Penetration Testing in Healthcare
- Oct 04, 2013
- Guest Author
In September the deadline for compliance with changes to the HIPAA rules relating to breaches of unsecured electronic Protected Health Information went into effect. At NopSec, we understand security-related processes and the risks associated with electronic protected health information (ePHI). The following post describes a recent penetration testing engagement that helped one of our customers address serious security vulnerabilities in an embedded medical device.
The medical device that was the target of our penetration test was a sensitive device used in heart monitoring. There are three components in this medical device:
The device sends a burst of radio frequency energy to activate the sensor in the heart. This sensor then measures the required parameters and reports the results.
Now that we understand the medical components part of this test, let’s dive into into the objective, methodology and execution to understand what we did.
Our objective was to mimic an adversary possessing the medical device and trying to gain root access to the machine in order to identify any sensitive and confidential information.
The first step in our process was to gather publicly available information about the device through the company website, hardware and software manuals, and manuals of similar products. From this we were able to discern that the medical device was running a version of Windows XP Embedded.
Inspecting the physical device we determined that there were USB and Smartcard inputs/outputs. Additionally, by disassembling the device we discovered an Ethernet port and flash storage.
We prioritized our attack vectors in descending order of priority (Ethernet port, flash storage, and USB port) and proceeded to build a toolkit. “Ctrl Alt Del” provided a login prompt that exposed usernames so we determined the first objective was to crack the root and patient accounts using the “etc passwd” and “etc shadow” file with the intention of obtaining terminal access to the device. The operating system did not maintain shadow file and hence we were able to obtain the encrypted passwords from “etc passwd”. We launched JohnTheRipper(JTR) to crack the passwords for root, patient or service accounts.
Based on the above files, we tried to use the passwords we found on the filesystem for the user patient in the login panel and we were successfully logged in to the operating system. Before moving on to escalating privileges, we checked if the same password would work for root account. Interestingly, we were able to login as root into the medical device operating system using the same password thereby gaining complete access to the machine. PWNED!
Learn more about NopSec’s approach to penetration testing and the methodology we use to secure applications, infrastructure, and devices from security breaches. Best Practices Guide: Penetration Testing.