SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
FFRI,Inc.
1
Monthly Research
Security of Windows 10 IoT Core
FFRI, Inc.
http://www.ffri.jp
Ver 1.00.01
FFRI,Inc.
Introduction
• Windows 10 IoT is successor platform of Windows Embedded
that optimized for embedded devices.
• Windows 10 IoT Core Insider Preview has been provided for
single-board computers such as the Raspberry Pi 2.
• We show tutorial about security of Windows 10 IoT Core
using the Raspberry Pi 2.
* This report describes about preview version of Windows 10
IoT Core. So it may be different in official release.
2
FFRI,Inc.
Difference between Windows 10 Editions
• Windows 10 has 7 editions.
– Home, Mobile, Pro, Enterprise, Education, Enterprise Mobile,
Windows 10 IoT
• Windows 10 Mobile supports ARM and x86/x64.
• Differences between major editions and Windows 10 IoT are
footprint and hardware control API for GPIO(Windows.Devices
API).
• Windows 10 IoT are targeting next generation embedded
devices.
3
FFRI,Inc.
Editions of Windows 10 IoT
Edition Description System
Requirements
Windows 10 IoT
for Industry Devices
Only works on x86/x64.
It is High-function OS
which has Desktop Shell.
RAM:1 GB
Storage:16 GB
Windows 10 IoT
for Mobile Devices
Only works on ARM 32bit.
Successor of Windows
Embedded Handheld OS.
It has Modern Shell.
Mobile device
RAM:512 MB
Storage:4 GB
Windows 10 IoT
for Small Devices,
Windows 10 IoT Core
Works on x86 and ARM
32bit.
Lightweight OS for single-
board computers.
No Shell
RAM:256MB
Storage:2GB
4
FFRI,Inc.
Supported Single-Board Computers
5
Product CPU RAM
Raspberry Pi 2 900MHz quad-core ARM Cortex-
A7 CPU
1GB
MinnowBoard Max Atom E3815-1.46GHz/E3825-
1.33GHz
1 or 2GB
Galileo Intel® Quark™ SoC X1000 (16K
Cache, 400 MHz)
256 MB
Windows Remote Arduino ATmega2560 16 MHz 256 KB
Windows Virtual Shields for
Arduino
ATmega328 16 MHz 32 KB
• Windows 10 IoT is likely to be spread by supporting popular single-
board computer such as the Raspberry Pi 2.
• It's possible to develop IoT applications using C# or C++ or
Python.
FFRI,Inc.
Blinky with Windows 10 IoT Core for Raspberry Pi 2
6
• Blinking a LED by controlling GPIO using Windows 10 IoT Core for
Raspberry Pi 2.
ms-iot.github.io
(+)
(-)
FFRI,Inc.
Blinky Steps on Windows 10 IoT Core
7
1. Install and setup Visual Studio 2015 RC on your PC.
2. Install the Python 3.x, PTVS(Python Tools for Visual Studio), Python
UWP(Universal Windows Platform) SDK.
3. Building the circuit shown in previous slide using a red LED, a 200Ω
resistor, a breadboard and jumper wires.
Make sure the shorter leg (-) is connected to GPIO 5 and the longer
leg (+) to the resistor or it won’t light up.
4. Power on the Raspberry Pi 2 and connect the same network as PC.
5. Checking Raspberry Pi 2 IP through Windows 10 IoT Core Watcher
included Visual Studio.
6. Writing the Blinky program and deploy it from “Remote Machine” on
"Device button” menu.
FFRI,Inc.
Deploying from Visual Studio
8
• Setting the remote deploy
from visual studio "Device
button“ menu.
• We can deploy the program
through select “None” on
“Authentication Mode”
setting on Visual Studio.
FFRI,Inc.
Blinky Python Script
9
import _wingpio as gpio // Import the module control the GPIO
import time
led_pin = 5 // Set PIN number of GPIO
ledstatus = 0
gpio.setup(led_pin, gpio.OUT, gpio.PUD_OFF, gpio.HIGH)
while True:
if ledstatus == 0:
ledstatus = 1
gpio.output(led_pin, gpio.HIGH) // Set the specified GPIO of PIN to
HIGH(On)
else:
ledstatus = 0
gpio.output(led_pin, gpio.LOW) // Set the specified GPIO of PIN to
LOW (Off)
time.sleep(0.5) // It specifies the interval of Blink
gpio.cleanup()
FFRI,Inc.
Summary of Blinky
• Windows 10 IoT Core can control hardware via Windows.Devices
API.
• You can develop embedded apps easily with popular programing
languages like Python and C# on Visual Studio. You can also
develop GUI app.
– http://ms-iot.github.io/content/en-US/win10/samples/HelloWorld.htm
• But we can deploy the program through select “None” on
“Authentication Mode” setting on Visual Studio.
10
FFRI,Inc.
Web Interface
11
FFRI,Inc.
Web Interface
12
Menu Description
Apps Install, Uninstall, Start application.
Checking running applications.
Processes Getting list of running processes.
Performance Checking status of CPU, RAM, I/O on real-time.
Debugging Getting kernel dump or process dump.
Setting and viewing crash dumps.
ETW Checking events.
Perf Tracing Checking memory leak using WPR(Windows Performance
Recorder).
Devices Checking connected devices on single-board.
Networking Checking the network status.
• Some functions are available via web interface.
"http://<Device's IP>" (Need Basic Authentication).
FFRI,Inc.
Port Scanning
• Some services has detected by Nmap.
• These services are working by Windows 10 IoT Core default
settings.
13
