Hacker News new | past | comments | ask | show | jobs | submit login
Pen Testing Ships. A year in review (pentestpartners.com)
80 points by omnibrain on Feb 19, 2020 | hide | past | favorite | 23 comments



"password re-use across an environment is endemic..." What is the solution against this? I just can't identify with the "D’OH!". People want to get their work done. They will use whatever gets the job done. If there is an easier, better way they will use that. So how can we provide them systems where the easier, better way is also safer? What is the current best practice in this area?


Smart cards with NFC? YubiKeys with the button?

A small personal password plus the second factor should work well enough on ships.


If you can do the second factor, why bother with the password?


A simple password or a pin code does mitigate quick attacks of opportunity using lost or stolen physical factor; and adds non-repudiation if someone uses someone else's token - you can't just say "oh we must have accidentally swapped our cards at lunch" if you had to enter their pin as well.


Serious question: How often do such employees/contractors claim to have accidentally swapped keys at lunch?


Given the existing password hygiene, I think it's more likely that any new PIN or password would be treated in the same manner as the existing ones, and would just be an additional hassle.


I would love to know this as well. The rise of 2FA has made everything more secure for sure, but it has made usability plummet like a rock on Jupiter. Especially in a corporate environment where you have multiple layers of tokens, authenticators and passwords.

Password managers do help, but you still need to click and enter and copy paste many many times a day.

If only someone like apple / microsoft / google came up with a comprehensive solution to all this - as they seem to be the only entities big enough to shoulder such a monumental task.

I mean Apple sorta kinda does, but only for its own services. I have an apple watch, it knows that its me and its authenticated. The proximity with my laptop unlocks it automatically - so far so good, but why can’t I use the same thing for github/google/microsoft websites? Why can’t safari send some sort of token through to then authenticating that its me? I mean if you’re afraid it might be someone else at the computer - _check the damn watch proximity again_! And if there’s a need for personas - sure but they are all still linked to me. I would imagine there could be like a system dialog where I choose which persona to send to a specific site/app. /rant


I can't imagine 2FA on something like a ship at sea, that may or may not have a working uplink to high latency satellite internet, and probably not SMS that many 2FA providers use.


Which is why your second factor would be a physical key, authenticated locally. 2FA doesn't have to require internet access, it just needs two factors!


TOTP and U2F should both work fine with no network connectivity.


Security and access aren't separate concerns. They are opposite sides of the spectrum. Security reduces access. That is what it is designed to do. Anything that makes a system more accessible makes it less secure.


I don't know either. If you visit any manufacturing plant, you'll see passwords written in permanent marker on pretty much every enclosure.

Maybe badge swipe and personal pin? (how long until the pin gets written on the badge?)


For some threat models, that is okay. Indeed, for many manufacturing machines, there is no need for a login screen -- it is simply something intrinsic to modern OS design.


The cruise booking hacks caught my attention...

In any case, I still find myself removing sticky notes on monitors with passwords. One time, I caught them mass producing login credentials on avery label sheets. I nearly lost it on the poor reception staff.


I used to keep a fake password sticky on my monitor to make people like you lose it. :)


It would take some work, but I'd really love to have a password that, if entered, would trigger an alert (and maybe power off the machine or something). Then put that booby-trapped password on a bit of paper and stick it under your keyboard or wherever.


There’s a company that makes exactly this - https://canary.tools/


One of the competitions in Hack the Machine[0] brings in a copy of the setup of the bridge[1] of a ship and you're allowed to attack in a lot of ways. It was impressive.

[0] https://www.hackthemachine.ai

[1] https://www.hackthemachine.ai/track1/


Stupid question: What are "OT" and "IT" in this context?


Answered my own question:

Information Technology (IT): “The entire spectrum of technologies for information processing, including software, hardware, communications technologies and related services. In general, IT does not include embedded technologies that do not generate data for enterprise use.”

Operational Technology (OT): “Is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise.”

https://www.globalsign.com/en/blog/it-vs-ot-industrial-inter...

So basically OT is IoT and embedded devices, and IT is everything else on your network.


Yes, think of OT as the device that connects sensors to actions: When this limit switch is tripped, that servo is activated. You may also want to know how many times each switch is activated, and the status of the servo, so the information gets sent over to IT for logging and display in a HMI.


Operational technology and Information Technology I would assume.


I've been a programmer for 15+ years, and for some reason I thought that IT meant Internet Technology...

oops




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: