SlideShare a Scribd company logo
*AllpicturesaretakenfromDr
StrangeLovemovieandother
Internets
Sergey Gordeychik
Aleksandr Timorin
Gleb Gritsai
SCADA STRANGELOVE
SCADA.SL
 Group of security researchers focused on ICS/SCADA
to save Humanity from industrial disaster
and to keep Purity Of Essence
Alexander Timorin
Alexander Tlyapov
Alexander Zaitsev
Alexey Osipov
Andrey Medov
Artem Chaykin
Denis Baranov
Dmitry Efanov
Dmitry Nagibin
Dmitry Serebryannikov
Dmitry Sklyarov
Evgeny Ermakov
Gleb Gritsai
Ilya Karpov
Ivan Poliyanchuk
Kirill Nesterov
Roman Ilin
Sergey Bobrov
Sergey Drozdov
Sergey Gordeychik
Sergey Scherbel
Timur Yunusov
Valentin Shilnenkov
Vladimir Kochetkov
Vyacheslav Egoshin
Yuri Goltsev
Yuriy Dyachenko
Aleksandr Timorin
ICS security researcher
Industrial protocols fan and 0-day PLC hunter
SCADAStrangeLove team member
The Ocean band fan
atimorin
atimorin@protonmail.ch
 ICS basics 101
 Vulnerabilities
• Input validation
• Design and architecture
 Safety and security as a whole
What is ICS world and why we should develop carefully
 Today is the digital era (welcome back captain obvious!)
 Automated processes is everywhere – from home
automation to big energy plants, from brewery to traffic
control systems
What is ICS world and why we should develop carefully
 Industry automatization processes becoming more
comfortably for engineers and operators
What is ICS world and why we should develop carefully
 Switching from analog to digital brings old and absolutely not
secure software development process
What type of ICS products are vulnerable:
• Client/Server software
• Field devices: RTU, PLC, protective relays, power meters,
converters, actuators and so on
• Network switches, gateways
• GSM/GPRS modems, wireless AP
• Mobile applications
• Industrial protocols
• Human factor
Analytics and statistics of ICS vulnerabilities
• Analyzed CVE since ~2010
• Data source: ics-cert.us-cert.gov
• CVE details: NVD
• Total unique CVE: 689
• CVSS 2.0: min score 1.7 , max score 10.0 , avg score 6.5 ,
high and critical count of scores 285 (41%)
Analytics and statistics of ICS vulnerabilities
• CWE statistics:
CWE - Common Weakness Enumeration
Definitions and full detailed description at
https://nvd.nist.gov/cwe.cfm
Unique number of CWE = 43
Analytics and statistics of ICS vulnerabilities
• CWE statistics (TOP 20):
$ sort cwe.all.raw | uniq -c | sort –nr | head -20
Analytics and statistics of ICS vulnerabilities
• CWE statistics (TOP 20):
Buffer Errors
Information Leak / Disclosure
Input Validation
Permissions, Privileges, and
Access ControlXSSCryptographic Issues
Credentials Management
Resource Management Errors
Path Traversal
Authentication Issues
Use of Hard-coded
Credentials
CSRF
Improper Access Control
SQL Injection
Unrestricted Upload of File
with Dangerous Type
Untrusted Search Path
Security Features
Code Injection
NULL Pointer Dereference
Numeric Errors
Other (after TOP20)
Safety vs Security: How to Create Insecure Safety-Critical System
• Honeywell EPKS, CVE-2014-9189
• Honeywell EPKS, CVE-2014-9187
• cb is a buffer size
Safety vs Security: How to Create Insecure Safety-Critical System
• SpiderControl SCADA Web Server, stack-based bof, CVE-
2015-1001
• Siemens SIPROTEC 7SJ64 (protective relay) XSS
• Siemens WinCC
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
PLC
1
PLC
2
PLC
3
Some
networks
WinCC
Web-Client
WinCC
SCADA-
Clients
WinCC
SCADA-
Client +Web-
Server
WinCC
DataMonitor
WinCC
Web-Client
WinCC
DataMonitor
WinCC
Servers
LA
N
PROFINET
PROFIBU
S
Internet, corp
lan, vpn’s
Engineering station
(TIA portal/PCS7)
WinCCExplorer.exe/PdlRt.exe
Create and use your own security features
Instead of standard features – that’s
A bad idea!
• Hardcodes are for protocols with auth: SNMP, telnet, HTTP,
etc.
• You can hardcode keys, certificates, passwords
• SMA Sunny WebBox
• Siemens SIPROTEC 4 protective relay confirmation code
“311299”:
- System log
- Device info
- Stack and other
parts of memory
- More ?
• Siemens SIPROTEC 4 protective relay confirmation code
“311299”:
“SIPROTEC 4 and SIPROTEC Compact devices allow the
display of extended internal statistics and test information…
To access this information, the confirmation code “311299” needs
to be provided when prompted.”
“...Siemens does not publish official documentation on these
statistics. It is strongly recommended to work together with
Siemens SIPROTEC customer care or commissioning experts to
retrieve and interpret the statistics and test information...”
• Siemens S7-1200 PLC, CVE-2014-2252
“An attacker could cause the device to go into defect mode if
specially crafted PROFINET packets are sent to the device. A
cold restart is required to recover the system. ”
Just “set” PROFINET request: set network info (ip, netmask,
gateway) with all zero values.
Not secure by design: default credentials, autocomplete
• Defaults, factory settings (sometimes unchangeable) is
everywhere
SCADA StrangeLove Default/Hardcoded Passwords List
https://github.com/scadastrangelove/SCADAPASS
KIOSK mode:
Limit access to OS
functions
KIOSK mode: Limit access to OS functions
• Wincc accounts: “secret” crypto key
• WinCC accounts: “secret” crypto key fixed
• It’s XOR, they should not bother hardcoding for XOR
PLC password “encryption”
Password (8 bytes)
• TIA Portal PEData.plf passwords history
• Winccwebbridge.dll: please hash your hardcoded account
• Siemens S7-1200, S7-1500 PLC, CVE-2014-2250, CVE-
2014-2251
• Siemens S7-1200, S7-1500 PLC, CVE-2014-2250, CVE-
2014-2251
• Seed = plc_start_time + const
Target – Siemens S7-1200 PLC
Profinet “feature” and PRNG vulnerability - real attack vector.
Result - PLC takeover.
- Hash passwords
- SHA is not good enough
- Put length of plaintext nearby
Redbox_value = len(pwd)*2+1
Architecture looks like ideal (from developers point of view)
Reality looks like ideal too (from attacker point of view)
Reality looks like ideal too (from attacker point of view)
Many vendors tend to develop bicycles own services (ftp,
telnet, ssh, http etc.)
Guten Tag WinCC:
• WinCC Server
Windows/MSSQL based SCADA
• WinCC Client (HMI)
WinCC runtime + project
• WinCC Web Server (WebNavigator)
IIS/MSSQL/ASP/ASP.NET/SOAP
• WinCC WebClient (HMI)
ActiveX/HTML/JS
Third-party services:
• deploying with default and example.config configurations (i.e.
lot of busybox based devices with default root account)
• No patches and updates
Mirai DDos botnet
DVR, NVR, IP cameras
Over 0.5 million IoT devices are vulnerable
What’s the problem? Hardcoded root:xc3511
Moreover, not so easy to change it
Safety vs Security: How to Create Insecure Safety-Critical System
to get firmware?
to get debug symbols?
to debug?
..PowerPC
no “operation system”
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
― Interlocking security (by Jakob Lyng Petersen)
• Trains must not collide
• Trains must not derail
• Trains must not hit person working the tracks
—Sadly, animals can’t handle the interview
― Formal methods and verification (rtfm)
• B Method, Event B
—Underground rail network in Beijing, Milan and Sao Paulo
• Prover.com
—Sweden, USA
― Safety critical systems
― Abstract machines + formal methods
― Atelier B
• Available IDE and C translator
• No Ada translator
― Newer version – Event-B
• See Rodin framework
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
• “Everything will be C in the end. If it's not C, it's not the end.”
– almost John Lennon
― KVB: Alstom
• Automatic Train Protection for the French railway company (SNCF),
installed on 6,000 trains since 1993
—60,000 lines of B; 10,000 proofs; 22,000 lines of Ada
― SAET METEOR: Siemens Transportation Systems
• Automatic Train Control: new driverless metro line 14 in Paris (RATP),
1998. 3 safety-critical software parts: onboard, section, line
—107,000 lines of B; 29,000 proofs; 87,000 lines of Ada
― Roissy VAL: ClearSy (for STS)
• Section Automatic Pilot: light driverless shuttle for Paris-Roissy airport
(ADP), 2006
—28,000+155,000 lines of B; 43,000 proofs; 158,000 lines of Ada
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
• RTFM
• SSDLC
• ICS best practices
• Follow CERTs
• Common Weakness Enumeration at cwe.mitre.org
• More practice: OWASP TOP 10
• TESTING TESTING AND TESTING AGAIN!
Mr. ICS developer, are you creating your products within
SSDLC concepts?
*Allpicturesaretakenfrom
googleandotherInternets
Alexander Timorin
Alexander Tlyapov
Alexander Zaitsev
Alexey Osipov
Andrey Medov
Artem Chaykin
Denis Baranov
Dmitry Efanov
Dmitry Nagibin
Dmitry Serebryannikov
Dmitry Sklyarov
Evgeny Ermakov
Gleb Gritsai
Ilya Karpov
Ivan Poliyanchuk
Kirill Nesterov
Roman Ilin
Sergey Bobrov
Sergey Drozdov
Sergey Gordeychik
Sergey Scherbel
Timur Yunusov
Valentin Shilnenkov
Vladimir Kochetkov
Vyacheslav Egoshin
Yuri Goltsev
Yuriy Dyachenko