PORT STATE SERVICE VERSION
21/tcp open ftp
22/tcp open ssh (protocol 2.0)
80/tcp open http Microsoft-HTTPAPI/2.0
135/tcp open msrpc Microsoft Windows RPC
445/tcp open microsoft-ds?
4020/tcp open trap
5985/tcp open wsman
9956/tcp open unknown
29817/tcp open unknown
29819/tcp open unknown
29820/tcp open unknown
FFRI,Inc.
Port Scanning
• Nmap detected Windows series by OS finger printing.
• SSH and HTTP require authentication. But FTP does not require
authentication.
• This ssh service provides command execution only.
• File Transfer(SCP, SFTP), port forwarding and Public key
authentication are maybe not supported.
14
FFRI,Inc.
World Readable FTP
15
• Any username and password
(incl. null) will be accepted.
• FTP Root directory is “/” and it
is also root of file system.
You can read all directories
and files. But you can not
write.
– You can create and delete
any files if it is mounted as
network share drive with
valid authentication.(FAT)
• It have a low possibility of
malware infection via FTP.
But an attacker can read any
file on the device.
FFRI,Inc.
Security functions of Windows 10 IoT Core
• Windows Firewall is disable by default.
You cannot configure it via web interface. But you can use
“netsh” command.
• Windows Update is not provided.
• Windows Defender is not provided.
• UAC is disabled.
– Maybe it's not necessary because Windows 10 IoT Core
doesn't have interactive UI.
• DEP and ASLR are enabled by default.
• Control Flow Guard is supported. But you need to configure
linker option for your project.
– Project>Property>C/C++>Code Generation>Control Flow
Guard
16
FFRI,Inc.
Start-up programs (startup.exe)
17
• Start-up program is possible to display (/d), remove(/r), add (/a)
through "C:¥Windows¥system32¥STARTUP.EXE".
• ftpd.exe had been added by default.
FFRI,Inc.
Threat Analysis
• Illegal access
– Many users will not change the default password of built-in
administrator account because there is no setup wizard about
password.
– It is easy to hijack the devices through web interface using
default password.
– Attacker will develop auto attacking tool for device that use
default password.
• Password Cracking
– Attacker might attempt to crack ftp, ssh, http authentication.
• Account steal by sniffing packets
– Attacker will attempt access to admin interface if password is
leaked. Because FTP and HTTP are vulnerable to sniffing.
18
FFRI,Inc.
Threat Analysis (cont'd)
• Leak of data
– “Windows IoT Core Watcher” installed with Visual Studio can
find Windows IoT devices on the same network.
– So, Attacker will get some data or programs through FTP
service that running by default and does not require
authentication.
• Hardware hijack
– Attacker can control hardware(camera, switch, etc.) on
Single-board because Visual Studio does not require
authentication and controlling GPIO is easy through
Windows.Devices API.
19
FFRI,Inc.
Threat Analysis (cont'd)
• Tampering of data, malware infection
– Worm that exploits Visual Studio’s deploy function might be
outbreak.
– Attacker would add malware to startup through registry or
"STARTUP.EXE" if he is able to execute arbitrary OS
commands.
– Attack scenario
1. RAT infects a PC which is connected to the same network
as target device.
2. Searching Windows 10 IoT device through the PC.
3. Execute backdoor program through Visual Studio.
4. Attacker gets persistent control by uploading malware or
overwriting original programs.
5. Attacker gets the control about hardware through
Windows.Devices API.
20
FFRI,Inc.
Countermeasures
• There are countermeasures for the threats described above.
– Add admin user and set strong password.
• Setting by command like "net user <username> /add"
through remote shell.
– Set the rules on the network using firewall.
• Limit the connection port and IP through "netsh" command.
– Stop the unnecessary service.
• Stop FTP if you don't need it.
– Secure Communication.
• Use SSH for maintenance. Do not use web interface via
internet.
• Use strong encryption than WEP for Wi-Fi.
– Physical security
• Protect I/O interface and validate signals from GPIO in
application.
21
FFRI,Inc.
References
• Introducing Windows 10 Editions
http://blogs.windows.com/bloggingwindows/2015/05/13/introducing-windows-
10-editions/
• WinHEC Shenzhen 2015
https://channel9.msdn.com/Events/WinHEC/2015
• Internet of Things Overview(Build 2015)
https://channel9.msdn.com/Events/Build/2015/2-652
• Python Tools for Visual Studio
https://pytools.codeplex.com/
• Windows IoT - Python Blinky Sample
https://ms-iot.github.io/content/en-US/win10/samples/PythonBlinky.htm
• Windows IoT - Blinky Sample
https://ms-iot.github.io/content/en-US/win10/samples/Blinky.htm
• Nmap
https://nmap.org/
22
FFRI,Inc.
Contact Information
E-Mail : research—feedback@ffri.jp
Twitter: @FFRI_Research
23

