Digging for dark IPMI devices: Advancing BMC detection and evaluating operational security

Oliver Gasser, Felix Emmert, Georg Carle

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

3 Zitate (Scopus)

Abstract

IPMI is the industry standard for managing devices remotely independent of their operating status. Since there are known vulnerabilities in the protocol, IPMI devices should not be directly reachable on the Internet. Previous studies suggest, however, that this best practice is not always implemented. In this paper we present a new unintrusive technique to find dark IPMI devices through active measurements. These dark devices do not respond to conventional IPMI connection setup requests. Using our technique, we find 21 % more devices than previously known techniques. This adds a significant number of IPMI devices which could be exploited by an attacker using a Man-in-the-Middle attack. We further reveal that IPMI devices are heavily clustered in certain subnets and Autonomous Systems. Moreover, the SSL security of IPMI devices' web-interface is well below the current state of the art, leaving them vulnerable to attacks. Overall our findings draw a dire picture of the current state of the IPMI deployment in the Internet.

OriginalspracheEnglisch
TitelTraffic Monitoring and Analysis - 8th International Workshop, TMA 2016
Herausgeber (Verlag)International Federation for Information Processing, IFIP
ISBN (elektronisch)9783901882920
PublikationsstatusVeröffentlicht - 2016
Veranstaltung8th International Workshop on Traffic Monitoring and Analysis, TMA 2016 - Louvain la Neuve, Belgien
Dauer: 7 Apr. 20168 Apr. 2016

Publikationsreihe

NameTraffic Monitoring and Analysis - 8th International Workshop, TMA 2016

Konferenz

Konferenz8th International Workshop on Traffic Monitoring and Analysis, TMA 2016
Land/GebietBelgien
OrtLouvain la Neuve
Zeitraum7/04/168/04/16

Fingerprint

Untersuchen Sie die Forschungsthemen von „Digging for dark IPMI devices: Advancing BMC detection and evaluating operational security“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren