[go: up one dir, main page]

0% found this document useful (0 votes)
401 views54 pages

Craig Hacking Kiosks

This document discusses hacking internet kiosks. It begins by describing what an internet kiosk is and how kiosk software implements security. It then explains two common approaches to kiosk security: 1) reducing available host functionality and 2) graphically jailing the user into a secure kiosk browser. The document finds that kiosk security is based on reducing functionality, so exploiting a kiosk requires invoking additional functionality to escape the browser jail. It conducted 16 months of testing popular kiosk platforms and claims a 100% success rate in compromising them.

Uploaded by

chepimanca
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
401 views54 pages

Craig Hacking Kiosks

This document discusses hacking internet kiosks. It begins by describing what an internet kiosk is and how kiosk software implements security. It then explains two common approaches to kiosk security: 1) reducing available host functionality and 2) graphically jailing the user into a secure kiosk browser. The document finds that kiosk security is based on reducing functionality, so exploiting a kiosk requires invoking additional functionality to escape the browser jail. It conducted 16 months of testing popular kiosk platforms and claims a 100% success rate in compromising them.

Uploaded by

chepimanca
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Hacking Internet Kiosk’s

Paul Craig
Principal Security Consultant
S
Security-Assessment.com
it A t
Bio

ƒ Who am I?
ƒ Paul
P l Craig
C i
ƒ Principal Security Consultant.
Security-Assessment.com, Auckland, New Zealand

ƒ Published Security Author.


Author
ƒ Active Security Researcher.
ƒ Devoted Hacker.
Hacker

ƒ Comments, Feedback?
ƒ Email: paul@ha.cked.net
ƒ Website: http://ha.cked.net
p //
Overview

ƒ Hacking Kiosks:
ƒ What is an Internet Kiosk.
Kiosk
ƒ Kiosk Software Security Model.

ƒ Vulnerabilities in Kiosk Software.


ƒ Vulnerabilities in the Kiosk Security Model.

“Hack any Windows Kiosk in less than 120 seconds!”

ƒ Tool Release.

ƒ Live Demo’s: Hacking (Two) Commercial Internet Kiosks.


ƒ More 0day than you can shake a stick at.
What Is An Internet Kiosk
ƒ Last Year I Was Sitting in an Airport….
ƒ 8 hour stop-over in Hong Kong.
Kong
ƒ Queue of people waiting to use a hub of Internet Kiosks.

ƒ “Damn, those kiosks sure are popular…”


ƒ “I
“ wonder
d if I could
ld h
hack
k iit?.””

ƒ Kiosks are ppopular,


p , and rarelyy appear
pp in securityy publications.
p
ƒ Popularity + Poor Security Visibility = Good Attack Target

ƒ Personal Objective:
ƒ Find every possible method of hacking Internet Kiosk terminals.
ƒ Become the King of Internet Kiosk Hacking!
What Is An Internet Kiosk

ƒ Kiosks are everywhere


ƒ Airports,
Airports Train stations,
stations Libraries
Libraries, DVD Rental Stores
Stores, Corporate
Building Lobbies, Convenience Stores, Post Office, Café’s,
Hospitals, Motels, Hotels, Universities.

ƒ Cheap technology has made Internet Kiosks very common.


What Is An Internet Kiosk

ƒ Initial Observations of Kiosks

ƒ Hardware.
ƒ Kiosks
Ki k b built
ilt in
i tough
t h hard-shell
h d h ll cases.
ƒ Fibreglass, Steel, Thick MDF.
ƒ Lack of physical access to the underlying computer.
ƒ Input devices inaccessible (Floppy/DVD/USB/FireWire)
ƒ Kiosk bolted to the ground (padlocked).

ƒ General public are not trusted


trusted.
ƒ Kiosks are designed to prevent physical theft or malicious use.
What Is An Internet Kiosk

ƒ Software.
ƒ Majority of Kiosks run commercial Windows Kiosk software
software.
ƒ Linux/BSD Kiosks exist, Windows more popular.

ƒ 44 commercial Windows Kiosk products in the market.


ƒ Marketed as : “Turn that old PC into instant revenue!”
ƒ Buy $59.99 Shareware -> Install -> Instant Kiosk!

