Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.
From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars-all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
About the Author v
Acknowledgments vii
Foreword xv
Introduction xix
Part I Tactics, Techniques, and Procedures 1
Chapter 1 Pre-Engagement 3
Penetration Testing Execution Standard 4
Scope Definition 6
Architecture 7
Full Disclosure 7
Release Cycles 7
IP Addresses 7
Source Code 8
Wireless Networks 8
Start and End Dates 8
Hardware Unique Serial Numbers 8
Rules of Engagement 9
Timeline 10
Testing Location 10
Work Breakdown Structure 10
Documentation Collection and Review 11
Example Documents 11
Project Management 13
Conception and Initiation 15
Definition and Planning 16
Launch or Execution 22
Performance/Monitoring 23
Project Close 24
Lab Setup 24
Required Hardware and Software 25
Laptop Setup 28
Rogue BTS Option 1: OsmocomBB 28
Rogue BTS Option 2: BladeRF + YateBTS 32
Setting Up Your WiFi Pineapple Tetra 35
Summary 36
Chapter 2 Intelligence Gathering 39
Asset Register 40
Reconnaissance 41
Passive Reconnaissance 42
Active Reconnaissance 56
Summary 59
Chapter 3 Threat Modeling 61
STRIDE Model 63
Threat Modeling Using STRIDE 65
Vast 74
Pasta 76
Stage 1: Define the Business and Security Objectives 77
Stage 2: Define the Technical Scope 78
Stage 3: Decompose the Application 79
Stage 4: Identify Threat Agents 80
Stage 5: Identify the Vulnerabilities 82
Stage 6: Enumerate the Exploits 82
Stage 7: Perform Risk and Impact Analysis 83
Summary 85
Chapter 4 Vulnerability Analysis 87
Passive and Active Analysis 88
WiFi 91
Bluetooth 100
Summary 105
Chapter 5 Exploitation 107
Creating Your Rogue BTS 108
Configuring NetworkinaPC 109
Bringing Your Rogue BTS Online 112
Hunting for the TCU 113
When You Know the MSISDN of the TCU 113
When You Know the IMSI of the TCU 114
When You Don't Know the IMSI or MSISDN of the TCU 114
Cryptanalysis 117
Encryption Keys 118
Impersonation Attacks 123
Summary 132
Chapter 6 Post Exploitation 133
Persistent Access 133
Creating a Reverse Shell 134
Linux Systems 136
Placing the Backdoor on the System 137
Network Sniffing 137
Infrastructure Analysis 138
Examining the Network Interfaces 139
Examining the ARP Cache 139
Examining DNS 141
Examining the Routing Table 142
Identifying Services 143
Fuzzing 143
Filesystem Analysis 148
Command-Line History 148
Core Dump Files 148
Debug Log Files 149
Credentials and Certificates 149
Over-the-Air Updates 149
Summary 150
Part II Risk Management 153
Chapter 7 Risk Management 155
Frameworks 156
Establishing the Risk Management Program 158
SAE J3061 159
ISO/SAE AWI 21434 163
HEAVENS 164
Threat Modeling 166
STRIDE 168
PASTA 171
TRIKE 175
Summary 176
Chapter 8 Risk-Assessment Frameworks 179
HEAVENS 180
Determining the Threat Level 180
Determining the Impact Level 183
Determining the Security Level 186
EVITA 187
Calculating Attack Potential 189
Summary 192
Chapter 9 PKI in Automotive 193
VANET 194
On-board Units 196
Roadside Unit 196
PKI in a VANET 196
Applications in a VANET 196
VANET Attack Vectors 197
802.11p Rising 197
Frequencies and Channels 197
Cryptography 198
Public Key Infrastructure 199
V2X PKI200
IEEE US Standard 201
Certificate Security 201
Hardware Security Modules 201
Trusted Platform Modules 202
Certificate Pinning 202
PKI Implementation Failures 203
Summary 203
Chapter 10 Reporting 205
Penetration Test Report 206
Summary Page 206
Executive Summary 207
Scope 208
Methodology 209
Limitations 211
Narrative 211
Tools Used 213
Risk Rating 214
Findings 215
Remediation 217
Report Outline 217
Risk Assessment Report 218
Introduction 219
References 220
Functional Description 220
Head Unit 220
System Interface 221
Threat Model 222
Threat Analysis 223
Impact Assessment 224
Risk Assessment 224
Security Control Assessment 226
Example Risk Assessment Table 229
Summary 230
Index 233
"Strategy requires thought; tactics require observation."