Más contenido relacionado

La actualidad más candente

Inspection of Windows Phone applications
Inspection of Windows Phone applicationsInspection of Windows Phone applications
Inspection of Windows Phone applications
Andrey Chasovskikh
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
vlymfb
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
Taishaun Owens
 

La actualidad más candente (20)

Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
High availability deep dive high-end srx series
High availability deep dive high-end srx seriesHigh availability deep dive high-end srx series
High availability deep dive high-end srx series
 
Ccna 1 7
Ccna 1  7Ccna 1  7
Ccna 1 7
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Host security
Host securityHost security
Host security
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
 
Inspection of Windows Phone applications
Inspection of Windows Phone applicationsInspection of Windows Phone applications
Inspection of Windows Phone applications
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
The Truth About Viruses on IBM i
The Truth About Viruses on IBM iThe Truth About Viruses on IBM i
The Truth About Viruses on IBM i
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 

Similar a Security of Windows 10 IoT Core(FFRI Monthly Research 201506)

IoT em tempo real com Firebase e JavaScript
IoT em tempo real com Firebase e JavaScriptIoT em tempo real com Firebase e JavaScript
IoT em tempo real com Firebase e JavaScript
Henri Cavalcante
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
Droidcon Berlin
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guide
ACP
 
Internet of things aktu lab file
Internet of things  aktu lab fileInternet of things  aktu lab file
Internet of things aktu lab file
Nitesh Dubey
 
Android Meetup, Илья Лёвин
Android Meetup, Илья ЛёвинAndroid Meetup, Илья Лёвин
Android Meetup, Илья Лёвин
GDG Saint Petersburg
 
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
dino715195
 

Similar a Security of Windows 10 IoT Core(FFRI Monthly Research 201506) (20)

Windows IoT
Windows IoTWindows IoT
Windows IoT
 
Windows Phone Application Penetration Testing
Windows Phone Application Penetration Testing Windows Phone Application Penetration Testing
Windows Phone Application Penetration Testing
 
IoT em tempo real com Firebase e JavaScript
IoT em tempo real com Firebase e JavaScriptIoT em tempo real com Firebase e JavaScript
IoT em tempo real com Firebase e JavaScript
 
Windows 10 IoT Core, a real sample
Windows 10 IoT Core, a real sampleWindows 10 IoT Core, a real sample
Windows 10 IoT Core, a real sample
 
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
 
PowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUGPowerShell: A Language for the Internet of Things #ATLPUG
PowerShell: A Language for the Internet of Things #ATLPUG
 
Vo ip guide
Vo ip guideVo ip guide
Vo ip guide
 
Mob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft AustraliaMob324 Windows IoT Core Dave Glover Microsoft Australia
Mob324 Windows IoT Core Dave Glover Microsoft Australia
 
Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!
 
Zach Murray CEIS 106 Project
Zach Murray CEIS 106 ProjectZach Murray CEIS 106 Project
Zach Murray CEIS 106 Project
 
Internet of things aktu lab file
Internet of things  aktu lab fileInternet of things  aktu lab file
Internet of things aktu lab file
 
Android Meetup, Илья Лёвин
Android Meetup, Илья ЛёвинAndroid Meetup, Илья Лёвин
Android Meetup, Илья Лёвин
 
Achieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo DesignAchieve Business-Class Performance With Intel vPro, an Intel Evo Design
Achieve Business-Class Performance With Intel vPro, an Intel Evo Design
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
 
Bluemix iot with intel galileo
Bluemix iot with intel galileoBluemix iot with intel galileo
Bluemix iot with intel galileo
 
DeviceHub - First steps using Intel Edison
DeviceHub - First steps using Intel EdisonDeviceHub - First steps using Intel Edison
DeviceHub - First steps using Intel Edison
 
Android Things Getting Started
Android Things Getting StartedAndroid Things Getting Started
Android Things Getting Started
 

Más de FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
FFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
FFRI, Inc.
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShell
FFRI, Inc.
 

Más de FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShell
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPress
 
MR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions OverviewMR201502 Intel Memory Protection Extensions Overview
MR201502 Intel Memory Protection Extensions Overview
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Security of Windows 10 IoT Core(FFRI Monthly Research 201506)