ƒ Kioskk Software
f Essentially
ll Skins
k Windows:
d
ƒ Kiosk browsers based on standard Internet Explorer libraries.
ƒ WINHTTP.DLL/MSINET.OCX

ƒ Its Windows and Internet Explorer, highly customized.


What Is An Internet Kiosk
ƒ “Kiosk Software Is The Best Attack Target.”
ƒ Hardware hacking is too obtrusive for public locations.
locations

ƒ “I Need to Walk up to Any Internet Kiosk and Pop Shell, Quickly.”


ƒ Explorer.exe, cmd.exe, command.com.
ƒ Time limited, 2 minutes or faster.

ƒ 16 Months of Kiosk Software Penetration Testing Later….


ƒ Virtualized
Vi t li d ten
t off th
the mostt popular
l Windows
Wi d Kiosk
Ki k platforms.
l tf
ƒ Researched methods of compromising each Kiosk.
ƒ Developed Kiosk Attack Methodology.

ƒ Startling Results: 100% success rate!


Kiosk Security Model
Kiosk Securityy Model
ƒ Kiosk Software Implement Security in Two Approaches.

ƒ #1 - Reduce Available Host Functionality.


ƒ Disallow native OS functionality that can be used maliciously.
ƒ “Command Prompt has been Disabled”
ƒ “File Downloads Have Been Disabled”
ƒ Implemented through native ACL’s.

ƒ #2 – Graphically
G hi ll Jailed
J il d Into
I t a ‘Secure
‘S Kiosk
Ki k Browser’.
B ’
ƒ Kiosk users are stuck inside a Kiosk browser.
ƒ Kiosk browser ran in full screen, no ability to close, minimize.
ƒ Start Bar/Tray Menu removed or hidden.
ƒ Only thing you can do is browse the web.
Kiosk Securityy Model

ƒ Example #1: Site Kiosk.


ƒ Looks similar to Windows
Windows.
ƒ Custom Tray Menu/Task Bar.
ƒ Only
O l one option,
ti ‘New
‘N Window’
Wi d ’
ƒ Real Windows ‘Start’ bar is hidden from view.
ƒ Trapped inside the Kiosk browser.
Kiosk Securityy Model

ƒ Example #2: NetStop Kiosk


ƒ Custom task bar.
bar
ƒ Kiosk application ran as a full screen desktop.
ƒ No
N ability
bilit tto close
l th
the browser.
b
ƒ Only permits internet browsing.
Kiosk Securityy Model

ƒ Kiosk Browsers Proactively Monitor Your Activity.


ƒ Kiosks contain multiple blacklists of prohibited activity.
ƒ Try to do something sneaky, the Kiosk will stop you.

ƒ Try to Browse C:\ with the Kiosk browser:

ƒ Blacklist in
in-focus
focus Modal Dialogs.
Dialogs
ƒ Block dialogs by Window Title or Window Class.
ƒ “Save
“S Fil
File A
As”,
” “O
“Open With”
With”, “Confirm
“C fi Fil
File D
Delete”,
l t ” “P
“Print”.
i t”
ƒ WM_CLOSE Window message sent to the blacklisted dialog.
ƒ Dialog closes.
Kiosk Securityy Model
ƒ API Hooking.
ƒ Hook native OS API calls which can be used maliciously
maliciously.
ƒ KillProcess(), GetCommandLineW(), AllocConsole()
ƒ “Unauthorized
Unauthorized Functionality Detected
Detected, Process Killed”
Killed .

ƒ Kiosk Browser ran in ‘High Security Zone’


ƒ File downloads disabled.
ƒ Browser scripting, pop-ups, ActiveX, all disabled.

ƒ Watchdog Timer.
ƒ Every
E 5 minutes
i the
h Kiosk
Ki k will
ill enumerate allll active
i processes.
ƒ Terminate any unauthorized activity.
Kiosk Securityy Model
ƒ Custom Keyboard Driver.
ƒ Disable Windows shortcut key combinations.
combinations
CTRL-SHIFT-ESC (Task Mgr)
ALT-TAB (Switch Task)
CTRL-ALT-DELETE (Task Mgr)
CTRL-ESC (Start Menu)
ƒ Modifier Keys Unmapped
Unmapped. Alt F4 (Close Application)
Alt-F4

ƒ CTRL, Tab, ALT, ‘Start’, Function, F1-F12.