More Related Content

PPTX
Attacking SCADA systems: Story Of SCADASTRANGELOVE
PPTX
Industrial protocols for pentesters
PPTX
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
PDF
Scada deep inside: protocols and security mechanisms
PDF
SCADA deep inside:protocols and software architecture
PDF
Techniques of attacking ICS systems
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
PPTX
Alexander Timorin, Dmitry Efanov. Industrial protocols for pentesters
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Industrial protocols for pentesters
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
Scada deep inside: protocols and security mechanisms
SCADA deep inside:protocols and software architecture
Techniques of attacking ICS systems
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
Alexander Timorin, Dmitry Efanov. Industrial protocols for pentesters

What's hot (20)

PDF
Greater China Cyber Threat Landscape - ISC 2016
PDF
Man in the middle attacks on IEC 60870-5-104
PDF
Scada Strangelove - 29c3
PDF
Kaspersky SAS SCADA in the Cloud
PDF
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
ODP
Scada Security & Penetration Testing
PDF
SCADA StrangeLove 2: We already know
PPTX
Industrial protocols for pentesters
PPTX
SCADA Strangelove: взлом во имя
PDF
SCADA deep inside: protocols and security mechanisms
PDF
Security testing in critical systems
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
PDF
Improving SCADA Security
PDF
BruCON 2015 - Pentesting ICS 101
PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PDF
Adventures in Femtoland: 350 Yuan for Invaluable Fun
PDF
Johannes Klick, Daniel Marzin. Find Them, Bind Them - Industrial Control Syst...
PPTX
Recon: Hopeless relay protection for substation automation
PPTX
Protecting Your DNP3 Networks
PDF
SCADA hacking industrial-scale fun
Greater China Cyber Threat Landscape - ISC 2016
Man in the middle attacks on IEC 60870-5-104
Scada Strangelove - 29c3
Kaspersky SAS SCADA in the Cloud
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Scada Security & Penetration Testing
SCADA StrangeLove 2: We already know
Industrial protocols for pentesters
SCADA Strangelove: взлом во имя
SCADA deep inside: protocols and security mechanisms
Security testing in critical systems
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
Improving SCADA Security
BruCON 2015 - Pentesting ICS 101
D1 t1 t. yunusov k. nesterov - bootkit via sms
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Johannes Klick, Daniel Marzin. Find Them, Bind Them - Industrial Control Syst...
Recon: Hopeless relay protection for substation automation
Protecting Your DNP3 Networks
SCADA hacking industrial-scale fun
Ad

Viewers also liked (20)

