Wednesday, March 27, 2019

The Grinder for SD-WAN

Internet-connected Devices Census Python Framework by Anton Nikolaev

Special release for insomnihack 2019.

The Grinder framework was created to automatically enumerate and fingerprint different hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks. The Grinder framework can be used in many different areas of researches, as a connected Python module in your own project or as an independent ready-to-use from the box tool.

Saturday, December 29, 2018

35C3 talk and metasploit releases

Refreshing memories of Chaos Communication Congress SD-WAN New Hop talk.

35C3 talk video and exploits for SD-WAN.

Citrix Netscaler SD-WAN #metasploit module. Remote command execution -> root.

Tuesday, December 4, 2018

#scada #energy #automotive #cybersec

Worth reading on #scada #energy #automotive #cybersec. Talks and research paper by Dmitry Sklyar on security of Electric Vehicle, ChargePoint Home charging station.

Wednesday, November 21, 2018

SD-WAN and Elon Musk at #zeronights

The goal of this talk is to provide the results of passive and active fingerprinting for SD-WAN systems using a common threat intelligence approach. We explore Internet-based and cloud-based publicly available SD-WAN systems using the well-known «Shodan» and «Censys» search engines and custom developed automation tools and show that most of the SD-WAN systems have known vulnerabilities related to outdated software and insecure configuration. 

As presented at Zeronights 2018 by Anton Nikolaev, Denis Kolegov, Oleg Broslavsky.

Monday, November 12, 2018

SD-WAN Threat Landscape

The goal of this paper is to understand SD-WAN threats using practical approach. We describe basic SD-WAN features and components, investigate an attack surface, explore various vendor features and their security, explain threats and vulnerabilities found in SD-WAN products. We also extend existing SDN threat models by describing new potential threats and attack vectors, provide examples, and consider high-level approaches for their mitigations.

Wednesday, November 7, 2018

WebGoat.SDWAN.Net in Depth

SD-WAN New Hop talk by Denis Kolegov, Oleg Broslavsky as presented at Power of Community 2018 conference, Seoul, Korea. [1] [2]

In this presentation, we disclose a set of vulnerabilities in widespread and most popular SD-WAN products including Citrix NetScaler and Silver Peak EdgeConnect. We present the new results of our research, consider some technical details of the insecure design and found vulnerabilities, and describe different attack scenarios that may allow an attacker to compromise SD-WAN control and data planes.