ƒ Custom Keyboard with missing modifier keys!
ƒ Custom Mouse.
ƒ No
N right
i h click
li k button.
b

ƒ All Methods of reducing


g functionality!
y
Hacking
Ki k Software
Kiosk S ft
Hacking
g Kiosk Software

ƒ Kiosk Security Model is Based on Reducing Functionality.


ƒ Limit functionality which can be used to escape the Kiosk browser.

ƒ Exploiting A Kiosk Requires Invoking Functionality


Functionality.
ƒ Cause applications/functionality to spawn, popup on screen.
ƒ Use
U the
th invoked
i k d functionality
f ti lit to
t escape the
th Kiosk
Ki k jail.
j il
ƒ Spawn a command prompt, get back to Windows.

ƒ Kiosk Security Is Implemented Through Blacklists.


ƒ Blacklists (by nature) are never 100%.
ƒ We only need one method of escaping the software jail.
Hacking
g Kiosk Software
ƒ Lets Say You Find a Kiosk in Your Local Mall.
ƒ ‘10RM
10RM for 1 hour of internet usage
usage’
ƒ Insert money.

ƒ You Find You are Trapped Inside a Kiosk Browser.


ƒ Only one visible button to ‘Start Browsing’
ƒ Start Browsing…
Hacking
g Kiosk Software
ƒ Browse The Local File System Using The Kiosk Browser.
ƒ Local Windows users are capable of browsing the file-system
file system.
ƒ Kiosk software must explicitly block local browsing attempts.

ƒ Windows Is Designed For Idiots.


ƒ Caters for mistypes/fat-fingers.
yp / g
ƒ C:\windows\ maybe blocked.
File:/C:/windows File:/C:\windows\ File:/C:\windows/ File:/C:/windows
File://C:/windows File://C:\windows/ file://C:\windows C:/windows
C:\windows\ C:\windows C:/windows/ C:/windows\
%WINDIR% %TMP% %TEMP% %SYSTEMDRIVE%
%SYSTEMROOT% %APPDATA% %HOMEDRIVE% %HOMESHARE%

ƒ Blacklists
Bl kli t start
t t ffailing
ili about
b t now.
Hacking
g Kiosk Software
ƒ Using Common Dialogs To Hack Kiosks.
ƒ Windows contains ‘Common
Common Dialogs’
Dialogs libraries.
libraries
ƒ Saving a file, opening a file, selecting font, choosing a colour.
ƒ COMDLG32.DLL
COMDLG32 DLL (Common Windows Dialogs Library).
Library)
ƒ COMDLG32.DLL Implements Common Windows Controls.
ƒ From COMCTL32.DLL (Common
( Windows
d Controls
l Library)
b )

ƒ File/Open, File/Save Dialog’s Contain ‘File View’ Controls.


ƒ File view control provides full Explorer functionality.
ƒ Same control that Windows Explorer uses.
ƒ File-Open Dialog = Explorer
ƒ Can be used to launch processes.
Hacking
g Kiosk Software
ƒ Systematically Click Every Button, Graphic, Icon In The Kiosk
ƒ Can we invoke a File - Open Dialog? “Attach
Attach File
File”
ƒ Browse the file system
ƒ Right Click cmd.exe:
cmd exe: Open / Run As
ƒ Spawn cmd.exe
Hacking
g Kiosk Software

ƒ Internet Explorer ‘Image Toolbar’.


ƒ Toolbar hovers top-left of a large image when clicked.
clicked
ƒ Each icon of this toolbar can invoke a Common Dialog.
ƒ File/Save.
Fil /S
ƒ File/Print.
ƒ File/Mailto.
ƒ Open “My Pictures” in Explorer.

ƒ Toolbar is present if the Kiosk uses Internet Explorer libraries.

ƒ Click a large image on screen


ƒ Spawn a Common Dialog, spawn Explorer.
Hacking
g Kiosk Software

ƒ Using the Keyboard.


