Besides conference sessions, DefCamp 2016 also ran various competitions in the hacking village. I wandered about the critical infrastructure area - an amazing model kit of a train, station, and solar panels all controlled by Siemens and Schneider PLCs - but mostly, of course, at the IoT village.
Illustration 1. Critical Infrastructure village with model kit, PLCs, and SCADA supervision monitor
At the IoT village, several connected devices were available to be hacked: web cameras, a water sensor, a coffee maker... I lost some time on the Foscam IP camera, and then on the coffee maker.
Illustration 2. Available devices at the IoT Village. Note the IP addresses are private to the IoT village LAN.
Is it connected?
I started scanning the coffee maker’s IP address for open ports, but was quite unlucky:
I did what it said and tried with -Pn, but with not much more success:
Something's there, but no open ports so far.
So, I decided to have a look at the mobile application. I downloaded and installed the app, but was unable to connect to the coffee pot.
Illustration 3: Smarter Coffee Maker Android application
Making coffee with Python
At that time, I was mentally getting prepared to reversing the mobile application. But never do what others have already done: on the web, I bumped into a very nice Python script of Simone 'evilsocket' Margaritelli controlling the coffee maker.
Reading the code, I saw the program was connecting to the coffee pot on port 2081:
Does my coffee machine respond on that port?
Yes, it does :) My former port scans hadn't scanned up to that port number, which explained why I hadn't seen it.
I gave Simone's script a try, and it worked perfectly well:
Illustration 4. Controlling the coffee maker remotely using Simone Margaritelli's Python tool.
Illustration 6 Coffee currently brewing! I hope somebody drank it, I made several cups ;)
From this point, I decided to edit Simone's Python code and insert my own hacks. We're following responsible disclosure at Fortinet, so I won't be telling you what I did as we've just contacted the vendor. What I'll just tell you is that the vulnerability puts the coffee maker out of service:
Illustration 7. Coffee maker hack in action (Denial of Service)
Initially, the coffee maker works and responds to commands (see Illustration 4). I run my hack, and the socket times out: the coffee maker no longer responds (see Illustration 7). As a matter of fact, it won't respond to any more commands unless you reboot it. No more coffee ;) Denial of Service.
Important note: Simone Margaritelli's script is not malicious + does not implement the vulnerability. I used it as a canvas, and inserted the implementation of my own hack inside it. I could have written a standalone tool but I ran for a quick implementation...
Hacked for fun - but no prize :(
I showed my vulnerability live to the organizers, but unfortunately, as the contest was closing minutes later they told me I would not have time to write up my results (note: the contest rules did not specify I had to do that) and told me they would not validate my hack! Hmmm :(
Also, I found out that another competitor had found another vulnerability on the coffee maker before me, so it was fair he'd get the prize. I hacked the coffee maker for fun mainly, but would have loved to bring one back to my colleagues (I don't drink coffee myself!). Nevertheless, it was a bit disappointing not to get even a small "consolation" prize. As far as I know, only 3 vulnerabilities - mine included - were found during the whole contest. I should have "deserved" "something," a sticker, I don't know. Right?
You're organizing a contest? Think about it next time. :)
-- the Crypto Girl