+ All Categories
Home > Documents > Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against...

Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against...

Date post: 24-Mar-2018
Category:
Upload: lamkhuong
View: 221 times
Download: 4 times
Share this document with a friend
45
Attacking Biometric Access Control Systems By: Zamboni
Transcript
Page 1: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Attacking Biometric Access Control SystemsBy: Zamboni

Page 2: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Outline

Overview of biometricsGeneral methodology used to attack biometric systemsExample attacks against physical access control systemsDefensesQuestion

Page 3: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

BiometricsUnique and (relatively) permanent physical or behavioral characteristic that can be used to identify or authenticate a userExamples:

Finger printsHand geometryVascular patternsRetinaIrisVoice pattern

AdvantagesUniquePart of the userVery hard to forgot or loseCan provide reliable authentication

Page 4: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Disadvantages & Problems

Cannot be kept secretSome can be copied or stolenCannot be reset or revokedMake insecure cryptographic keysCommon across multiple systems/organizationsSystem accuracy is dependent on enrollment verificationSystem can be manipulated if more than one person has access to the reader or resource

Page 5: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Basic Biometric Process

1. Collection at the Biometric Sensor: System captures physical or behavioral characteristic

2. Feature Extraction: Template is created3. Comparison: New template is compared

with stored templates to produce a matching score

4. Result: System returns a match or non-match result

Page 6: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Basic Biometric Process

Page 7: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Identification vs. Authentication

Identification tells who someone isAuthentication verifies that someone is who he/she claims to beTypes of authentication:

Something you knowSomething you haveSomething you are

Page 8: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Template VerificationIdentification

One-to-many searchDoes the system recognize you?Steps:

1) User presents a characteristic to the system2) User template is compared to each template in the database for a match

Authentication (Verification or positive matching)One-to-one searchAre you who you claim to be?Steps:

1) User provides user name, PIN or other form of identification2) User presents a characteristic to the system3) User template is only compared to template associated with that specific user

Page 9: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Template Matching

Matching is approximateProblems with this

Can not give a categorical yes or noCan only say that templates match with a confidence level of 99%

AKA: Loose equality or close equality

Page 10: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Error RatesType I – FRR (False Reject Rate)

Rate at which system denies access to a legitimate user

Type II – FAR (False Acceptance Rate)Rate at which system authenticates an un-enrolled userImportant: Even without an intruder a system could wrongly authenticate a user

CER: Cross-over Error Rate (Equal Error Rate)

Point at which Type I and Type II errors are equalMost realistic and reasonable rate to use when comparing biometric systems

Page 11: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Attacking Biometric Systems

Page 12: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

General Attack InformationSecurity is only as good as the weakest linkTry traditional attacks first

Traffic replaySpoofingPassword guessingBruteforce

Examine system connectionsHow secure are the connections?

Proprietary systems: security through obscurityDownload vendor’s docs and look for default passwords, SNMP strings, etcOften vulnerable to traditional attacks

Attack Windows and Unix systems which are part of the biometric system like you would any other Windows or Unix boxKnow the OEM

Find the OEM for the device; research known exploits against their productsFind other manufactures that source from that OEM and research exploits against their products

Page 13: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Words of Caution

Some systems are fragileEven a simple portscan can crash some systemsApproach readers and panels with cautionSystem instability could be caused by misconfiguration

Very common: misconfigured Lantronix Micro100 serial server

Recommend excluding port 30718 from port scansOthers are intrinsic product flaws

If possible test attacks first in a lab or non-production environment

Page 14: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Nine Generic Attack Points

Overview of where to attack a biometric systemGeneral methodology can be applied to all biometric systemsN.M. Ratha, J.H. Connell and R.M. Bolle: “An Analysis of Minutiae Matching Strength”

8 attack pointsNinth point

Page 15: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Attack Points

Page 16: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 1 Attack

Page 17: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 1 Attack

Attacking the biometric sensorPresent a fake biometric to the sensor that mimics an authorized user.Examples:

Fake gelatin fingersPicture of an irisVoice recording

Page 18: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 2 Attack

Page 19: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 2 AttackAttacking communications from the biometric sensorNot always an option: biometric sensor and feature extractor are sometimes combinedAttacker can intercept data sent by sensorAttacker could send malicious data to the feature extractor

Replay attackExamples:

Hill Climbing attackDecoding intercepted WSQ files to make fake fingerprintsInjecting malicious WSQ files into the system

Page 20: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 3 Attack

Page 21: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 3 Attack

Manipulating/overriding feature extraction and template creation processUsually an attack on software or firmwareExamples:

Generating a template preselected by the attackerSteal templates generated by the system

Page 22: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 4 Attack

Page 23: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 4 AttackAttacking the communication channel between template creation unit and the comparison unitLarge threat when templates are compared on a remote systemExamples:

Intercept a valid user template for later useInject a malicious templateInject malicious templates to bruteforce the system

Easier to inject bruteforce traffic here than when it leaves the biometric sensorTemplates are simpler than unprocessed biometricSmaller keyspaceNot a very useful attack without knowing template format

Page 24: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 5 Attack

Page 25: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 5 AttackAttacking the template comparison unitClose equality makes some attacks possible hereTemplates must be in the clear when they are comparedCan be an attack on software, firmware or configurationExamples:

Modify matching software to produce artificially low or high scoresChange the threshold for a successful match

Can make spoofing attacks easierEnd users will not notice this change because system will continue to authenticate themSome systems have a lower limit on the matching score thresholdOn some systems the setting is configurable over the network or configurable locally with the appropriate software package and aPDA.

Page 26: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 6 Attack

Page 27: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 6 AttackAttack or tamper with stored templatesSome systems support more than one template per user

Beware of duress templates(!)Examples:

Steal a templateAssociate a malicious template with an already enrolled userEnroll a malicious user

Page 28: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Four Ways to Store TemplatesOn Reader or Device

QuickNo network access requiredLimited storage spaceInconvenient manual loading

Central ServerEfficient management of multiple users across multiple systemsDependant on a networkBackend server can be attackedTransportation and storage security a concern

Access Card or TokenQuickUser controls the templateToken or access card can be stolenNeed to worry about secure storage and transmission

Hybrid – Combination of the aboveExamples:

Templates stored on a central server but cached on the readerTemplates stored on a smartcard and stored on central server to make rebadging easier

Page 29: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 6 (Cont.)Central server:

Template usually stored in a database or flat fileTry traditional attacks

Access card or tokenAttacks on proximity cardsPoor read/write protection RFID

Acquiring a template to injectSteal from a central server, card or readerBuy a reader and create your own templates

Template created on company X, model Y systems will work on all model Y system by company X

Page 30: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 7 Attack

Page 31: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 7 AttackAttacking the transmission of stored templatesData can be corrupted, intercepted or modifiedTraffic is often unencrypted when send over Ethernet or serial networksTemplates stored on cards or tokens:

RFID usually transmits in the clearParts of Mifare and HID iClass transmissions are encrypted

Recent attack on the Texas Instruments DST chipsReplay attacks on proximity cards

Examples:Sniffing traffic to steal templatesInjecting templates to falsely authenticate a malicious user

Page 32: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 8 Attack

Page 33: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 8 Attack

Overriding the final decisionIf the final match decision can be overridden by an attacker than the system has been defeated

Page 34: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 9 Attack

Page 35: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Type 9 Attack

Attacking the transmission of enrollment templates to the storage locationSimilar to attacks at point 4 but with potential longer lasting affects

Could permanently add malicious template into the system

Page 36: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Examples

Names withheld to protect the triumphant

Page 37: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Simple Biometric Access Control System

Common setup used by many biometric readers that store templates on the reader

Step to authenticate a user:1. User presents card or enters PIN2. PIN or card number is sent to the

biometric reader3. Reader finds template for the user4. Reader compares templates5. If they match the PIN or card

number are send to the access control panel

6. If that user has access to that door the control panel unlocks the door

Page 38: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Using Wiegand InjectionInject the card number of a legitimate user into a Wiegand line

Using a Wiegand magcard reader1. Gain access to the Wiegand line for the Biometric reading

Remove Biometric reader from wallAccess wires in drop ceiling or other non-secure area

2. Connect the Wiegand magcard reader to the Wiegand line3. Create a custom magcard with the card number of the user you

wish to impersonate4. Swipe card through reader to send card number5. Open door

Using a RS-232 to Wiegand converter1. Gain access to the Wiegand line for the Biometric reading

Remove Biometric reader from wallAccess wires in drop ceiling or other non-secure area

2. Connect the RS-232 to Wiegand converter3. Send card number4. Open door

Page 39: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Using Wiegand Injection Defenses

Defense:Install tamper switches on readersMonitor for communication errors from readersChange keycode on locks used to secure readersIf possible use high security locks to secure readers and panelsProtect all Wiegand lines using hard conduitHave camera coverage on all readers

Page 40: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Biometric System with Templates at a Central Location

Step to authenticate a user:1. User presents card2. Card number is sent to the

biometric reader3. Reader request template for

that user4. Server sends template to the

reader5. Reader compares templates6. If templates match, the card

number is send to access control panel

7. If that user has access to that door control panel unlocks the door

Page 41: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Attacking the Central ServerMSDE used to store the templates

Unpatched by defaultWeak SA password

Steps to attack the templates on the server1. Gain access to the database using know vulnerability2. Locate the templates3. Associate an already enrolled user template with a user who has higher

access privilegesDefenses:

Patch and harden the system used to store the templatesMonitor for intrusions on the system

Note: PIN or card number stored in the clear in the databaseBeware of injecting duress templates

Page 42: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Defenses: Things You Can DoTest systems to know their weakness so threats can be better mitigatedUse man traps to allow only one person to have access to the biometric reader at once.Monitor for false readings/failed authentication attemptsHave a camera covering each readerHarden and patch all servers and workstations in the biometric systemInstall tamper switches on all readersActivate liveliness detection on all readersCombine biometrics with a second or third form of authentication

Page 43: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Defenses: Vendor Action

Add time stamp and sequence number to data in order to prevent reply attacksOutput matching scores in wider increments to protect against Hill Climbing attacksMutually authenticate readers and panels/backend serversEncrypt all data transmissions using proven encryption algorithmsInstall server and workstation software as secure by default

Page 44: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Conclusion

Use the nine attack types to locate weak points in a systemTry traditional attacks firstOnly way to determine how secure a biometric systems is to:

Test it yourselfAttack it yourselfBreak it yourself

Physical security people will need help to do this

Page 45: Attacking Biometric Access Control Systems - DEF CON · PDF fileExample attacks against physical access control systems ... Attack Windows and Unix systems which are part of the biometric

Questions?

[email protected]/biometrics/


Recommended