ƒ Keyboard shortcuts can be used to access the host OS
OS.
ƒ Check if a custom keyboard driver present?
ƒ Are
A modifier
difi keys
k enabled?
bl d?
ƒ Keyboard Combinations Which Produce Common Dialogs.
CTRL-B, CTRL-I (Favourites)
CTRL-H (History)
CTRL L CTL-0
CTRL-L, CTL 0 – (File/Open Dialog)
CTRL-P – (Print Dialog)
CTRL-S – ((Save As))
ƒ Kiosk Specific ‘Administrative’ shortcuts.
ƒ All Kiosk pproducts contain a hidden Administrative menu.
ƒ Mash the keyboard, CTRL-ALT-F8? CTRL-ESC-F9?
Hacking
g Kiosk Software
ƒ Browser Security Zones
ƒ Browser security model incorporates multiple security zones:

Restricted Sites

Internet Zone

Intranet Zone

Trusted Sites

ƒ Each security zone adheres to a different security policy.


ƒ Internet zone has less ability to interact with a host.
host
ƒ Trusted Sites, Intranet Zone typically have more access.
Hacking
g Kiosk Software
ƒ Local Users Can Access All Available Security Zones.
ƒ URL
URL’ss must be directly typed into the URL entry bar
bar.

ƒ Security Zone Escalation. about: pluggable-protocol handler.


ƒ About handler belongs to the ‘Trusted Sites’ security zone.
ƒ Suffers from a Cross Site Scripting vulnerability.
ƒ Local users can render arbitrary content within a trusted zone.

ƒ Spawn a File Open Common Dialog from a trusted security zone


zone.
about:<input%20type=file>
about:<a%20href=C:\windows\>Click-Here</a>
b %20h f C \ i d \ Cli k H /

ƒ Internet zone cannot follow links to the file system.


y
ƒ Trusted sites can.
Hacking
g Kiosk Software
ƒ Shell Protocol Handler.
ƒ Shell handler provides access to Windows web folders
folders.

ƒ Type Into the URI Bar:


ƒ Shell:Profile
ƒ Shell:ProgramFiles
ƒ Shell:System
ƒ Shell:ControlPanelFolder
ƒ Shell:Windows

ƒ Each
E h URL will
ill spawn explorer.exe
l and
d browse
b the
h web
b folder.
f ld

ƒ Is the shell: handler blocked by the Kiosk?


Hacking
g Kiosk Software

ƒ How About This:


ƒ shell:::{21EC2020-3AEA-1069-A2DD-08002B30309D}
shell:::{21EC2020 3AEA 1069 A2DD 08002B30309D}
ƒ Invoke the Windows Control Panel by ClassID.
ƒ Works
W k from
f common Internet
I t tEExplorer
l lib
libraries.
i
ƒ Bypass native ACL’s that may exist on control.exe
Hacking
g Kiosk Software
ƒ The Downside to Physical Input Vectors.
ƒ Kiosk software is designed to not trust the guy on the keyboard
keyboard.
ƒ Kiosk User = Most Obvious Security Threat.
ƒ My research concluded that physical inputs are not so successful.
successful
ƒ 40-50% chance of popping shell.
ƒ Many
M techniques
t h i are already
l d published,
bli h d unoriginal.
i i l

ƒ A Subtle Discovery…
ƒ Remote websites not factored into the Kiosk security model.
ƒ Websites are trusted MORE than a local Kiosk user!

ƒ Kiosks rely on the default web browser security model.


model
Hacking
g Kiosk Software

ƒ “I Need a Kiosk Hacking Website.”


ƒ An online tool you can visit from an Internet Kiosk terminal.
terminal
ƒ Provide all the content you will ever need to escape a Kiosk jail.

ƒ iKAT – Interactive Kiosk Attack Tool.


ƒ First of its kind! New method of hackingg Internet Kiosks!
ƒ Fast! iKAT can pop shell in less than 30 seconds.
ƒ 95
95-100%
100% success rate!

ƒ http://ikat.ha.cked.net
Hacking
g Kiosk Software
ƒ What Can iKAT Do?
ƒ Kiosk Reconnaissance : Detect Installed Applications
ƒ JavaScript & res:// (resource) protocol handler.
ƒ Extract bitmap resources from PE executables
executables.
ƒ Verify bitmap presence and detect installed applications.

ƒ Detects all common commercial Kiosk platforms.


ƒ Enumerates locallyy installed applications.
pp
Hacking
g Kiosk Software
ƒ Display Local Browser Variables.
ƒ Determine underlying Kiosk browser technology.
technology
ƒ MSINET.OCX, WINHTTP.DLL display Internet Explorer appVersion
ƒ Detect the presence of .NET
NET CLR
CLR.

ƒ Display Remote Server Variables


ƒ Discover remote IP address of the Kiosk terminal.
Hacking
g Kiosk Software
ƒ All Common Browser Dialogs In One Place

ƒ File Open, Save As, Print, Print Preview:


ƒ Click down the list and determine what dialogs are blocked.
ƒ Use the File View control within the dialogs.
Hacking
g Kiosk Software
ƒ Use Flash To Invoke Common Dialogs.
ƒ Adobe Flash is the most widely used browser plug
plug-in
in.
ƒ ActionScript 3 can invoke three unique File View dialogs.
ƒ ‘Select
Select File For Upload’
Upload
ƒ ‘Select File(s) For Upload’
ƒ ‘Select
‘S l t location
l ti for
f Download
D l d by
b ikat.ha.cked.net’
ik t h k d t’

ƒ Flash Common Dialogs have Unique Dialog Titles


ƒ Not standard “Choose File”
ƒ Bypass
ypa dialog
d a og Window
do title blacklists.
ba
ƒ Still contains the File View control.

ƒ Blacklists fail (again).


Hacking
g Kiosk Software
ƒ Spawning Applications On The Kiosk.
ƒ Can we cause an application/process to spawn on the Kiosk.
Kiosk
ƒ Does the spawned application contains a common dialog?
ƒ Use the application to gain additional access to the Kiosk.
Kiosk

ƒ iKAT Invokes Default Windows URI Handlers.


ƒ URI handler applications are spawned for each URI.
ƒ Callto://,
//, Gopher://,
p //, HCP://,
//, Telnet://,
//, TN3270://,
//, Rlogin://,
g //,
LDAP://, News://, Mailto://
ƒ One Click Automation: One click spawns all default handlers.

ƒ 3rd party URI Handlers


ƒ MMS://,
MMS:// SKYPE://
SKYPE://, SIP://
SIP://, Play://
Play://, Steam://
Steam://, Quicktime://
Hacking
g Kiosk Software
ƒ Example: HCP://: Help And Support Center
ƒ <a href
href=HCP://dummy>
HCP://dummy> Click
Click-me
me </a>
ƒ Search HCP for what you want to launch “Command Prompt”
ƒ “Using
Using Command Prompt
Prompt” provides link to spawn cmd.exe
cmd exe
ƒ Left Click Only!
Hacking
g Kiosk Software
ƒ iKAT Provides Links to Over 100 URI Handlers.
ƒ Click,
Click click,
click click down the list.
list
ƒ Determine which handlers are covered by the Kiosk blacklist.
ƒ Use invoked handler application to escape the Kiosk.
Kiosk

ƒ iKAT Contains Local Security Zone Handlers


ƒ about:, res:, shell:
ƒ Lists of URL’s to type in.
ƒ Remembering ClassID’s is hard.
Hacking
g Kiosk Software
ƒ Invoke Applications Using File Type Handlers.
ƒ Click on test.myfile,
test myfile Windows will spawn the ‘myfile’
myfile handler.
handler
ƒ iKAT uses DHTML/JavaScript to invoke 108 unique file handlers.

ƒ Internet Explorer supports prompt-less handler execution.


ƒ Example: Click test.wmv, Windows Media Player Spawns.
ƒ No Prompt “Are you sure you want to…”.

ƒ Kiosk blacklists monitor in focus dialogs for warning prompts.


Hacking
g Kiosk Software

ƒ iKAT & Windows Media Files.


ƒ WMPlayer will silently launch for multiple file types.
types
ƒ Windows Media Playlist Files (.ASX)
ƒ Supports
S t ‘W
‘Web
bEEnhanced
h d Content’.
C t t’

ƒ Turn Windows Media Player


y into a web browser!
ƒ Provides a browser without any Kiosk security controls.
Hacking
g Kiosk Software
ƒ iKAT & Office Documents.
ƒ If an Office file viewer is installed on the Kiosk,
Kiosk we win.
win
ƒ Embed a copy of cmd.exe within an office document.
ƒ Supported by .DOC,.DOCX,.XLS,.XLSB,.XLSM,XLSX
DOC DOCX XLS XLSB XLSM XLSX
ƒ ‘Open Package Contents’ dialog not detected by any Kiosk.

ƒ iKAT will spawn the most useful file possible.


