internet of things iot
play

Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of - PowerPoint PPT Presentation

Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of Smart Devices ITAC 2015 29 Sept 2015 Presen sented ed b by: Francis Brown & Steve Christiaens Bishop Fox, LLC www.bishopfox.com Agenda O V E R V I E W Introd


  1. Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of Smart Devices ITAC 2015 – 29 Sept 2015 Presen sented ed b by: Francis Brown & Steve Christiaens Bishop Fox, LLC www.bishopfox.com

  2. Agenda O V E R V I E W • Introd oduction on/B /Bac ackgr grou ound • IoT News and Current Landscape • Corp concerns, Personal / Privacy Issues • Examples: Cars, Fridges, TVs, Wearables, … • Target eting ng Io IoT T – vi via a Int Inter ernet net • Google/Bing/SHODAN/Maltego Hacking • Internet Census 2012, Scans.io, Zmap, MassScan, other mass scanning projects • Target eting ng Io IoT T – over er t the he Air Air • Wi-Fi, Bluetooth, ZigBee, Z-Wave, RFID, NFC, etc. • Hacking devices: Wi-Fi Pineapplers, Kali Tablets, RaspPis, Custom Gear • Target eting ng Io IoT T – up c close, e, Physically lly • USB Rubber Duckies, Teensy Arduino Devices, BadUSB type attacks • Def efens enses es 2

  3. RickMote – Hacking TVs DEMO MO - CHROMECAST - STREAMING DEVICE HACKING 3

  4. Introduction/Background GETTING UP TO SPEED 4

  5. OWASP – IoT Top 10 T O P 1 0 L I S T – Internet of Things 5

  6. IoT - Special Focus B E W A A R R E E E Y E E S S A N D N D E A R R S … S … a and nd robot ha hand nds 1. Cameras / WebCams 2. Microphones 3. Robots … terminators… 6

  7. Twitter Feed WebCams C R E E P Y W E B C A M S V I E W E R S #CAUGHTONNESTCAM 7

  8. Baby WebCams Feb 2015 W O R S T N I G H T M A R E S 8

  9. Smart TVs Feb 2015 L I S T E N I N G C L O S E L Y 9

  10. ILLUSTRATIVE FOOTAGE Video - DEMO 10

  11. Plane Hacking Apr 2015 P a s s e n g e r 3 1 3 3 7 11

  12. Smart Watches July 2015 I N S E C U R I T Y O N T H E G O “A study conducted by HP’s Fortify on security features implemented by Smartwatches revealed that not even a single device found to be 100 percent safe.” 12

  13. Vehicle Attacks July 2015 G O N E I N 6 0 S E C O N D S … 13

  14. ILLUSTRATIVE FOOTAGE Video - DEMO 14

  15. Vehicle Attacks July 2015 … O R L E S S 15

  16. Fridge Hacking Aug 2015 I N T H E H O M E 16

  17. Microsoft IoT Big Push Aug 2015 I O T I N T H E M A I N S T R E A M 17

  18. Baby Monitors Sept 2015 B O R N I N T H E U . S . A . 18

  19. ILLUSTRATIVE FOOTAGE Video - DEMO 19

  20. FBI Warning - PSA Sept 2015 I O T I S D A N G E R O U S 20

  21. IoT Legal Climate Sept 2015 S A M E O L D D E B A T E S 21

  22. Targeting IoT Systems OVER THE INTERNET – SEARCH ENGINES 22

  23. Diggity Tools S E A R C H E N G I N E H A C K I N G 23

  24. IoT and Google G O O G L E H A C K I N G 24

  25. Google Diggity D I G G I T Y C O R E T O O L S 25

  26. IoT and Bing B I N G H A C K I N G 26

  27. Bing Diggity D I G G I T Y C O R E T O O L S 27

  28. N E W G O O G L E H A C K I N G T O O L S SHODAN Diggity 28

  29. SHODAN I O T / H A C K E R S E A R C H E N G I N E • Indexed service banners for whole Internet for HTTP (Port 80), as well as some FTP (21), SSH (22) and Telnet (23) services - https://www.shodan.io/ 29

  30. IoT and SHODAN S H O D A N H A C K I N G 30

  31. IoT and SHODAN S H O D A N H A C K I N G 31

  32. IoT and SHODAN S H O D A N H A C K I N G 32

  33. Mr. Robot H V A C C O M P R O M I S E 33

  34. ILLUSTRATIVE FOOTAGE Video - DEMO 34

  35. SHODAN Diggity F I N D I N G S C A D A S Y S T E M S 35

  36. SHODAN Alerts S H O D A N R S S F E E D S 36

  37. INTERNET MASS SCANNING Scanning the Whole Internet 37

  38. Internet Census 2012 N M A P O F E N T I R E I N T E R N E T • ~420k botnet used to perform NMAP against entire IPv4 addr space! • ICMP sweeps, SYN scans, Reverse DNS, and Service probes of 662 ports • Free torrent of 568GB of NMAP results (9TB decompressed NMAP results) 38

  39. Internet Census 2012 E X A M P L E - S N M P R E S U L T S 39

  40. Internet Census 2012 E X A M P L E - S N M P R E S U L T S 40

  41. HD’s Serial Offenders D A T A M I N I N G C E N S U S 41

  42. Scans.io – Huge Repo R E G U L A R S C A N S O F I N T E R N E T 42

  43. Masscan S C A N T H E I N T E R N E T 43

  44. Wireless Hacking Tools IOT HACKING OVER THE AIR 44

  45. RickMote – Hacking TVs CHROMECAST - STREAMING DEVICE HACKING 45

  46. Wi-Spy – Spectrum Analyzer W I R E L E S S A N A L Y S I S Wi-Spy DBx Pro - USB Spectrum Analyzer with Chanalyzer Pro Software 46

  47. NirSoft Wireless Tools W I N D O W S H A C K I N G T O O L S • NirSoft – WirelessNetView • NirSoft – Wi-FiInfoView • NirSoft – Wireless Network Watcher • NirSoft – Wi-FiChannelMonitor 47

  48. inSSIDer Wi-Fi Scanner W I N D O W S H A C K I N G T O O L S 48

  49. inSSIDer Wi-Fi Scanner A N D R O I D H A C K I N G T O O L S 49

  50. Aircrack-ng Suite L I N U X H A C K I N G T O O L S 50

  51. inSSIDer for Mac M A C O S X H A C K I N G T O O L S 51

  52. NetSpot for Mac M A C O S X H A C K I N G T O O L S 52

  53. Kali VM + USB Adapter E A S Y W I R E L E S S A T T A C K P L A T F O R M • Kali Linux VM + TP-LINK - TL-WN722N (USB) + Yagi + 53

  54. Pwn Pad 2014 N E X U S 7 P E N T E S T D E V I C E 54

  55. Pwn Pad 2014 N E X U S 7 P E N T E S T D E V I C E 55

  56. Kali NetHunter N E X U S 7 P E N T E S T D E V I C E Nexus7 (2013 – Wi-Fi) – Android Tablet – Non - PwnPad2014 56

  57. Bluetooth Low Energy https://hakshop.myshopify.com/products/ubertooth-one 57

  58. Bluetooth – Other • Bluetooth Modules: • SparkFun BLE Mate 2 • Bluetooth Mate Gold - Sparkfun • Bluetooth Module Breakout - Roving Networks (RN-41) • Bluetooth Modem - BlueSMiRF Silver (RN-42) • Bluetooth Bee for Arduino - Seeedstudio • Bluetooth Bee Standalone with built-in Arduino • KEDSUM Arduino Wireless Bluetooth Transceiver Module • Bluetooth 4.0 USB Module (v2.1 Back-Compatible) • SENA UD100 industrial Bluetooth USB adapter • PwnPad 2014 - supports packet injection (up to 1000 ′ ) 58