PDF
Programmable logic controller - Siemens S7-1200
PDF
Jy997 d22101 b[1]
PPSX
Snmp Opc Server from Transcend Automation
DOCX
Directories description
PDF
SCADA StrangeLove Practical security assessment of European Smartgrid
PPTX
Распространенные виды мошеннических атак
PPT
Linux shell scripting
DOC
How to set up opc with simatic net
PDF
Guide to industrial control systems (ics) security
PDF
Security Questions Considered Harmful
PPT
Security Considerations in Process Control and SCADA Environments
PPTX
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
PPTX
SCADA Security in CDIC 2009
PDF
SIL in der Praxis (GER)
DOC
Resume_Sanjeeth_PLC_Safety_DCS_Engg_3.6+yrs
PPT
The Smithsonian Institution Libraries' Digital Library
PDF
Giao trinh tia
PDF
Engineering tools simatic software
PPTX
Using Assessment Tools on ICS (English)
PDF
Simatic programming-with-step-7
Programmable logic controller - Siemens S7-1200
Jy997 d22101 b[1]
Snmp Opc Server from Transcend Automation
Directories description
SCADA StrangeLove Practical security assessment of European Smartgrid
Распространенные виды мошеннических атак
Linux shell scripting
How to set up opc with simatic net
Guide to industrial control systems (ics) security
Security Questions Considered Harmful
Security Considerations in Process Control and SCADA Environments
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
SCADA Security in CDIC 2009
SIL in der Praxis (GER)
Resume_Sanjeeth_PLC_Safety_DCS_Engg_3.6+yrs
The Smithsonian Institution Libraries' Digital Library
Giao trinh tia
Engineering tools simatic software
Using Assessment Tools on ICS (English)
Simatic programming-with-step-7
Ad

Similar to Safety vs Security: How to Create Insecure Safety-Critical System (20)

PDF
"The Great Train Cyber Robbery" SCADAStrangeLove
PDF
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
PDF
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
PDF
Positive Technologies - S4 - Scada under x-rays
PPTX
Industrial protocols for pentesters
PDF
PT-DTS SCADA Security using MaxPatrol
PDF
practical-guide-to-opcua.pdf
PDF
Nozomi Networks SCADAguardian - Data-Sheet
PPTX
ICS Security 101 by Sandeep Singh
PDF
The Great Train Robbery: Fast and Furious
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PDF
OT Security - h-c0n 2020
PPTX
S4x19 Stage 2 Making Power System Cybersecurity Part of the Engineering Process
DOC
PDF
Tài liệu Keysight_Riscure Introduction.pdf
PPTX
Python on Rails - Victory Levy
PDF
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
PPTX
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
PPT
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
"The Great Train Cyber Robbery" SCADAStrangeLove
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
Positive Technologies - S4 - Scada under x-rays
Industrial protocols for pentesters
PT-DTS SCADA Security using MaxPatrol
practical-guide-to-opcua.pdf
Nozomi Networks SCADAguardian - Data-Sheet
ICS Security 101 by Sandeep Singh
The Great Train Robbery: Fast and Furious
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
OT Security - h-c0n 2020
S4x19 Stage 2 Making Power System Cybersecurity Part of the Engineering Process
Tài liệu Keysight_Riscure Introduction.pdf
Python on Rails - Victory Levy
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM

Recently uploaded (20)

PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Introduction to Effective Communication.pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
An Unlikely Response 08 10 2025.pptx
PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
worship songs, in any order, compilation
PPTX
The spiral of silence is a theory in communication and political science that...
PPTX
nose tajweed for the arabic alphabets for the responsive
The Effect of Human Resource Management Practice on Organizational Performanc...
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Introduction to Effective Communication.pptx
Learning-Plan-5-Policies-and-Practices.pptx
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
An Unlikely Response 08 10 2025.pptx
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
Tour Presentation Educational Activity.pptx
Relationship Management Presentation In Banking.pptx
Hydrogel Based delivery Cancer Treatment
2025-08-10 Joseph 02 (shared slides).pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Impressionism_PostImpressionism_Presentation.pptx
oil_refinery_presentation_v1 sllfmfls.pdf
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
_ISO_Presentation_ISO 9001 and 45001.pptx
Tablets And Capsule Preformulation Of Paracetamol
worship songs, in any order, compilation
The spiral of silence is a theory in communication and political science that...
nose tajweed for the arabic alphabets for the responsive

