internet of things iot
play

Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of - PowerPoint PPT Presentation

Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of Smart Devices ITAC 2015 29 Sept 2015 Presen sented ed b by: Francis Brown & Steve Christiaens Bishop Fox, LLC www.bishopfox.com Agenda O V E R V I E W Introd


  1. Internet of Things (IoT) OWASP Top 10 IoT Vulns and Exploits of Smart Devices ITAC 2015 – 29 Sept 2015 Presen sented ed b by: Francis Brown & Steve Christiaens Bishop Fox, LLC www.bishopfox.com

  2. Agenda O V E R V I E W • Introd oduction on/B /Bac ackgr grou ound • IoT News and Current Landscape • Corp concerns, Personal / Privacy Issues • Examples: Cars, Fridges, TVs, Wearables, … • Target eting ng Io IoT T – vi via a Int Inter ernet net • Google/Bing/SHODAN/Maltego Hacking • Internet Census 2012, Scans.io, Zmap, MassScan, other mass scanning projects • Target eting ng Io IoT T – over er t the he Air Air • Wi-Fi, Bluetooth, ZigBee, Z-Wave, RFID, NFC, etc. • Hacking devices: Wi-Fi Pineapplers, Kali Tablets, RaspPis, Custom Gear • Target eting ng Io IoT T – up c close, e, Physically lly • USB Rubber Duckies, Teensy Arduino Devices, BadUSB type attacks • Def efens enses es 2

  3. RickMote – Hacking TVs DEMO MO - CHROMECAST - STREAMING DEVICE HACKING 3

  4. Introduction/Background GETTING UP TO SPEED 4

  5. OWASP – IoT Top 10 T O P 1 0 L I S T – Internet of Things 5

  6. IoT - Special Focus B E W A A R R E E E Y E E S S A N D N D E A R R S … S … a and nd robot ha hand nds 1. Cameras / WebCams 2. Microphones 3. Robots … terminators… 6

  7. Twitter Feed WebCams C R E E P Y W E B C A M S V I E W E R S #CAUGHTONNESTCAM 7

  8. Baby WebCams Feb 2015 W O R S T N I G H T M A R E S 8

  9. Smart TVs Feb 2015 L I S T E N I N G C L O S E L Y 9

  10. ILLUSTRATIVE FOOTAGE Video - DEMO 10

  11. Plane Hacking Apr 2015 P a s s e n g e r 3 1 3 3 7 11

  12. Smart Watches July 2015 I N S E C U R I T Y O N T H E G O “A study conducted by HP’s Fortify on security features implemented by Smartwatches revealed that not even a single device found to be 100 percent safe.” 12

  13. Vehicle Attacks July 2015 G O N E I N 6 0 S E C O N D S … 13

  14. ILLUSTRATIVE FOOTAGE Video - DEMO 14

  15. Vehicle Attacks July 2015 … O R L E S S 15

  16. Fridge Hacking Aug 2015 I N T H E H O M E 16

  17. Microsoft IoT Big Push Aug 2015 I O T I N T H E M A I N S T R E A M 17

  18. Baby Monitors Sept 2015 B O R N I N T H E U . S . A . 18

  19. ILLUSTRATIVE FOOTAGE Video - DEMO 19

  20. FBI Warning - PSA Sept 2015 I O T I S D A N G E R O U S 20

  21. IoT Legal Climate Sept 2015 S A M E O L D D E B A T E S 21

  22. Targeting IoT Systems OVER THE INTERNET – SEARCH ENGINES 22

  23. Diggity Tools S E A R C H E N G I N E H A C K I N G 23

  24. IoT and Google G O O G L E H A C K I N G 24

  25. Google Diggity D I G G I T Y C O R E T O O L S 25

  26. IoT and Bing B I N G H A C K I N G 26

  27. Bing Diggity D I G G I T Y C O R E T O O L S 27

  28. N E W G O O G L E H A C K I N G T O O L S SHODAN Diggity 28

  29. SHODAN I O T / H A C K E R S E A R C H E N G I N E • Indexed service banners for whole Internet for HTTP (Port 80), as well as some FTP (21), SSH (22) and Telnet (23) services - https://www.shodan.io/ 29

