Blog

Blog

Penetration Tester Exploits Printer to Access Network

By: Nick VanGilder on May 29, 2018 7:38:21 AM

nick6During our internal penetration test engagements, we regularly come into contact with multifunction printers that are still using the default administrative login credentials. Obviously, using default credentials is never a good idea and I'd like to show how we can often pivot from these seemingly innocent multifunction devices and ultimately obtain total compromise of an environment.

In addition to default credentials issue mentioned above, one of the most common mistakes that we observe is MFP devices that have been configured to use privileged accounts (like Domain Admin) for sending scanned documents to network locations. For example, see below:

nick1

In many cases, it's fairly trivial for an intruder to access the masked password. All it requires (usually) is a small modification to the HTML code within a web browser.

nick2

In this situation, we just needed to locate the correct form and change: input type="password" to input type="text"

nick3

Secondly, this particular device was also configured to use LDAP. So, as the device is used throughout the day, authentication requests are made to Windows Active Directory servers. In my experience, organizations rarely utilize LDAP over SSL (LDAPS) in order to encrypt traffic and transmit information securely.

We can take advantage of this oversight by simply reconfiguring the MFP to use a different IP address for the LDAP server. Obviously, the IP address that we choose needs to be under our control and listening on port 389 (unsecured LDAP). When the MFP eventually makes an LDAP query, it should transmit the credentials back to us in plaintext.

nick4

We can see (below) that we were able to catch the plaintext credentials of the account (Domain Admin) when an authentication attempt was made:

nick5

In closing, below are some suggestions mitigating MFP risks:

  1. Regardless of the type of device, always change the default password to something complex.
  2. Whatever you change the password to, don't reuse that password anywhere else.
  3. Understand the security capabilities that systems offer and utilize them to their fullest potential. For example, if your device supports LDAP over SSL ... use it.
  4. Organizations have gotten better about hardening servers and workstations - but don't neglect hardening other devices on your network too (printers, scanners, routers, switches, firewalls, etc). These devices often pose significant risk because they have unnecessary features enabled.
  5. Be extremely careful where you're utilizing your privileged accounts. Domain Admin-level accounts should never be used on MFPs, workstations, or other lower privileged systems that have a higher likelihood of being compromised.

In addition, we have not discussed conducting SMB relay attacks from MFP devices, but this is also a possibility and something that we'll cover in a future post.

nick

 

Nick VanGilder is Lead Penetration Tester for C Spire Business' Cybersecurity Consulting Group. Contact him at ask@cspire.com


C Spire Business is a privately-held telecommunications and technology company driven to deliver the best experiences in wireless, fiber internet, and business IT solutions such as internet, VoIP, cloud and managed services. Read more news releases and announcements at cspire.com/news. For more information, visit cspire.com or find us on Facebook, Twitter or Instagram.

The information contained in this site is provided for informational purposes only, and should not be construed as legal advice on any subject matter.

Sign up for our monthly newsletter.

For the latest in technology trends, industry news, and C Spire updates.

New call-to-action
Microsoft 365 Free One Month Trial
Cisco Webex Learn More

Sign up for our monthly newsletter

For the latest in technology trends, industry news, and C Spire updates.

Recent Posts