Hacking
g Kiosk Software
ƒ iKAT & Java Applets:
ƒ Signed Java applets can execute local processes.
processes
ƒ Detect if JRE is installed (iKAT Kiosk Reconnaissance).
ƒ Does the Kiosk detect the Java security warning prompt?
ƒ “Warning – Security”
ƒ 0% off tested
t t d Ki
Kiosks
k did.
did

ƒ iKAT Contains
o a Signed
g d Kiosk
o Specific
p Java
a a Applets.
pp
ƒ Signed applets to spawn command shells.
ƒ Includes Jython by GNUCITIZEN.
GNUCITIZEN
Hacking
g Kiosk Software
ƒ Install a Malicious ActiveX
ƒ Safe for scripting ActiveX’s
ActiveX s can be used to compromise a Kiosk
Kiosk.
ƒ Unsafe method: object.execute(‘cmd.exe’);
ƒ Can we install a malicious ActiveX on the Kiosk?

ƒ iKAT ActiveX
ƒ Safe-for-scripting ActiveX which executes arbitrary executables.
ƒ Installingg an ActiveX requires
q administrative authority.
y
ƒ iKAT ActiveX gives you the ability to spawn a shell.

ƒ ActiveX is changing:
ƒ IE8 will not require admin rights for installing a new ActiveX.
ActiveX
Hacking
g Kiosk Software
ƒ iKAT & ClickOnce Applications
ƒ ClickOnce is .NET
NET 2.0+
2 0+ technology (.NET
( NET CLR 2+ required)
ƒ ‘Online Application Deployment’ .application file handler.
ƒ Unsigned ClickOnce applications execute with full trust!
ƒ Admin privileges are not required!

ƒ Users are warned:

ƒ All tested Kiosks fail to detect this warning message!


ƒ Modern Kiosks now developed in .NET (CLR is present!)
Hacking
g Kiosk Software
ƒ The most useful ClickOnce applications for Kiosk Hacking?

ƒ Embedded Web Browser.


ƒ HTTP browser with reduced security settings.

ƒ Application Executor.
ƒ Spawn arbitrary executables
executables.

ƒ Access Token Pincher.


ƒ Access token hijacking is a hip subject, why not!
ƒ Does the Kiosk user have the SeImpersonate privilege?
ƒ Impersonate available (privileged) tokens.
ƒ Spa
Spawn ccmd.exe
de eu under
de the
t e co
context
te t o
of tthe
epprivileged
eged to
token.
e
ƒ System shell, I win.
Hacking
g Kiosk Software
ƒ Who Here Has Ever Crashed a Web Browser?
ƒ What about crashing a Kiosk: ‘Emo-Kiosking’
Emo-Kiosking
ƒ Create an unhandled exception in a Kiosk browser.
ƒ Kiosk browser crashes
crashes, We get the desktop
desktop, We Win!
ƒ Rare situation: Application crash = highly critical vulnerability.

ƒ iKAT Contains Common Browser Crash Techniques.


ƒ Published
P bli h d exploits
l it which
hi h results
lt in
i a crash.
h
ƒ Fastest, easiest method of escaping a Kiosk.
ƒ Fairly reliable, 40%-50% of tested Kiosks crash.

ƒ Kiosks crash, or reboot.


Hacking
g Kiosk Software
ƒ Crashing Browser Plug-ins.
ƒ “Can
Can I create a .SWF
SWF file that can reliably crash a browser?”
browser?
ƒ Sequential byte file format fuzzing of the .SWF format.
ƒ Found multiple unhandled exception situations
situations.
ƒ Integer Divide By Zero.
ƒ Immediately
d l un-exploitable,
l bl reliably
l bl crash
h any browser.
b

ƒ Created ‘iKAT Auto Magic Flash Crasher’.

ƒ Is the Flash Plug


Plug-in
in Installed on The Kiosk?
ƒ iKAT can crash it, guaranteed, oh-day magic.
ƒ Adobe have resolved this issue in Flash Player 10 RC.
RC
Downloading
g Tools
ƒ Lets Assume Something Worked.
ƒ You have access to the Kiosk File system
system.
ƒ Command shell spawned, Common Dialog, Java installed, etc

ƒ What Now?
ƒ Download additional tools/binaries.
tools/binaries

ƒ How Do You Download Files In a Tool-less Environment.


ƒ Kiosk terminal will not have a copy of wget.exe present.
ƒ Internet Explorer is likely uninstalled or disabled.
ƒ File downloads disabled.
Downloading
g Tools
ƒ Old School: Downloading Files In Windows:
ƒ Using Common Dialogs
ƒ ‘Attach’ a remote file from a File-Open dialog.
ƒ FPSE/WebDAV to save the file locally
locally, and attach it
it.

ƒ Works
k From Any File->Open
l Dialog.
l
ƒ File saved in a writeable location.
ƒ Temporary internet files.
ƒ Downloads any file type/size.
Downloading
g Tools
ƒ Use Flash To Download Files.
ƒ Most Kiosk’s
Kiosk s disable File Downloads with browser security policy
policy.
ƒ IE: Tools -> Internet Options -> Custom Level

ƒ Flash can be used to circumvent the browser policy.


ƒ Download method of the FileReference() object.
ƒ Flash does not validate browser security policy.

ƒ Very high success rate against Kiosks.


ƒ Another unpublished oh
oh-day
day trick.
trick
Downloading
g Tools

ƒ Notepad Can Download and Upload Files.

ƒ File-> Open
ƒ http://test.com/trojan.txt
htt //t t /t j t t
ƒ Content must be 7bit safe.

ƒ File-> Save
ƒ Upload content to a remote site.
ƒ FPSE/WebDav
ƒ http://www.ok.com/blah.txt
http://www ok com/blah txt

ƒ Quickly upload files from a Kiosk.


Kiosk
Downloading
g Tools

ƒ #1 Problem: Kiosk Hacking is a Tool less Environment


ƒ “iKAT
iKAT needs to provide tools for Kiosk hacking
hacking”.

ƒ Assorted Kiosk Hacking Tools:

ƒ Tools available as
ƒ .exe, .zip, Flash Download, 7bit Safe VBScript (.VBS/.VBE)!
Downloading
g Tools
ƒ Command Shell Detours:
ƒ How many ways to spawn a command shell on Windows?
cmd.exe command.com win.com cmd.exe win.com command.com
Loadfix.com start.exe sc create testsvc binpath= loadfix.com cmd.exe loadfix.com command.com
"cmd
cmd /K start
start" type
type= own
type= interact
start loadfix.com cmd.exe start loadfix.com start loadfix.com %COMSPEC%
command.com cmd.exe

ƒ Win.com? Loadfix.com? Start? Combinations of both?


ƒ Kiosk ACL’s typically
yp y block cmd.exe from spawning.
p g
ƒ What about command.com, win.com?

ƒ CMD Detours attempts 17 methods of invoking a shell.


ƒ Flawless at bypassing Kiosk ACL’s.
iKAT Reloaded

ƒ Officially Released at Defcon 16 Las Vegas.


ƒ Amazing success!
ƒ iKAT can pop shell on ANY Vegas Kiosk < 10 seconds

ƒ Who’s Been Using iKAT?


ƒ 14,000+
14 000+ unique hits,
hits 10-15%
10 15% of requests from Kiosks!
ƒ reception.sitekiosk.com, comm775-kiosknet-dhcp8.bu.edu & comm685-kiosknet-dhcp74.bu.edu
ƒ 12-46-54-181.seatac.seattwa.wayport.net, Aoc.ppx-bc2.hqda-aoc.army.pentagon.mil
ƒ Digger2.defence.gov.au,
Digger2 defence gov au Radisson-hotel-19.lax.customer.centurytel.net
Radisson-hotel-19 lax customer centurytel net
ƒ Security-lab1.juniper.net, Lan-116.181.coresecurity.com
ƒ Ustdc1.deloitte.com, Deloitteservices.deloitte.nl, Dh212.public.mod.uk

ƒ iKAT Portable Now Available!


ƒ Entire iKAT website in a zipp file
ƒ Useful for offsite penetration testers.
Pwnage!
g

Hacking
g Kiosks : The Demo’s
ƒ Two virtualized (commercial) Kiosk products.
ƒ Recommended Kiosk application configuration.
ƒ Default Windows XP install.

ƒ Using iKAT To Pop a Command shell


ƒ As Fast As Possible!
Conclusion

Questions?
Email me:

paul@ha.cked.net
paul.craig@security-assessment.com

You might also like