Safety vs Security: How to Create Insecure Safety-Critical System

  • 2.  Group of security researchers focused on ICS/SCADA to save Humanity from industrial disaster and to keep Purity Of Essence Alexander Timorin Alexander Tlyapov Alexander Zaitsev Alexey Osipov Andrey Medov Artem Chaykin Denis Baranov Dmitry Efanov Dmitry Nagibin Dmitry Serebryannikov Dmitry Sklyarov Evgeny Ermakov Gleb Gritsai Ilya Karpov Ivan Poliyanchuk Kirill Nesterov Roman Ilin Sergey Bobrov Sergey Drozdov Sergey Gordeychik Sergey Scherbel Timur Yunusov Valentin Shilnenkov Vladimir Kochetkov Vyacheslav Egoshin Yuri Goltsev Yuriy Dyachenko
  • 3. Aleksandr Timorin ICS security researcher Industrial protocols fan and 0-day PLC hunter SCADAStrangeLove team member The Ocean band fan atimorin atimorin@protonmail.ch
  • 4.  ICS basics 101  Vulnerabilities • Input validation • Design and architecture  Safety and security as a whole
  • 5. What is ICS world and why we should develop carefully  Today is the digital era (welcome back captain obvious!)  Automated processes is everywhere – from home automation to big energy plants, from brewery to traffic control systems
  • 6. What is ICS world and why we should develop carefully  Industry automatization processes becoming more comfortably for engineers and operators
  • 7. What is ICS world and why we should develop carefully  Switching from analog to digital brings old and absolutely not secure software development process
  • 8. What type of ICS products are vulnerable: • Client/Server software • Field devices: RTU, PLC, protective relays, power meters, converters, actuators and so on • Network switches, gateways • GSM/GPRS modems, wireless AP • Mobile applications • Industrial protocols • Human factor
  • 9. Analytics and statistics of ICS vulnerabilities • Analyzed CVE since ~2010 • Data source: ics-cert.us-cert.gov • CVE details: NVD • Total unique CVE: 689 • CVSS 2.0: min score 1.7 , max score 10.0 , avg score 6.5 , high and critical count of scores 285 (41%)
  • 10. Analytics and statistics of ICS vulnerabilities • CWE statistics: CWE - Common Weakness Enumeration Definitions and full detailed description at https://nvd.nist.gov/cwe.cfm Unique number of CWE = 43
  • 11. Analytics and statistics of ICS vulnerabilities • CWE statistics (TOP 20): $ sort cwe.all.raw | uniq -c | sort –nr | head -20
  • 12. Analytics and statistics of ICS vulnerabilities • CWE statistics (TOP 20):
  • 13. Buffer Errors Information Leak / Disclosure Input Validation Permissions, Privileges, and Access ControlXSSCryptographic Issues Credentials Management Resource Management Errors Path Traversal Authentication Issues Use of Hard-coded Credentials CSRF Improper Access Control SQL Injection Unrestricted Upload of File with Dangerous Type Untrusted Search Path Security Features Code Injection NULL Pointer Dereference Numeric Errors Other (after TOP20)
  • 15. • Honeywell EPKS, CVE-2014-9189
  • 16. • Honeywell EPKS, CVE-2014-9187
  • 17. • cb is a buffer size
  • 19. • SpiderControl SCADA Web Server, stack-based bof, CVE- 2015-1001
  • 20. • Siemens SIPROTEC 7SJ64 (protective relay) XSS
  • 25. WinCCExplorer.exe/PdlRt.exe Create and use your own security features Instead of standard features – that’s A bad idea!
  • 26. • Hardcodes are for protocols with auth: SNMP, telnet, HTTP, etc. • You can hardcode keys, certificates, passwords • SMA Sunny WebBox
  • 27. • Siemens SIPROTEC 4 protective relay confirmation code “311299”: - System log - Device info - Stack and other parts of memory - More ?
  • 28. • Siemens SIPROTEC 4 protective relay confirmation code “311299”: “SIPROTEC 4 and SIPROTEC Compact devices allow the display of extended internal statistics and test information… To access this information, the confirmation code “311299” needs to be provided when prompted.” “...Siemens does not publish official documentation on these statistics. It is strongly recommended to work together with Siemens SIPROTEC customer care or commissioning experts to retrieve and interpret the statistics and test information...”