  59. Bluetooth – Pwn Pad 59

  60. Bluetooth – NirSoft • NirSoft - BluetoothCL v1.00 - dumps all current detected bluetooth devices • NirSoft - BluetoothLogView - Creates a log of Bluetooth devices activity around you • NirSoft - BluetoothView - Monitor the Bluetooth activity around you 60

  61. ILLUSTRATIVE FOOTAGE Video - DEMO 61

  62. Wi-Fi Pineapple WIRELESS PENETRATION TESTING ROUTER 62

  63. Wi-Fi Pineapple WHAT CAN IT DO? 63

  64. Wi-Fi Pineapple WHAT CAN IT DO? 64

  65. Karma on Pineapple R O G U E A C C E S S P O I N T 65

  66. ILLUSTRATIVE FOOTAGE Video - DEMO 66

  67. Karma on Pineapple R O G U E A C C E S S P O I N T 67

  68. Auto-Association to Wi-Fi M O B I L E P H O N E A T T A C K S 68

  69. Dumping Wi-Fi Keys CLIENT EXPLOITING 69

  70. Raspberry Pi F R U I T Y W I -F I • Fruity Wi-Fi – Raspberry Pi version of the “Wi-Fi Pineapple”– cheap alternative (~$35 ~$35) 70

  71. Arduino C U S T O M T O O L S + 71

  72. Arduino: Add-ons W I R E L E S S M O D U L E S • Arduino NFC Shield • Arduino BlueTooth Modules • Arduino WiFly Shield (802.11b/g) • Arduino GSM/GPRS shields (SMS messaging) • WIZnet Embedded Web Server Module • Xbee 2.4GHz Module (802.15.4 Zigbee) • Parallax GPS Module PMB-648 SiRF • Arduino Ethernet Shield • Redpark - Serial-to-iPad/iPhone Cable 72

  73. IoT – Physical Testing UP CLOSE AND PERSONAL 73

  74. USB Rubber Ducky Delux G A I N I N G A C C E S S 74

  75. Brinks Smart Safes P H Y S I C A L H A C K I N G The Brinks CompuSafe Galileo. Access to the USB port and 60 sec. is all that is needed by a prepared attacker. Adding “smarts” turned this safe into an “unsafe.” 75

  76. ILLUSTRATIVE FOOTAGE Video - DEMO 76

  77. Pwn Plug M A I N T A I N I N G A C C E S S 77

  78. Pwn Plug M A I N T A I N I N G A C C E S S • Pwn Plug Elite: $995.00 • Power Pwn: $1,995.00 78

  79. Raspberry Pi M A I N T A I N I N G A C C E S S • Raspberry Pi – cheap alternative (~$35 35) to Pwn Plug/Power Pwn • Pwnie Express – Raspberry Pwn • Rogue Pi – RPi Pentesting Dropbox • Pwn Pi v3.0 79

  80. Defenses PROTECT YO NECK 80

  81. Defenses P R O T E C T I O N: I N T E R N E T • Use a VPN or disconnect critical devices • Use only encrypted management services (SSL/SSH) • Employ strong encryption and authentication methods • Use strong passwords and non-default usernames • Use a password manager • Secure wireless clients (laptops, phones, wearables, ...) • Place untrusted devices on a separate network 81

  82. Defenses P R O T E C T I O N: W i r e l e s s • Conduct regular wireless assessments • Employ strong encryption and authentication methods • Employ wireless IDS/IPS • Secure wireless clients (laptops, phones, …) 82

  83. Defenses P R O T E C T I O N: W i r e l e s s Use “wireless checks” of network vulnerability scanners 83

  84. Defenses P R O T E C T I O N: W i r e l e s s Physically track down rogue access points and malicious devices 84

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend