[EAS] ALERT: EAS Device passwords
Dave Turnmire
eassbelist at cableone.net
Wed Feb 13 15:51:02 CST 2013
On 2/13/2013 1:42 PM, ray at electronicstheory.com wrote:
> ...
> The two big concerns to me are:
> 1) How did they find the IP addresses of all these DASDECS? ...
I have other things to occupy myself than being an expert on this topic,
but it seems to me that this would likely be pretty easy. The internet
is full of free "port scanning" utilities. So... it is simple to scan
for devices that have web servers associated with them. Especially if
you are using the default "port 80" normally used for web servers.
Beyond that, there are multiple products readily available for not only
automated scanning, but looking for clues as to the brand and version of
software involved. My university campus routinely uses such software to
identify security vulnerabilities from outdated software on their
networks (which, by the way, includes a substantial portion of the
broadcast "hardware" out there).
I'm told that in addition to above, there are products that take it one
step further and have an internal database that knows that "Apache web
server version x.y has this known vulnerability..." and then probes for
it. All very automated. So we have the term "script kiddy" to refer to
people who have limited hacking skills, but have such a tool in their
possession. It would seem like a short step from that point to someone
identifying the relative handful of EAS boxes out there and which
operating systems and web server software they are using and restricting
their search for those devices. And of course, for stations that host
their own on-site web server or email server or other such publicly
known device, their IP address (or block of addresses) is essentially
public knowledge.
A zillion years ago I read a book about hacking whose intended audience
was IT guys wanting to know their vulnerabilities and how to defend
against them. One of the basic concepts was for your server NOT to
identify itself in regards to software. As I understood it, that was a
basic concept for computer security. So, if you telnet into an email
server, instead of saying "Hi. Welcome to Microsoft's Exchange xxx, the
most wonderful email server in the world"... you get something like
"hello".
Now... think about how your broadcast equipment behaves. Go to the web
interface, and BEFORE you login, the web site identifies the product
involved... and quite possibly provides a helpful link to the vendor's
support website. Essentially, in the interest of promoting their
product as well as perhaps thinking they are making their product more
friendly or aesthetically pleasing... they have made it awful easy for
the bad guys to identify the product and thus any known vulnerabilities.
Dave
More information about the EAS
mailing list