  • 29. • Siemens S7-1200 PLC, CVE-2014-2252 “An attacker could cause the device to go into defect mode if specially crafted PROFINET packets are sent to the device. A cold restart is required to recover the system. ” Just “set” PROFINET request: set network info (ip, netmask, gateway) with all zero values.
  • 30. Not secure by design: default credentials, autocomplete • Defaults, factory settings (sometimes unchangeable) is everywhere SCADA StrangeLove Default/Hardcoded Passwords List https://github.com/scadastrangelove/SCADAPASS
  • 31. KIOSK mode: Limit access to OS functions
  • 32. KIOSK mode: Limit access to OS functions
  • 33. • Wincc accounts: “secret” crypto key
  • 34. • WinCC accounts: “secret” crypto key fixed • It’s XOR, they should not bother hardcoding for XOR
  • 36. • TIA Portal PEData.plf passwords history
  • 37. • Winccwebbridge.dll: please hash your hardcoded account
  • 38. • Siemens S7-1200, S7-1500 PLC, CVE-2014-2250, CVE- 2014-2251
  • 39. • Siemens S7-1200, S7-1500 PLC, CVE-2014-2250, CVE- 2014-2251 • Seed = plc_start_time + const
  • 40. Target – Siemens S7-1200 PLC
  • 41. Profinet “feature” and PRNG vulnerability - real attack vector. Result - PLC takeover.
  • 42. - Hash passwords - SHA is not good enough - Put length of plaintext nearby Redbox_value = len(pwd)*2+1
  • 43. Architecture looks like ideal (from developers point of view)
  • 44. Reality looks like ideal too (from attacker point of view)
  • 45. Reality looks like ideal too (from attacker point of view)
  • 46. Many vendors tend to develop bicycles own services (ftp, telnet, ssh, http etc.) Guten Tag WinCC: • WinCC Server Windows/MSSQL based SCADA • WinCC Client (HMI) WinCC runtime + project • WinCC Web Server (WebNavigator) IIS/MSSQL/ASP/ASP.NET/SOAP • WinCC WebClient (HMI) ActiveX/HTML/JS
  • 47. Third-party services: • deploying with default and example.config configurations (i.e. lot of busybox based devices with default root account) • No patches and updates
  • 48. Mirai DDos botnet DVR, NVR, IP cameras Over 0.5 million IoT devices are vulnerable What’s the problem? Hardcoded root:xc3511 Moreover, not so easy to change it
  • 50. to get firmware? to get debug symbols? to debug? ..PowerPC no “operation system”
  • 53. ― Interlocking security (by Jakob Lyng Petersen) • Trains must not collide • Trains must not derail • Trains must not hit person working the tracks —Sadly, animals can’t handle the interview ― Formal methods and verification (rtfm) • B Method, Event B —Underground rail network in Beijing, Milan and Sao Paulo • Prover.com —Sweden, USA
  • 54. ― Safety critical systems ― Abstract machines + formal methods ― Atelier B • Available IDE and C translator • No Ada translator ― Newer version – Event-B • See Rodin framework
  • 57. • “Everything will be C in the end. If it's not C, it's not the end.” – almost John Lennon
  • 58. ― KVB: Alstom • Automatic Train Protection for the French railway company (SNCF), installed on 6,000 trains since 1993 —60,000 lines of B; 10,000 proofs; 22,000 lines of Ada ― SAET METEOR: Siemens Transportation Systems • Automatic Train Control: new driverless metro line 14 in Paris (RATP), 1998. 3 safety-critical software parts: onboard, section, line —107,000 lines of B; 29,000 proofs; 87,000 lines of Ada ― Roissy VAL: ClearSy (for STS) • Section Automatic Pilot: light driverless shuttle for Paris-Roissy airport (ADP), 2006 —28,000+155,000 lines of B; 43,000 proofs; 158,000 lines of Ada
  • 61. • RTFM • SSDLC • ICS best practices • Follow CERTs • Common Weakness Enumeration at cwe.mitre.org • More practice: OWASP TOP 10 • TESTING TESTING AND TESTING AGAIN!
  • 62. Mr. ICS developer, are you creating your products within SSDLC concepts?
  • 63. *Allpicturesaretakenfrom googleandotherInternets Alexander Timorin Alexander Tlyapov Alexander Zaitsev Alexey Osipov Andrey Medov Artem Chaykin Denis Baranov Dmitry Efanov Dmitry Nagibin Dmitry Serebryannikov Dmitry Sklyarov Evgeny Ermakov Gleb Gritsai Ilya Karpov Ivan Poliyanchuk Kirill Nesterov Roman Ilin Sergey Bobrov Sergey Drozdov Sergey Gordeychik Sergey Scherbel Timur Yunusov Valentin Shilnenkov Vladimir Kochetkov Vyacheslav Egoshin Yuri Goltsev Yuriy Dyachenko