Detecting IP KVMs, (Tue, Mar 24th)
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要理解文章的主要内容。 文章讲的是IP KVM设备的安全问题,特别是流氓IP KVM的威胁。作者提到这些设备常被犯罪分子用于远程访问,比如朝鲜人用来连接在美国的笔记本电脑。接着,文章讨论了IP KVM连接系统的方式,包括USB和HDMI,并测试了两种设备:PiKVM和NanoKVM。最后,作者提到EDID数据可以用来检测这些设备,但也有被修改的风险。 好的,现在我要把这些信息浓缩到100字以内。要抓住关键点:IP KVM的安全隐患、流氓设备的威胁、连接方式、检测方法以及潜在风险。 可能的结构是:首先说明IP KVM的安全隐患和用途,然后提到连接方式和检测方法,最后指出被修改的可能性。 确保语言简洁明了,不使用复杂的术语。同时避免使用“这篇文章”或“内容总结”这样的开头。 现在试着组织一下语言: “文章探讨了IP KVM设备的安全隐患及其作为流氓设备的威胁。这些设备常被用于非法远程访问,并通过USB和HDMI连接系统。检测方法包括识别USB设备和解析HDMI的EDID数据,但攻击者可能通过修改配置来规避检测。” 这样大约在100字左右,并且涵盖了主要点。 </think> 文章探讨了IP KVM设备的安全隐患及其作为流氓设备的威胁。这些设备常被用于非法远程访问,并通过USB和HDMI连接系统。检测方法包括识别USB设备和解析HDMI的EDID数据,但攻击者可能通过修改配置来规避检测。 2026-3-24 13:55:25 Author: isc.sans.edu(查看原文) 阅读量:2 收藏

I have written about how to use IP KVMs securely, and recently, researchers at Eclypsium published yet another report on IP KVM vulnerabilities. But there is another issue I haven't mentioned yet with IP KVMs: rogue IP KVMs. IP KVMs are often used by criminals. For example, North Koreans used KVMs to connect remotely to laptops sent to them by their employers. The laptops were located in the US, and the North Korean workers used IP KVMs to remotely connect to them. IP KVMs could also be used to access office PCs, either to enable undetected "work from home" or by threat actors who use them to gain remote access after installing the device on site.

IP KVMs usually connect to the system in two ways:

  • USB for keyboard/mouse
  • HDMI for the monitor connection (some older variants may also use VGA)

For my testing, I used two different IP KVMs. A "PiKVM" and a "NanoKVM" (Sipeed). Both were connected to Linux systems, but the techniques should work on other operating systems as well.

USB

For the Sipeed NanoKVM, "lsusb" give away the device: 

$ lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 002: ID 0bda:c821 Realtek Semiconductor Corp. Bluetooth Radio
Bus 001 Device 004: ID 051d:0002 American Power Conversion Uninterruptible Power Supply
Bus 001 Device 005: ID 3346:1009 sipeed NanoKVM
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub

PiKVM is a little bit less obvious, but this USB entry appears to be associated with PiVKM

Bus 001 Device 004: ID 1d6b:0104 Linux Foundation Multifunction Composite Gadget
Bus 001 Device 017: ID 1b3f:2008 Generalplus Technology Inc. USB Audio Device

This needs a bit more testing for the PiKVM.

HDMI

HDMI devices send "EDID" (Extended Display Identification Data) to the system the display is connected to. The main purpose of EDID is to communicate available video modes and resolutions. But it also includes manufacturer information. 

For the NanoKVM:

sudo get-edid | parse-edid
...
Section "Monitor"
        Identifier "Connector"
        ModelName "Connector"
        VendorName "VCS"
...

Not very obvious, but the "VCS" vendor name could be a reasonable indicator (check for false positives)

For PiKVM, the "Identified" and "ModelName"  are more telling:

Section "Monitor"
        Identifier "PiKVM V3"
        ModelName "PiKVM V3"
        VendorName "LNX"

Evasion

Of course, a more sophisticated attacker can modify these strings. PiKVM offers a configuration file to do so, in part to allow for better compatibility. I do not know whether the NanoKVM provides a similar, simple way to evade detection (but it is likely not terribly hard). So "sophisticated attacker" may translate to "able and willing to read the manual". 

Many endpoint protection solutions monitor USB devices and may alert on odd devices being connected. But I am not aware of any that check monitor EDID strings. This may be another neat feature for any solutions. In office environments, most organizations provide a limited set of monitor types. For home office use, things may be more complex as users often connect their own monitors.

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|


文章来源: https://isc.sans.edu/diary/rss/32824
如有侵权请联系:admin#unsafe.sh