lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <40D313B0.1080303@egotistical.reprehensible.net>
From: ge at egotistical.reprehensible.net (Gadi Evron)
Subject: USB risks (continued)

I'm emailing this to bugtraq as well. A discussion there might produce 
more interesting results than "MS sucks" on FD. This is rather important 
and has grown in importance over the last couple of years. There were a 
few discussions on the subject, but nothing to help formulate a plan on 
how to defend against it.

Here goes...

>>  This issue has been discused in pentest list. Take
>>a look at: 
 >>http://archives.neohapsis.com/archives/sf/pentest/2004-05/0136.html
> I don't think the issue is that it's been discussed,
> more that it hasn't been really resolved/addressed. 

I already replied to Harlan off-list, but I figured I might as well 
reply about some of this here as well.

First off, it has been discussed rather fully on pen-test and the 
archives would make a good resource.

Auto-run certainly isn't a new issue and a factor in every hardening of 
a Windows system for a while now. It was a big "thing" 2 years ago.

It should be tested further, but the risk of the USB as a mechanism for 
stealing information and/or introducing a Trojan horse/gaining access to 
a PC is what we need to be concerned about.

Regular usage of a USB drive makes the cleaning crew potentially the 
richest sort on earth.

What I believe issues that would have to be addressed in the future, are:
[Please keep in mind that USB performs as a hub/client model and that 
the main driver for USB devices is built into Windows, unlike what I 
originally thought before looking further into this]

1. Better systems to track/deny usage of USB drives (all-together or of
    particular types, negatively or positively). Several systems
    already exist, from removing USB/gluing the plug to programs
    that sit on a Domain.
2. Buffer Overflow:
    I personally find the USB driver to be rather unstable, although
    others disagree. A buffer overflow in the driver can be catastrophic
    and _perhaps_ even effect very strong crypto-systems. Maybe systems
    like eToken, although I haven't looked into it, so i can't say.
3. SDK's:
    Many SDK's exist for developing USB drivers. If a backdoor is put
    into even just one of them...
    There is a huge market for USB coders. Any kiddie interested?

On the organizational level, it should be addressed in a matter of 
policy, and enforced by different monitoring systems.

This issue isn't singular to USB, but it highlights the problem rather 
nicely.

Some future trends might be wireless control of remote systems via USB, 
going to a PC with a PDA and choosing what to get.change, or simply 
copying automatically using the USB autorun capability (there was a POC 
on the pen-test discussion).

These are all valid threats, but the main threat of copying data to a 
USB drive covertly and disappearing is what scares me currently. Also, 
what stops a person from copying work-related material to a digital 
camera memory stick?

Nothing if not your policy and enforcement+monitoring of it.

Other than the pen-test discussion there was a discussion here a few 
months ago on domain USB monitor services, and a USB device (once 
wireless, once for copying data automatically) showed on these TV shows:
Threat Matrix and Jake 2.0.

The reason I think this should be discussed further is because I truly 
believe in the risk. It is "out there", known and there is even a POC.. 
but no real discussion on organizational counter-measures and defensive 
strategies.

Here is Harlan's post:

 >> This is an interesting topic of discussion.  Like one
 >> poster, I first saw this in the most recent issue of
 >> 2600.  I began looking into it, and almost immediately
 >> came up with this particular MS KB article:
 >> http://support.microsoft.com/default.aspx?scid=kb;EN-US;136214

 >> As you can see, KB136214 states pretty clearly that
 >> *be default*, autorun.inf file processing is NOT
 >> enabled for USB-connected thumb drives.  I haven't
 >> tested it myself, but another poster has stated that
 >> while items in the "open=" line may not be launched,
 >> the "icon=" line seems to be processed.

 >> I read Gadi's comments:
 >> http://catless.ncl.ac.uk/go/risks/23/41/4

 >> I had some questions for Gadi, and fired off an email
 >> but have yet to hear back.

 >> While I do agree wholeheartedly that USB-connected
 >> devices are definitely an issue within a network
 >> infrastructure, it's not yet clear to me that the pose
 >> the threats that have been presented.

	Gadi Evron.

-- 
Email: ge@...uxbox.org.  Work: gadie@....gov.il. Backup: ge@...p.mx.dk.
Phone: +972-50-428610 (Cell).

PGP key for attachments: http://vapid.reprehensible.net/~ge/Gadi_Evron.asc
ID: 0xD9216A06 FP: 5BB0 D3E2 D3C1 19B7 2104  C0D0 A7B3 1CF7 D921 6A06
GPG key for encrypted email: 
http://vapid.reprehensible.net/~ge/Gadi_Evron_Emails.asc
ID: 0x06C7D450 FP: 3B88 845A DF1F 4062 E5BA  569A A87E 8DB7 06C7 D450


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