Virtual Datacenter Infection: Attacking VDI from the Endpoint

45
Virtual Datacenter Infection: Attacking VDI from the Endpoint John Whaley, Geoffrey Thomas@joewhaley, @geofft

description

Many organizations have implemented VDI as a solution to desktop manageability and security concerns, believing that running desktops on a central server will improve security. However, VDI encourages end users to access their secure desktops from uncontrolled and unsecured clients. In this session, we will demonstrate an actual attack that works on all major VDI products whereby an infected endpoint can remotely compromise a VDI instance upon initial authentication, completely unbeknownst to the user. We will also discuss techniques to guard against these types of attacks. Topics include: • The security properties of VDI offerings from major VDI vendors • Real and theoretical attacks against VDI • A methodology for evaluating the security of a VDI solution • Best practices for securing VDI

Transcript of Virtual Datacenter Infection: Attacking VDI from the Endpoint

Page 1: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Virtual Datacenter Infection:Attacking VDI from the Endpoint

John Whaley, Geoffrey Thomas@joewhaley, @geofft

Page 2: Virtual Datacenter Infection: Attacking VDI from the Endpoint

7/20/2014

Page 3: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 4: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 5: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

Page 6: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

Page 7: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

NOTHING IS LEAVING THE DATA CENTER

Page 8: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 10: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 11: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 12: Virtual Datacenter Infection: Attacking VDI from the Endpoint

The Hoff Says...

Page 13: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 14: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 15: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 16: Virtual Datacenter Infection: Attacking VDI from the Endpoint

https://github.com/joewhaley/VirtualRubberDucky

Virtual Rubber Ducky

Page 17: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Rubber Ducky Attacks

Page 18: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Input Injection / Logging

Page 19: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Pasty Attacks

Page 20: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Stealing Data via QR code

Page 21: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 22: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Secret Channel via Image Steganography

Page 23: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Secret Channel via Audio

Page 24: Virtual Datacenter Infection: Attacking VDI from the Endpoint

pwn the browser

Page 25: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Side-Channel Attacks

Page 26: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Keystroke timings are predictable

Page 27: Virtual Datacenter Infection: Attacking VDI from the Endpoint

…and easy to extract with a packet trace

Page 28: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 29: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Side-channel attacks on the server

Page 30: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Defending Against Rubber Ducky Attacks

Page 31: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Securing the Client

Page 32: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Doesn’t help:●Password policies●Multifactor authentication

Page 33: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Defense in Depth

Page 34: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Security vs Usability

Page 35: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Host Assessment Check(Malware Scan)

Page 36: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Dumb Terminal(a.k.a. “thin client”)

Page 37: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Locked-Down Environment

Page 38: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Weak Defenses

Page 39: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Run Local, Not Remote

Page 40: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 41: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 42: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 43: Virtual Datacenter Infection: Attacking VDI from the Endpoint

VDI Security

Page 44: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Implementation Challenges

• PCoIP input issues– Drops/reorders keystrokes– Key repeat issues– Happens even with fast typing ☹

• VMware: no accessibility support

• QR code not optimized for screenshots

• RDP sound cuts out too much for modem

7/20/2014

Page 45: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Conclusions

1. There is no defense against a sophisticated, malicious user.

2. There are fundamental architectural limitations to hosted desktops.

3. There are some good reasons to do VDI. Security is not one of them.