  • 1. FFRI,Inc. 1 Monthly Research Security of Windows 10 IoT Core FFRI, Inc. http://www.ffri.jp Ver 1.00.01
  • 2. FFRI,Inc. Introduction • Windows 10 IoT is successor platform of Windows Embedded that optimized for embedded devices. • Windows 10 IoT Core Insider Preview has been provided for single-board computers such as the Raspberry Pi 2. • We show tutorial about security of Windows 10 IoT Core using the Raspberry Pi 2. * This report describes about preview version of Windows 10 IoT Core. So it may be different in official release. 2
  • 3. FFRI,Inc. Difference between Windows 10 Editions • Windows 10 has 7 editions. – Home, Mobile, Pro, Enterprise, Education, Enterprise Mobile, Windows 10 IoT • Windows 10 Mobile supports ARM and x86/x64. • Differences between major editions and Windows 10 IoT are footprint and hardware control API for GPIO(Windows.Devices API). • Windows 10 IoT are targeting next generation embedded devices. 3
  • 4. FFRI,Inc. Editions of Windows 10 IoT Edition Description System Requirements Windows 10 IoT for Industry Devices Only works on x86/x64. It is High-function OS which has Desktop Shell. RAM:1 GB Storage:16 GB Windows 10 IoT for Mobile Devices Only works on ARM 32bit. Successor of Windows Embedded Handheld OS. It has Modern Shell. Mobile device RAM:512 MB Storage:4 GB Windows 10 IoT for Small Devices, Windows 10 IoT Core Works on x86 and ARM 32bit. Lightweight OS for single- board computers. No Shell RAM:256MB Storage:2GB 4
  • 5. FFRI,Inc. Supported Single-Board Computers 5 Product CPU RAM Raspberry Pi 2 900MHz quad-core ARM Cortex- A7 CPU 1GB MinnowBoard Max Atom E3815-1.46GHz/E3825- 1.33GHz 1 or 2GB Galileo Intel® Quark™ SoC X1000 (16K Cache, 400 MHz) 256 MB Windows Remote Arduino ATmega2560 16 MHz 256 KB Windows Virtual Shields for Arduino ATmega328 16 MHz 32 KB • Windows 10 IoT is likely to be spread by supporting popular single- board computer such as the Raspberry Pi 2. • It's possible to develop IoT applications using C# or C++ or Python.
  • 6. FFRI,Inc. Blinky with Windows 10 IoT Core for Raspberry Pi 2 6 • Blinking a LED by controlling GPIO using Windows 10 IoT Core for Raspberry Pi 2. ms-iot.github.io (+) (-)
  • 7. FFRI,Inc. Blinky Steps on Windows 10 IoT Core 7 1. Install and setup Visual Studio 2015 RC on your PC. 2. Install the Python 3.x, PTVS(Python Tools for Visual Studio), Python UWP(Universal Windows Platform) SDK. 3. Building the circuit shown in previous slide using a red LED, a 200Ω resistor, a breadboard and jumper wires. Make sure the shorter leg (-) is connected to GPIO 5 and the longer leg (+) to the resistor or it won’t light up. 4. Power on the Raspberry Pi 2 and connect the same network as PC. 5. Checking Raspberry Pi 2 IP through Windows 10 IoT Core Watcher included Visual Studio. 6. Writing the Blinky program and deploy it from “Remote Machine” on "Device button” menu.
  • 8. FFRI,Inc. Deploying from Visual Studio 8 • Setting the remote deploy from visual studio "Device button“ menu. • We can deploy the program through select “None” on “Authentication Mode” setting on Visual Studio.
  • 9. FFRI,Inc. Blinky Python Script 9 import _wingpio as gpio // Import the module control the GPIO import time led_pin = 5 // Set PIN number of GPIO ledstatus = 0 gpio.setup(led_pin, gpio.OUT, gpio.PUD_OFF, gpio.HIGH) while True: if ledstatus == 0: ledstatus = 1 gpio.output(led_pin, gpio.HIGH) // Set the specified GPIO of PIN to HIGH(On) else: ledstatus = 0 gpio.output(led_pin, gpio.LOW) // Set the specified GPIO of PIN to LOW (Off) time.sleep(0.5) // It specifies the interval of Blink gpio.cleanup()
  • 10. FFRI,Inc. Summary of Blinky • Windows 10 IoT Core can control hardware via Windows.Devices API. • You can develop embedded apps easily with popular programing languages like Python and C# on Visual Studio. You can also develop GUI app. – http://ms-iot.github.io/content/en-US/win10/samples/HelloWorld.htm • But we can deploy the program through select “None” on “Authentication Mode” setting on Visual Studio. 10
  • 12. FFRI,Inc. Web Interface 12 Menu Description Apps Install, Uninstall, Start application. Checking running applications. Processes Getting list of running processes. Performance Checking status of CPU, RAM, I/O on real-time. Debugging Getting kernel dump or process dump. Setting and viewing crash dumps. ETW Checking events. Perf Tracing Checking memory leak using WPR(Windows Performance Recorder). Devices Checking connected devices on single-board. Networking Checking the network status. • Some functions are available via web interface. "http://<Device's IP>" (Need Basic Authentication).
  • 13. FFRI,Inc. Port Scanning • Some services has detected by Nmap. • These services are working by Windows 10 IoT Core default settings. 13 PORT STATE SERVICE VERSION 21/tcp open ftp 22/tcp open ssh (protocol 2.0) 80/tcp open http Microsoft-HTTPAPI/2.0 135/tcp open msrpc Microsoft Windows RPC 445/tcp open microsoft-ds? 4020/tcp open trap 5985/tcp open wsman 9956/tcp open unknown 29817/tcp open unknown 29819/tcp open unknown 29820/tcp open unknown
  • 14. FFRI,Inc. Port Scanning • Nmap detected Windows series by OS finger printing. • SSH and HTTP require authentication. But FTP does not require authentication. • This ssh service provides command execution only. • File Transfer(SCP, SFTP), port forwarding and Public key authentication are maybe not supported. 14
  • 15. FFRI,Inc. World Readable FTP 15 • Any username and password (incl. null) will be accepted. • FTP Root directory is “/” and it is also root of file system. You can read all directories and files. But you can not write. – You can create and delete any files if it is mounted as network share drive with valid authentication.(FAT) • It have a low possibility of malware infection via FTP. But an attacker can read any file on the device.
  • 16. FFRI,Inc. Security functions of Windows 10 IoT Core • Windows Firewall is disable by default. You cannot configure it via web interface. But you can use “netsh” command. • Windows Update is not provided. • Windows Defender is not provided. • UAC is disabled. – Maybe it's not necessary because Windows 10 IoT Core doesn't have interactive UI. • DEP and ASLR are enabled by default. • Control Flow Guard is supported. But you need to configure linker option for your project. – Project>Property>C/C++>Code Generation>Control Flow Guard 16
  • 17. FFRI,Inc. Start-up programs (startup.exe) 17 • Start-up program is possible to display (/d), remove(/r), add (/a) through "C:¥Windows¥system32¥STARTUP.EXE". • ftpd.exe had been added by default.
  • 18. FFRI,Inc. Threat Analysis • Illegal access – Many users will not change the default password of built-in administrator account because there is no setup wizard about password. – It is easy to hijack the devices through web interface using default password. – Attacker will develop auto attacking tool for device that use default password. • Password Cracking – Attacker might attempt to crack ftp, ssh, http authentication. • Account steal by sniffing packets – Attacker will attempt access to admin interface if password is leaked. Because FTP and HTTP are vulnerable to sniffing. 18
  • 19. FFRI,Inc. Threat Analysis (cont'd) • Leak of data – “Windows IoT Core Watcher” installed with Visual Studio can find Windows IoT devices on the same network. – So, Attacker will get some data or programs through FTP service that running by default and does not require authentication. • Hardware hijack – Attacker can control hardware(camera, switch, etc.) on Single-board because Visual Studio does not require authentication and controlling GPIO is easy through Windows.Devices API. 19
  • 20. FFRI,Inc. Threat Analysis (cont'd) • Tampering of data, malware infection – Worm that exploits Visual Studio’s deploy function might be outbreak. – Attacker would add malware to startup through registry or "STARTUP.EXE" if he is able to execute arbitrary OS commands. – Attack scenario 1. RAT infects a PC which is connected to the same network as target device. 2. Searching Windows 10 IoT device through the PC. 3. Execute backdoor program through Visual Studio. 4. Attacker gets persistent control by uploading malware or overwriting original programs. 5. Attacker gets the control about hardware through Windows.Devices API. 20
  • 21. FFRI,Inc. Countermeasures • There are countermeasures for the threats described above. – Add admin user and set strong password. • Setting by command like "net user <username> /add" through remote shell. – Set the rules on the network using firewall. • Limit the connection port and IP through "netsh" command. – Stop the unnecessary service. • Stop FTP if you don't need it. – Secure Communication. • Use SSH for maintenance. Do not use web interface via internet. • Use strong encryption than WEP for Wi-Fi. – Physical security • Protect I/O interface and validate signals from GPIO in application. 21
  • 22. FFRI,Inc. References • Introducing Windows 10 Editions http://blogs.windows.com/bloggingwindows/2015/05/13/introducing-windows- 10-editions/ • WinHEC Shenzhen 2015 https://channel9.msdn.com/Events/WinHEC/2015 • Internet of Things Overview(Build 2015) https://channel9.msdn.com/Events/Build/2015/2-652 • Python Tools for Visual Studio https://pytools.codeplex.com/ • Windows IoT - Python Blinky Sample https://ms-iot.github.io/content/en-US/win10/samples/PythonBlinky.htm • Windows IoT - Blinky Sample https://ms-iot.github.io/content/en-US/win10/samples/Blinky.htm • Nmap https://nmap.org/ 22
  • 23. FFRI,Inc. Contact Information E-Mail : research—feedback@ffri.jp Twitter: @FFRI_Research 23