  30. IoT and SHODAN S H O D A N H A C K I N G 30

  31. IoT and SHODAN S H O D A N H A C K I N G 31

  32. IoT and SHODAN S H O D A N H A C K I N G 32

  33. Mr. Robot H V A C C O M P R O M I S E 33

  34. ILLUSTRATIVE FOOTAGE Video - DEMO 34

  35. SHODAN Diggity F I N D I N G S C A D A S Y S T E M S 35

  36. SHODAN Alerts S H O D A N R S S F E E D S 36

  37. INTERNET MASS SCANNING Scanning the Whole Internet 37

  38. Internet Census 2012 N M A P O F E N T I R E I N T E R N E T • ~420k botnet used to perform NMAP against entire IPv4 addr space! • ICMP sweeps, SYN scans, Reverse DNS, and Service probes of 662 ports • Free torrent of 568GB of NMAP results (9TB decompressed NMAP results) 38

  39. Internet Census 2012 E X A M P L E - S N M P R E S U L T S 39

  40. Internet Census 2012 E X A M P L E - S N M P R E S U L T S 40

  41. HD’s Serial Offenders D A T A M I N I N G C E N S U S 41

  42. Scans.io – Huge Repo R E G U L A R S C A N S O F I N T E R N E T 42

  43. Masscan S C A N T H E I N T E R N E T 43

  44. Wireless Hacking Tools IOT HACKING OVER THE AIR 44

  45. RickMote – Hacking TVs CHROMECAST - STREAMING DEVICE HACKING 45

  46. Wi-Spy – Spectrum Analyzer W I R E L E S S A N A L Y S I S Wi-Spy DBx Pro - USB Spectrum Analyzer with Chanalyzer Pro Software 46

  47. NirSoft Wireless Tools W I N D O W S H A C K I N G T O O L S • NirSoft – WirelessNetView • NirSoft – Wi-FiInfoView • NirSoft – Wireless Network Watcher • NirSoft – Wi-FiChannelMonitor 47

  48. inSSIDer Wi-Fi Scanner W I N D O W S H A C K I N G T O O L S 48

  49. inSSIDer Wi-Fi Scanner A N D R O I D H A C K I N G T O O L S 49

  50. Aircrack-ng Suite L I N U X H A C K I N G T O O L S 50

  51. inSSIDer for Mac M A C O S X H A C K I N G T O O L S 51

  52. NetSpot for Mac M A C O S X H A C K I N G T O O L S 52

  53. Kali VM + USB Adapter E A S Y W I R E L E S S A T T A C K P L A T F O R M • Kali Linux VM + TP-LINK - TL-WN722N (USB) + Yagi + 53

  54. Pwn Pad 2014 N E X U S 7 P E N T E S T D E V I C E 54

  55. Pwn Pad 2014 N E X U S 7 P E N T E S T D E V I C E 55

  56. Kali NetHunter N E X U S 7 P E N T E S T D E V I C E Nexus7 (2013 – Wi-Fi) – Android Tablet – Non - PwnPad2014 56

  57. Bluetooth Low Energy https://hakshop.myshopify.com/products/ubertooth-one 57

  58. Bluetooth – Other • Bluetooth Modules: • SparkFun BLE Mate 2 • Bluetooth Mate Gold - Sparkfun • Bluetooth Module Breakout - Roving Networks (RN-41) • Bluetooth Modem - BlueSMiRF Silver (RN-42) • Bluetooth Bee for Arduino - Seeedstudio • Bluetooth Bee Standalone with built-in Arduino • KEDSUM Arduino Wireless Bluetooth Transceiver Module • Bluetooth 4.0 USB Module (v2.1 Back-Compatible) • SENA UD100 industrial Bluetooth USB adapter • PwnPad 2014 - supports packet injection (up to 1000 ′ ) 58

  59. Bluetooth – Pwn Pad 59

  60. Bluetooth – NirSoft • NirSoft - BluetoothCL v1.00 - dumps all current detected bluetooth devices • NirSoft - BluetoothLogView - Creates a log of Bluetooth devices activity around you • NirSoft - BluetoothView - Monitor the Bluetooth activity around you 60

  61. ILLUSTRATIVE FOOTAGE Video - DEMO 61

  62. Wi-Fi Pineapple WIRELESS PENETRATION TESTING ROUTER 62

  63. Wi-Fi Pineapple WHAT CAN IT DO? 63

  64. Wi-Fi Pineapple WHAT CAN IT DO? 64

  65. Karma on Pineapple R O G U E A C C E S S P O I N T 65

  66. ILLUSTRATIVE FOOTAGE Video - DEMO 66

  67. Karma on Pineapple R O G U E A C C E S S P O I N T 67

  68. Auto-Association to Wi-Fi M O B I L E P H O N E A T T A C K S 68

  69. Dumping Wi-Fi Keys CLIENT EXPLOITING 69

  70. Raspberry Pi F R U I T Y W I -F I • Fruity Wi-Fi – Raspberry Pi version of the “Wi-Fi Pineapple”– cheap alternative (~$35 ~$35) 70

  71. Arduino C U S T O M T O O L S + 71

  72. Arduino: Add-ons W I R E L E S S M O D U L E S • Arduino NFC Shield • Arduino BlueTooth Modules • Arduino WiFly Shield (802.11b/g) • Arduino GSM/GPRS shields (SMS messaging) • WIZnet Embedded Web Server Module • Xbee 2.4GHz Module (802.15.4 Zigbee) • Parallax GPS Module PMB-648 SiRF • Arduino Ethernet Shield • Redpark - Serial-to-iPad/iPhone Cable 72

  73. IoT – Physical Testing UP CLOSE AND PERSONAL 73

  74. USB Rubber Ducky Delux G A I N I N G A C C E S S 74

  75. Brinks Smart Safes P H Y S I C A L H A C K I N G The Brinks CompuSafe Galileo. Access to the USB port and 60 sec. is all that is needed by a prepared attacker. Adding “smarts” turned this safe into an “unsafe.” 75

  76. ILLUSTRATIVE FOOTAGE Video - DEMO 76

  77. Pwn Plug M A I N T A I N I N G A C C E S S 77

  78. Pwn Plug M A I N T A I N I N G A C C E S S • Pwn Plug Elite: $995.00 • Power Pwn: $1,995.00 78

  79. Raspberry Pi M A I N T A I N I N G A C C E S S • Raspberry Pi – cheap alternative (~$35 35) to Pwn Plug/Power Pwn • Pwnie Express – Raspberry Pwn • Rogue Pi – RPi Pentesting Dropbox • Pwn Pi v3.0 79

  80. Defenses PROTECT YO NECK 80

  81. Defenses P R O T E C T I O N: I N T E R N E T • Use a VPN or disconnect critical devices • Use only encrypted management services (SSL/SSH) • Employ strong encryption and authentication methods • Use strong passwords and non-default usernames • Use a password manager • Secure wireless clients (laptops, phones, wearables, ...) • Place untrusted devices on a separate network 81

  82. Defenses P R O T E C T I O N: W i r e l e s s • Conduct regular wireless assessments • Employ strong encryption and authentication methods • Employ wireless IDS/IPS • Secure wireless clients (laptops, phones, …) 82

  83. Defenses P R O T E C T I O N: W i r e l e s s Use “wireless checks” of network vulnerability scanners 83

  84. Defenses P R O T E C T I O N: W i r e l e s s Physically track down rogue access points and malicious devices 84

Recommend


More recommend