29C3 - Version 1.9

F/a{hr-p).l//a,n
2.9/C-3

Speakers
James Forshaw
Schedule
Day Day 2 - 2012-12-28
Room Saal 4
Start time 23:00
Duration 01:00
Info
ID 5104
Event type Lecture
Language used for presentation English
Feedback

ESXi Beast

Exploiting VMWARE ESXi Binary Protocols Using CANAPE

This presentation will cover a demonstration of the new version of the Canape protocol analysis tool being released for Ruxcon. During the course of the presentation various attack scenarios against the VMWare ESXi binary protocol will be demonstrated using Canape.

The VMWare ESXi protocol is a complex multi-layered protocol which transitions between many protocol states throughout a connection lifetime. The protocol uses multiplexed frames, compression and encryption all over a single TCP connection. The talk will discuss and outline serious weaknesses within the ESXi protocol and how these can be leveraged from within Canape.

During the talk, new features of Canape will be demonstrated live to show the audience how the tool can be used from traffic interception and initial protocol dissection through data injection and fuzzing and finally demonstrating full PoC exploitation all within Canape.

Presentation outline:

  • What is Canape
  • Examining the VMWare ESXi protocol
  • Demonstrating ESXi protocol interception
  • Intercepting the ESXi encryption
  • Data injection to brute force user credentials
  • Fuzzing ESXi
  • 0day demonstration
  • Questions

Testing and exploiting binary network protocols can be both complex and time consuming. More often than not, custom software needs to be developed to proxy, parse and manipulate the target traffic.

Canape is a network protocol analysis tool which takes the existing paradigm of Web Application testing tools (such as CAT, Burp or Fiddler) and applies that to network protocol testing. Canape provides a user interface that facilitates the capture and replaying of binary network traffic, whilst providing a framework to develop parsers and fuzzers.