-Max Euwe
On May 7, 2002, Bennett Todd announced on a vulnerability development mailing list that he stumbled upon a UDP port when performing a wireless network audit, which turned out to be a port used for remote debugging in VxWorks, a real-time operating system (RTOS) developed by Wind River Systems, now owned by Intel. The port was left enabled by default on some wireless networking products he was auditing. Little did Todd know that his discovery, port 17185/UDP, would later lead to a much more widespread vulnerability affecting a much greater number of different connected devices running VxWorks.
Eight years after his post in August of 2010, HD Moore stood in front of an audience at Defcon 23 and presented his research findings into VxWorks after performing exhaustive testing of every device since Todd's initial post in 2002.
In a vulnerability note released on August 2, 2010 by Wind River Systems, this port turned out to be its WDB target agent, a target-resident, runtime facility that is required for connecting host tools to a VxWorks system during development. The WDB debug agent access is not secured, and through a memory scraping vulnerability discovered by Moore, leaves a gaping security hole in deployed systems using VxWorks that allows a remote attacker to carve data remotely out of memory without valid credentials.
At the time of his discovery, Todd had only mentioned wireless access points in his post as being affected, not realizing that VxWorks is a real-time operating system for embedded systems used in much more than just his wireless access point. Wind River is used in other systems, including the Thales' Astute-Class submarine periscopes, the Boeing AH-64 Apache attack helicopter, the NASA Mars Rover, even BMW's iDrive system for models made after 2008-just to name a few.
In virology, when a virus is introduced into a new host species and spreads through a new host population, it's referred to as spillover or cross-species transmission (CST). This same thing happens in information security where a vulnerability published for a target device or product causes spillover into other products that wasn't originally anticipated.
In 1996, the German company Rohde & Schwarz started selling the first IMSI catcher (GA 090) that allowed a user to force an unidentified mobile subscriber to transmit the SIM's IMSI and later, in 1997, allowed the user to tap outgoing phone calls.
At Blackhat Briefings Asia in April of 2001, Emmannuel Gadaix unveiled the first known GSM vulnerability through a man-in-the-middle (MITM) attack and deregistration Denial of Service (DoS) attack affecting mobile phones.
Later in 2010, Karsten Nohl released a cracking tool for A5/1 encryption used to secure GSM traffic known as Kraken, which leverages rainbow tables for cracking A5/1 encryption, later referred to as the "Berlin Tables." Nohl's tool was later usurped by Kristen Paget that same year, who revealed at Defcon 18 how to use a rogue cellular base transceiver station (BTS) or IMSI catcher to intercept mobile phone calls and SMS text messages, which didn't require cracking at all.
While these vulnerability discoveries in GSM at the time were originally aimed at mobile phones and their users, they would later cause vulnerability spillover into the automotive sector that today's connected cars and autonomous vehicles heavily rely upon for communication to their backends for OTA (over-the-air) updates and other features.
In her presentation, Paget used a Universal Software Radio Peripheral (USRP) costing roughly $1,500-hundreds of thousands of dollars cheaper than the first GA 090-and presented the idea that instead of sniffing the GSM calls and SMS text messages for offline cracking, an alternative concept was possible. Paget used a cell phone to create the base station hooked up to her laptop, thus was able to disable A5/1 encryption entirely, rendering the need to crack the streams offline superfluous.
Paget, who later began working for Tesla-no doubt applying her previous research in hacking mobile networks to securing connected cars-now works for Lyft as a hacker. Paget's observation during the conference that the GSM specification itself requires a warning notification to the user when encryption has been disabled (A5/0) on the network, and that this warning is intentionally disabled on cellular networks, is especially alarming and underscores a systemic problem with mobile phone carriers on whom automakers rely for their telematics infrastructure.
