How to not do a live-hacking reportage

Today while reading ITSEC news (we publish only a fine selection of them on an article caught our interest: it was a television reportage about a live-hacking session performed by a security company called Compass Security AG ( for one of their SCADA customers. This type of marketing material is always entertainment but this was more entertainment than the average! The video is available at the URL and has already been broadcasted. Take a look at the following frame.

Nmap, as featured in TV

Noticed nothing? Err.. Is that public address space?

Well, it’s clearly not a wise move to publish a routable IP address, belonging to a customer infrastructure and probably the command center for their SCADA gears, together with it’s open port information (5900/tcp open VNC)! It seems a clear call to army for the random cracker who wants to burn some bits over his internet pipe! For the most careful watchers: surely you noticed the Siemens logo in a background browser window and below a “Servlet login” link.

The nmap terminal is a journalism classic, as seen in movies, unreadable green characters on a dark background, is able to make the ITSEC illiterate’s fantasies run wild. But a security company leaking data? In it’s own marketing video? Leaking data is a customer role!

$ whois 46.14.XXX.XX

% Information related to ' -'
% Abuse contact for ' -' is ''

inetnum: -
netname: CH-CYBERNET-20100928
descr: Swisscom (Schweiz) AG
country: CH
admin-c: SG7777-RIPE
admin-c: CHCN1-RIPE
tech-c: CHCN1-RIPE
mnt-lower: SUNWEB-MNT
mnt-routes: SUNWEB-MNT
mnt-domains: SUNWEB-MNT
source: RIPE # Filtered

The IP belongs to a /16 netblock managed by Swisscom AG and a reverse tell us that they are static IP customers (perhaps single IP ADSLs?).

$ nmap 46.14.XXX.XX -p 5900-6000 -PN

Starting Nmap 5.21 ( ) at 2013-07-03 14:25 CEST
Nmap scan report for (46.14.XXX.XX)
Host is up (0.091s latency).
Not shown: 100 filtered ports
5900/tcp open vnc

Nmap done: 1 IP address (1 host up) scanned in 3.60 seconds

The VNC service is still there, so now we have a better idea about the technique used to penetrate that SCADA dashboard.

$ vncviewer 46.14.XXX.XX
Connected to RFB server, using protocol version 3.3
Performing standard VNC authentication

Better to stop here :)

Thanks for leaking our address space!

 Thanks for leaking our data!

We have no idea if that IP is of an actual customer or belongs to an honeypot.. In the first case the Penetration Test was not very successful as the customer did not follow the remediation plan by fixing it’s vulnerability correctly; exposing administrative interfaces, especially VNC services to the Internet is a really bad idea. In the second case we are happy to throw more data to the analyst!