Download - Virtual Datacenter Infection: Attacking VDI from the Endpoint

Transcript
Page 1: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Virtual Datacenter Infection:Attacking VDI from the Endpoint

John Whaley, Geoffrey Thomas@joewhaley, @geofft

Page 2: Virtual Datacenter Infection: Attacking VDI from the Endpoint

7/20/2014

Page 3: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 4: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 5: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

Page 6: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

Page 7: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Not business information:

NOTHING IS LEAVING THE DATA CENTER

Page 8: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 10: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 11: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 12: Virtual Datacenter Infection: Attacking VDI from the Endpoint

The Hoff Says...

Page 13: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 14: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 15: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 16: Virtual Datacenter Infection: Attacking VDI from the Endpoint

https://github.com/joewhaley/VirtualRubberDucky

Virtual Rubber Ducky

Page 17: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Rubber Ducky Attacks

Page 18: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Input Injection / Logging

Page 19: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Pasty Attacks

Page 20: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Stealing Data via QR code

Page 21: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 22: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Secret Channel via Image Steganography

Page 23: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Secret Channel via Audio

Page 24: Virtual Datacenter Infection: Attacking VDI from the Endpoint

pwn the browser

Page 25: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Side-Channel Attacks

Page 26: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Keystroke timings are predictable

Page 27: Virtual Datacenter Infection: Attacking VDI from the Endpoint

…and easy to extract with a packet trace

Page 28: Virtual Datacenter Infection: Attacking VDI from the Endpoint

DEMO

Page 29: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Side-channel attacks on the server

Page 30: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Defending Against Rubber Ducky Attacks

Page 31: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Securing the Client

Page 32: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Doesn’t help:●Password policies●Multifactor authentication

Page 33: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Defense in Depth

Page 34: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Security vs Usability

Page 35: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Host Assessment Check(Malware Scan)

Page 36: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Dumb Terminal(a.k.a. “thin client”)

Page 37: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Locked-Down Environment

Page 38: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Weak Defenses

Page 39: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Run Local, Not Remote

Page 40: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 41: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 42: Virtual Datacenter Infection: Attacking VDI from the Endpoint
Page 43: Virtual Datacenter Infection: Attacking VDI from the Endpoint

VDI Security

Page 44: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Implementation Challenges

• PCoIP input issues– Drops/reorders keystrokes– Key repeat issues– Happens even with fast typing ☹

• VMware: no accessibility support

• QR code not optimized for screenshots

• RDP sound cuts out too much for modem

7/20/2014

Page 45: Virtual Datacenter Infection: Attacking VDI from the Endpoint

Conclusions

1. There is no defense against a sophisticated, malicious user.

2. There are fundamental architectural limitations to hosted desktops.

3. There are some good reasons to do VDI. Security is not one of them.