Just three years ago in 2015, at DEF CON 23, Charlie Miller and Chris Valasek demonstrated remote exploitation of an unaltered passenger vehicle-different from their first presentation, which required physical access to the car and its diagnostic port. This time, Miller and Valasek demonstrated how vulnerabilities in the automobile's head unit allowed them to communicate with TCP/6667 (dbus) without authentication, allowing them to send commands to the system to be executed over the head unit's Wi-Fi hotspot. These attacks became more devastating as they leveraged poor firewalling in the mobile carrier's cellular network that allowed them access to the dbus port to perform the same attacks over the telematics control unit's (TCU) GSM interface. By modifying the firmware and reflashing the Renesas V850 microprocessor after downloading the firmware from the internet, they were able to reprogram the microprocessor to send CAN messages directly to the CAN bus that the head unit was connected to and physically take control of the car, such as pushing the brakes, turning the steering wheel, turning the power off on the car, moving the windshield wipers, and manipulating the stereo.
This demonstration of hacking a connected car was the first published research into hacking connected cars remotely. Other published exploitation techniques required physical access or connectivity to the ODB-II (debug) port of the car.
Since 2015, more vulnerabilities have been published that demonstrate remote exploitation of components inside connected cars across different makes and models and other findings not inherent to head units. Some of the vulnerabilities that have been exploited are a result of original equipment manufacturers (OEMs) not using signed firmware, which allows researchers to backdoor the firmware and reflash the microprocessors. This allows them to send CAN messages directly onto the CAN bus to physically control the vehicle.
This spillover affects not only GSM, but also Bluetooth, Wi-Fi, and other embedded operating systems used by OEMs in the automobile sector.
To put the amount of software programming in a modern-day vehicle into perspective, the F-35 Joint Strike Fighter requires about 5.7 million lines of code to operate its onboard systems. Today's premium class connected car contains close to 100 million lines of code and executes on 70-100 microprocessor-based Electronic Control Units (ECUs) networked throughout the in-vehicle network of an automobile. The complexity of connected cars and autonomous vehicles is only growing, as Frost & Sullivan estimates cars will require 200-300 million lines of code in the near future, while current cars attribute more than 60%-70% of their recalls in major automotive markets to electronic faults.
The fact is inescapable that connected cars and autonomous vehicles are no longer an unrealized future, but a present-day reality that by 2020 will make up over 10 million cars out of the total number of cars on the road.
While technological advances in the automotive industry will no doubt contribute to increased efficiency and higher revenues as the "creatures of comfort and convenience" generation grows up expecting always-on connectivity to email, web, and social networks, KPMG UK estimates that self-driving cars will lead to 2,500 fewer deaths from 2014 to 2030; a bold statement backed by the Honda Research & Development Americas R&D chief who set a zero crashes goal for the company by 2040.
While still being connected to much older technologies like the CAN bus, many OEMs have even begun to integrate ECUs into their cars that communicate over Ethernet and speak TCP/IP. It should be pointed out that in 2015, the highest number of ECUs that could be found in a car was about 80, while today, a luxury car can have more than 150, driven primarily by the push to lower costs and overall weight.
While the future of autonomous, self-driving cars is quickly becoming a present-day reality in the second industrial revolution we're now in, so are ethical hackers/penetration testers, who are specifically focusing their research into identifying and exploiting vulnerabilities in them.
As Garth Brooks put it, "What we once put off to tomorrow has now become today" with driverless cars. But the arms race in technological advancement of automobiles has created a new threat landscape, where the result of a compromise is no longer just relegated to a defaced website or stolen credit card numbers, but potential loss of life. The fact is, connected cars aren't simply seen as heaps of metal powered by internal combustion engines that turn crankshafts to move the wheels that hackers don't understand anymore. Cars are now nothing more than computers on wheels with a technology stack made up of multiple CPUs, embedded operating systems, and applications that can be communicated with over Bluetooth, Wi-Fi,...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.