
codes may be requested.
Station code: a 1 to 5 character identifier for the station recording the data.
Location ID: a 2 character code used to uniquely identify different data streams at a
single station. These IDs are commonly used to logically separate multiple instruments
or sensor sets at a single station.
Channel codes: a 3 character combination used to identify the 1) band and general
sample rate 2) the instrument type and 3) the orientation of the sensor. A convention
for these codes has been established and is documented in Appendix A of
the SEED Manual.
What if……
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Guralp systems SCREAM protocol for transmitting seismic data over the internet
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Conclusions
-We are be able to locate this devices anywhere in the world
-We are in control of the device , the network and the
software running on it.
-There is no SSL in communications
-This devices help engineers to save people and understand
the earth
-Vendors please… code better and think in security
Recommendations
THANKS
SEE YOU NEXT TIME !!

More Related Content

PDF
Path Solutions Network Monitor V4 Glossy
PDF
Thermal Camera 45km Long Range Thermal Infrared IR Imaging Night Vision Coole...
PDF
A Border security Using Wireless Integrated Network Sensors (WINS)
PPTX
DST Control - Airborne Day & Night Imaging
PDF
IRJET- Mars Exploration Rover
PPTX
Earthquake Early Warning Systems Using Wireless Sensor Networks
PDF
Catalog | Armasight | 2016 | Optics Trade
PDF
Southeastern Pacific Tsunami Warning Solutions
Path Solutions Network Monitor V4 Glossy
Thermal Camera 45km Long Range Thermal Infrared IR Imaging Night Vision Coole...
A Border security Using Wireless Integrated Network Sensors (WINS)
DST Control - Airborne Day & Night Imaging
IRJET- Mars Exploration Rover
Earthquake Early Warning Systems Using Wireless Sensor Networks
Catalog | Armasight | 2016 | Optics Trade
Southeastern Pacific Tsunami Warning Solutions

What's hot (10)

PDF
Datasheet | Flir Scion PTM | Optics Trade
PDF
Technical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
PDF
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
PPTX
Data sniffing over Air Gap
PDF
Data sniffing over air gaps 200524113012
PPTX
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
PPTX
Satrack
PDF
Modem Acustici Subacquei EvoLogics
PDF
Alert119 Storm Grid09ppt07021609
Datasheet | Flir Scion PTM | Optics Trade
Technical data ATN Night Spirit MP-CGT Monoculars | Optics Trade
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Data sniffing over Air Gap
Data sniffing over air gaps 200524113012
ADVANCE SYSTEM FOR TRACKING OF CRIME SUSPECTS
Satrack
Modem Acustici Subacquei EvoLogics
Alert119 Storm Grid09ppt07021609
Ad

Similar to DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely (20)

PDF
Hack.lu 2016
PDF
Export Approved Solinov Presentation.PDF
PDF
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
PPSX
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
PPTX
Processing Rasters from Satellites, Drones, & More
PPT
Homeland Heart Beacon Sosce
PDF
VULNERABILITY ( CYBER SECURITY )
PPTX
SmarRack DCAM Solution
PPTX
D-STREAMON - NFV-capable distributed framework for network monitoring
PPTX
A theory on basics of edge computing notes
PPTX
IoT Architecture for Water Resources Industry
PPT
Satrack
PDF
Null Feb 13
PDF
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
PDF
Application_of_numerical_distance_relay.pdf
PPT
Data recovery
DOCX
Dataloggers seminar Report
PPTX
Majorppt
PPS
Stanford Cybersecurity January 2009
PDF
Protecting the Power Grid
Hack.lu 2016
Export Approved Solinov Presentation.PDF
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Processing Rasters from Satellites, Drones, & More
Homeland Heart Beacon Sosce
VULNERABILITY ( CYBER SECURITY )
SmarRack DCAM Solution
D-STREAMON - NFV-capable distributed framework for network monitoring
A theory on basics of edge computing notes
IoT Architecture for Water Resources Industry
Satrack
Null Feb 13
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Application_of_numerical_distance_relay.pdf
Data recovery
Dataloggers seminar Report
Majorppt
Stanford Cybersecurity January 2009
Protecting the Power Grid
Ad

More from Felipe Prado (20)

PDF
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
PDF
DEF CON 24 - Tamas Szakaly - help i got ants
PDF
DEF CON 24 - Ladar Levison - compelled decryption
PDF
DEF CON 24 - Clarence Chio - machine duping 101
PDF
DEF CON 24 - Chris Rock - how to overthrow a government
PDF
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
PDF
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
PDF
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
PDF
DEF CON 24 - Gorenc Sands - hacker machine interface
PDF
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
PDF
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
PDF
DEF CON 24 - Rich Mogull - pragmatic cloud security
PDF
DEF CON 24 - Grant Bugher - Bypassing captive portals
PDF
DEF CON 24 - Patrick Wardle - 99 problems little snitch
PDF
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
PDF
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
PDF
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
PDF
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
PDF
DEF CON 24 - Antonio Joseph - fuzzing android devices
PDF
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely

  • 1. Exploiting and attacking seismological networks .. Remotely Bertin B – James jara NetDB Search Engine DEFCON 24 Las Vegas, Nevada
  • 2. Disclaimer - This is not a typical talk -Probably it is the first research of this kind -All vulnerabilities have been reported to U.S CERT -We are not responsible of the actions that someone can take after attend this talk -Peace on earth
  • 3. Agenda -Who we are -Motivation -How we discovered this devices? -Risk /Impact , who is affected by attacking this devices ? -Seismological instrumentation -Internals /Deployment/Networking -Vulnerabilities /firmware analysis -Attack vectors / post exploitation -Recommendations/conclusions
  • 4. Bertin Bervis NetDB Co-founder @bertinjoseb James Jara NetDB Co-founder @jamesjara
  • 5. We are from San Jose Costa Rica
  • 6. Motivation Why we are interested in seismological networks? An average attacker is not interested for this attacks Governments are interested.. you know.. …..!@#$% WAR Cool and new attack scenario ¨extreme environment¨ You are playing with devices that measure natural disasters Could lead to a financial sabotage to a specific company/country The vendors of this instruments doesn’t have any sense of computer security Remote access, remote exploitation Ok let’s continue this project…
  • 7. How we discovered this devices? DEMO
  • 8. Fingerprints too many fingerprints
  • 9. For some strange reason you find a unique fingerprint in millions… DEMO
  • 10. So.. WTF is TAURUS ???? Let´s connect to that shit NOW!
  • 13. Seismometers are instruments that measure motion of the ground, including those of seismic waves generated by earthquakes, volcanic eruptions, and other seismic sources. Records of seismic waves allow seismologists to map the interior of the Earth, and locate and measure the size of these different sources. Wikipedia Common aplications: -Earthquake detection -Geophysics, geothermal development -Structural analysis -Mine safety -Fracking / Drilling
  • 17. GPS REAL DATA LOCATION DEMO Ocean bottom seismograph
  • 18. Impact -No one else has ever done a research about security of this devices or networks before -Remote Denial of service -Remote management -Several Bugs -Sabotage seismological country’s network -Economic impact for Oil and Gas research for specific company -Drug trafficking submarine detection -Military -Unknow
  • 19. This increased understanding can lead to improved oil and gas recovery.
  • 24. Internals Linux based OS Remote management SSH TELNET FTP Web Server GPS Ocean bottom Battery /Solar panels
  • 27. Deployment options The Taurus may be deployed as either a stand-alone data recorder or as a network component. For stand-alone recording where network access is not required, typically you would configure the Taurus to run in Buffered mode. It consumes less power in this mode as the Controller only runs when the Taurus is recording buffered data to the Store. For networked operation you must configure the Taurus to run in Communications mode and configure the appropriate network options. In this mode, the Controller is running continuously. It consumes more power than Buffered mode but allows continuous access via an IP connection. You can stream time-series data from a Taurus to a central acquisition server, for example to write the data to NAQS ringbuffers. To stream Taurus data to NAQS, the NpToNmxp utility must be running on the NAQS server • Stream NP Packets – Set Taurus to stream data to the specified destination; enabled , not enabled . Factory default is not enabled. • IP Address – The address of the streaming destination (for example, a NAQS server); a valid IP address in dotted decimal format Applications software Nanometrics Apollo acquisition server with web interface
  • 28. Geophysicists depend on seismometers to monitor earthquakes generated by the motion of the tectonic plates that form the Earth’s crust. In order to function, the instruments need to be leveled prior to operation. That’s easy enough for a device deployed on dry land, but when it comes to seismometers placed on the ocean floor thousands of feet below the surface, the process gets a bit more challenging. To solve it, Nanometrics Inc. (Kanata, Ontario) combines sophisticated gimbals and microprocessors, along with ultra- reliable, efficient motors from MICROMO (Clearwater, FL).
  • 31. Ocean Bottom seismic network - Autonomous Underwater Vehicles (AUVs)
  • 32. Athena: Event Cataloging and Notification Management
  • 33. Challenge: In order to function, the instruments need to be leveled prior to operation. Not easy when it is thousands feet on the ocean floor. Solution: To solve it, Nanometrics Inc. (Kanata, Ontario) combines sophisticated gimbals and microprocessors, along with ultra-reliable, efficient motors from MICROMO (Clearwater, FL) Results: A Trillium 240 was deployed at the South Pole and it operated perfectly. The turn- on temperature was -58°C (-136°F). The system temperature settled eventually to -50° C (- 122°F) and stayed there for a long period of time. The motors turned on and did exactly what they were supposed to do
  • 34. OCEAN BOTTOM DEPLOYMENT VIDEO DEMO To deploy the Trillium OBS (black cylinder), users attach the seismometer to a metal sled that carries it down to the sea floor. At the end of the experiment, the transponder signal triggers the release of ballast and the instrument floats to the surface. (Courtesy of Nanometrics Inc.
  • 35. Inside the Solution Seismometers capture transient phenomenon. If an instrument malfunctions, whether it’s at the bottom of the ocean or atop a polar ice cap, that data is lost forever.“You need to be absolutely sure the sensor will perform perfectly every time,” says Jeff Potter, director of marketing at Nanometrics. “Seismometers also need to be small and consume very little power when they level themselves, and that’s where MICROMO has helped.” The leveling mechanism integrates the following devices: The AM1020-V-6-65, a in a 10-mm-diameter, two- phase stepper motor that provides a peak torque of 1.6 mNm. With 20 steps per revolution, and PRECIstep technology, the motor offers reliable, accurate motion, even in harsh environments. A 10/1 planetary gearbox provides a 256:1 reduction ratio in a 10-mm- diameter package.
  • 36. Vulnerability research -We want a shell in that thing -The firmware was not easy to find in the internet -This equipment is very expensive -Not everyone can buy these things directly to the vendor, you need to be an organization/academics . -Let tell you the story about how i was be able to get the firmware …..
  • 38. WTF?
  • 42. There is backdoor, factory user is not in official documentation.
  • 43. Test some vulnerabilities.. You know.. PWD !! Shellshock
  • 44. Bugs and errors everywhere
  • 45. GURALP Systems are easy to find looking in the SSL certificate metadata in NetDB
  • 46. Ok , now we are root so .. What’s next ? PROTOCOL / COMMUNICATIONS The Standard for the Exchange of Earthquake Data (SEED) is a data format intended primarily for the archival and exchange of seismological time series data and related metadata. The format is maintained by the International Federation of Digital Seismograph Networks and documented in the SEED Manual (PDF format). Originally designed in the late 1980s, the format has been enhanced and refined a number of times and remains in widespread use.
  • 47. Data identification nomenclature The SEED format uses 4 name components to uniquely identify a time series and provide attribution to the owner of the data: Network code: a 1 or 2 character code identifying the network/owner of the data. These codes are assigned by the FDSN to provide uniqueness to seismological data, new codes may be requested. Station code: a 1 to 5 character identifier for the station recording the data. Location ID: a 2 character code used to uniquely identify different data streams at a single station. These IDs are commonly used to logically separate multiple instruments or sensor sets at a single station. Channel codes: a 3 character combination used to identify the 1) band and general sample rate 2) the instrument type and 3) the orientation of the sensor. A convention for these codes has been established and is documented in Appendix A of the SEED Manual. What if……
  • 49. Guralp systems SCREAM protocol for transmitting seismic data over the internet
  • 53. Conclusions -We are be able to locate this devices anywhere in the world -We are in control of the device , the network and the software running on it. -There is no SSL in communications -This devices help engineers to save people and understand the earth -Vendors please… code better and think in security