AppSec - IPMI: An express train to hell
Daniel Ramirez
Warsaw, 10.10.2018
OWASP
Poland Day 2018
whoami
• Daniel Ramirez
• Penetration Tester in Opera Software AS
• OWASP Member
Agenda
• Introduction
• IPMI
• Discovery and Exposure
• Vulnerabilities and PoC
• Countermeasures
• Sum up
Introduction
Introduction
• Intelligence Platform Management Interface a.k.a IPMI
• Out-of-Band (OOB) channel to facilitate the Remote
management of servers.
• Published by Intel,Hewlett Packard, NEC and Dell, is used for
emergency maintenance.
Introduction
● An embedded system called BMC implements the IPMI and
lives on the server Motherboard.
● Also the BMC provide remote web access.
● Operate a very low level, invisible to the OS.
IPMI
IPMI
● IPMI manager connect over IP to the BMC on the Server
motherboard.
● Allows an anonymous or Cipher zero Authentication
● RAKP ( RMCP + Authenticated Key Exchange Protocol)
IPMI
IPMI
● 4 way to communicate with BMC
○ ssh
○ Web Interface
○ CLI
○ Network Devices(Virtual media, remote consoles)
IPMI - Password Complexity
● IPMI 1.5 max length: 16
● IPMI 2.0 max length: 20
● The client received the password in clear text or hashed per
any valid user (MSF module)
IPMI - Default Password
IPMI
● Owners can’t fix or patch BMC security problems because
vendors ensure that only their own proprietary software to
be used.
● Even backing up the firmware is disallowed
Discovery and Exposure
Discovery and Exposure
● IPMI works on UDP port 623 (sometimes also TCP)
● Several modules to use from metasploit
auxiliar/scanner/ipmi/… (also nmap)
● ipmitool - cli
Discovery and Exposure
“It would be a gross violation of best security practices to
place any kind of management port on a publicly accessible
network.”
Discovery and Exposure
Discovery and Exposure
Vulnerabilities and PoC
Vulnerability and Demo-What we need?
● Shodan
● Misconfigured Server
● Kali tools
● Enjoy and profit
Vulnerability and PoC
● Cipher Zero Vulnerability
○ Modify Password root user
○ Create User
○ Shut Down the server
● Dump hash password / cracked it
Vulnerability and PoC
Vulnerability and PoC
Vulnerability and PoC
Vulnerability and PoC
Vulnerability and PoC
Vulnerability and PoC
Countermeasures
Countermeasures
● Disconnect the IPMI device from the Internet (If you do not
need it at all).
● Have the IPMI devices accessible only via VPN (or from the
internal network using private IP addresses).
● Whitelist IP, only SysAdmin/network Admin should access
Countermeasures
● If you have to keep your IPMI accessible publicly, these are
some of the security measures to take:
○ Implement the IPMI security best practices
○ Replace the default administrator user
○ Delete any users that are no longer active, and disable the
default users when possible.
○ Keep your IPMI software and firmware up to date
Sum up
Sum up
● Imagine trying to secure a computer with a small powerful
parasite inside.
● Can’t be turned off, no documentation.
● Owners can’t fix or patched(only vendors).
● Backing up the firmware is disallowed.
● Designed for full control, remote management and
monitoring.
Sum up
● If you thought “Stuxnet” was stealthy, at least was running in
your CPU.
● How about something that has full access to your system
and is impossible to discover from OS.
Any questions?
Daniel Ramirez
dramirez@opera.com
<contact details>

More Related Content

PPTX
[Wroclaw #8] IPMI appsec - an express train to hell
PDF
TrueConf Server — The Most Advanced UC&C System on The Market
PDF
OSMC 2019 | On-board Diagnostics Monitoring and Alerting with Zabbix by Dmitr...
PDF
PPTX
R4 b4dcmb 5g
PDF
Palo alto outline course | Mostafa El Lathy
PDF
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
PDF
Far South Networks - an introduction
[Wroclaw #8] IPMI appsec - an express train to hell
TrueConf Server — The Most Advanced UC&C System on The Market
OSMC 2019 | On-board Diagnostics Monitoring and Alerting with Zabbix by Dmitr...
R4 b4dcmb 5g
Palo alto outline course | Mostafa El Lathy
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
Far South Networks - an introduction

What's hot (20)

PDF
Quality Assurance for WebRTC Services
PPTX
R4 b4ecmb 5g
PDF
Tmplab hostile wrt-5-hacklu
PPT
Kbc networks thrulink 15 minute presentation
PDF
FreeSWITCH Monitoring
PPTX
Plc based controlling of induction motor
PDF
Dangerous Demo: Apidaze
PPTX
R4 d1fb3fcmb 5g
PDF
IPv6 Security
PPTX
TADSummit Dangerous demo: Oracle
PDF
Vicon 2015
PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
PDF
LAS16-112: mbed OS Technical Overview
PPTX
Development of Automotive Multimedia System using the Wireless Optical Commun...
PDF
STATE OF ALABAMA Information Technology Guideline
PPTX
Contiki OS Research Projects Guidance
PDF
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
PPSX
Securing OPC Classic Communications in Industrial Systems
PDF
Andrea De Gaetano - An Adventure with ESP8266 firmwares and IOT
PPTX
RPS/APS vulnerability in snom/yealink and others - slides
Quality Assurance for WebRTC Services
R4 b4ecmb 5g
Tmplab hostile wrt-5-hacklu
Kbc networks thrulink 15 minute presentation
FreeSWITCH Monitoring
Plc based controlling of induction motor
Dangerous Demo: Apidaze
R4 d1fb3fcmb 5g
IPv6 Security
TADSummit Dangerous demo: Oracle
Vicon 2015
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-112: mbed OS Technical Overview
Development of Automotive Multimedia System using the Wireless Optical Commun...
STATE OF ALABAMA Information Technology Guideline
Contiki OS Research Projects Guidance
IETF 106 - Default IPv6 Local Only Addressing for Non-Internet Devices
Securing OPC Classic Communications in Industrial Systems
Andrea De Gaetano - An Adventure with ESP8266 firmwares and IOT
RPS/APS vulnerability in snom/yealink and others - slides

Similar to OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking (20)

PPTX
[old] Network Performance Monitoring for DevOps and IT
PDF
An hour with WebRTC FIC UDC
PDF
BOX of Illusion MOSEC'17
PDF
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
PPT
Smart Wireless Surveillance Monitoring using RASPBERRY PI
PDF
OpeVPN on Mikrotik
PPTX
Programmable infrastructure with FlyScript
ODP
Rete di casa e raspberry pi - Home network and Raspberry Pi
PPTX
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
DOC
Srikanth_PILLI_CV_latest
PDF
Publishing Microservices Applications
PDF
OSDC 2010 | The Power of IPMI by Werner Fischer
PDF
How OpenShift SDN helps to automate
PDF
Home Automation Using RPI
PDF
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
PPTX
Briforum2012 advanced appv-sequencing
PDF
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
PPTX
Bangalore OpenMSA DevDay - September 19, 2018
PDF
Free Your Manufacturing Data with Apache PLC4X & MQTT
PDF
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
[old] Network Performance Monitoring for DevOps and IT
An hour with WebRTC FIC UDC
BOX of Illusion MOSEC'17
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Smart Wireless Surveillance Monitoring using RASPBERRY PI
OpeVPN on Mikrotik
Programmable infrastructure with FlyScript
Rete di casa e raspberry pi - Home network and Raspberry Pi
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Srikanth_PILLI_CV_latest
Publishing Microservices Applications
OSDC 2010 | The Power of IPMI by Werner Fischer
How OpenShift SDN helps to automate
Home Automation Using RPI
PuppetConf 2016: Why Network Automation Matters, and What You Can Do About It...
Briforum2012 advanced appv-sequencing
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
Bangalore OpenMSA DevDay - September 19, 2018
Free Your Manufacturing Data with Apache PLC4X & MQTT
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...

More from OWASP (20)

PDF
[OPD 2019] Web Apps vs Blockchain dApps
PDF
[OPD 2019] Threat modeling at scale
PDF
[OPD 2019] Life after pentest
PDF
[OPD 2019] .NET Core Security
PDF
[OPD 2019] Top 10 Security Facts of 2020
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPTX
[OPD 2019] Inter-application vulnerabilities
PDF
[OPD 2019] Automated Defense with Serverless computing
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
PDF
[OPD 2019] Attacking JWT tokens
PDF
[OPD 2019] Rumpkernels meet fuzzing
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
PDF
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Threat modeling at scale
[OPD 2019] Life after pentest
[OPD 2019] .NET Core Security
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Attacking JWT tokens
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Trusted types and the end of DOM XSS
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts

Recently uploaded (20)

PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Build Your First AI Agent with UiPath.pptx
PPT
Geologic Time for studying geology for geologist
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Internet of Everything -Basic concepts details
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Module 1 Introduction to Web Programming .pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Build Your First AI Agent with UiPath.pptx
Geologic Time for studying geology for geologist
Microsoft Excel 365/2024 Beginner's training
Internet of Everything -Basic concepts details
Comparative analysis of machine learning models for fake news detection in so...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Custom Battery Pack Design Considerations for Performance and Safety
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Flame analysis and combustion estimation using large language and vision assi...
giants, standing on the shoulders of - by Daniel Stenberg
Dell Pro Micro: Speed customer interactions, patient processing, and learning...

OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking