iot security – executing an effective security testing process

38
IoT Security – Executing an Effective Security Testing Process

Upload: ec-council

Post on 21-Jan-2018

224 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: IoT Security – Executing an Effective Security Testing Process

IoT Security – Executing an Effective Security Testing Process

Page 2: IoT Security – Executing an Effective Security Testing Process

Introduction

Deral Heiland – IoT Research Lead Rapid7•25+ years IT•15 years security•8+ years security consultant pentesters

www.hackerhalted.com

Page 3: IoT Security – Executing an Effective Security Testing Process

IoT Ecosystem

IoT Testing Methodologies

IoT Research & Results

Questions

Agenda

Page 4: IoT Security – Executing an Effective Security Testing Process

The IoT Ecosystem

Page 5: IoT Security – Executing an Effective Security Testing Process

Embedded Hardware

Mobile & Control Applications

Cloud APIs & Web Services

Network Communication

Data

IoT Ecosystem

Page 6: IoT Security – Executing an Effective Security Testing Process

Help Identify exposure footprint

Threat modeling for risk

Determine Impact across ecosystem

Conducting security testing

Ecosystem Approach

Page 7: IoT Security – Executing an Effective Security Testing Process

IoT Testing Methodologies

Page 8: IoT Security – Executing an Effective Security Testing Process

Functional Evaluation

Device Reconnaissance

Cloud & Web APIs

Mobile & Control Applications

Network

Physical Embedded hardware Inspection

Physical Device Attacks

Radio (RF)

Testing Methodology Structure

Page 9: IoT Security – Executing an Effective Security Testing Process

Standard deployment

Two environments

Map out Features Functions ComponentsCommunication paths

Functional Evaluation

Page 10: IoT Security – Executing an Effective Security Testing Process

Welcome to my real world lab

Use the product to its full capacity

Functional Evaluation

Page 11: IoT Security – Executing an Effective Security Testing Process

Component versions

Software versions

Vulnerability history

Open source data

White labeled product history

User Manuals

Component data/spec sheets

FCC Data

Device Reconnaissance

Page 12: IoT Security – Executing an Effective Security Testing Process

Device Reconnaissance

Page 13: IoT Security – Executing an Effective Security Testing Process

Eview Panic Button Reconnaissance

User manual very revealing

Page 14: IoT Security – Executing an Effective Security Testing Process

Encryption (storage and transfer)

Authentication

Access rights

Communication protocols

SSL pinning

Mobile & Control Applications

Page 15: IoT Security – Executing an Effective Security Testing Process

Mobile ApplicationWink Hub 2 Unencrypted Storage of Credentials

Page 16: IoT Security – Executing an Effective Security Testing Process

Insteon Smart HubUnencrypted Storage of Credentials

Page 17: IoT Security – Executing an Effective Security Testing Process

Encryption (storage and transfer)

Authentication and session management

Common web vulnerabilitiesXSSCSRFInjection attacks ( SQLi etc..)Business logic attacks

Cloud & Web APIs

Page 18: IoT Security – Executing an Effective Security Testing Process

Cloud API’s Wink Hub 2

Page 19: IoT Security – Executing an Effective Security Testing Process

Cloud API’s Wink Hub 2 Failure to Revoke Oauth Token

Page 20: IoT Security – Executing an Effective Security Testing Process

Exposed services

Authentication

Access rights

Encryption

Intra product “ecosystem” communication

Network

Page 21: IoT Security – Executing an Effective Security Testing Process

NetworkDevice Local Mode Security

Loss of internet access

Lack of authentication

Lack of encryption

Page 22: IoT Security – Executing an Effective Security Testing Process

Osram Lightify Over The Air (OTA) Firmware Captures with Wireshark

Page 23: IoT Security – Executing an Effective Security Testing Process

ChipsCPUMemoryCommunication

Physical portsEthernetUSBSerial

Circuitry connectionUARTJTAGSPI

Physical Embedded hardware Inspection

Page 24: IoT Security – Executing an Effective Security Testing Process

JTAG/SWD

UART

SPI

Memory extractionFirmwareconfigurations

Physical Device Attacks

Page 25: IoT Security – Executing an Effective Security Testing Process

Flash Memory Extraction on Wink Hub 2

Page 26: IoT Security – Executing an Effective Security Testing Process
Page 27: IoT Security – Executing an Effective Security Testing Process

Flash Memory Extraction on Wink Hub 2

Page 28: IoT Security – Executing an Effective Security Testing Process

Gathering RF Configuration Data from Inter Chip Communication

Page 29: IoT Security – Executing an Effective Security Testing Process

Gathering RF Configuration Data from Inter Chip Communication

Page 30: IoT Security – Executing an Effective Security Testing Process

1100101010000001110011000110011110000000001111101010011111011000110001000111011111000010011011001001011010000000100110000100010010000010000110001100000011100000

Gathering RF Configuration Data from Inter Chip Communication

Page 31: IoT Security – Executing an Effective Security Testing Process

Firmware Extractionembedded Multi-Media Controller (eMMC)

Page 32: IoT Security – Executing an Effective Security Testing Process

Firmware Extractionembedded Multi-Media Controller (eMMC)

Page 33: IoT Security – Executing an Effective Security Testing Process

Firmware Extractionembedded Multi-Media Controller (eMMC)

Page 34: IoT Security – Executing an Effective Security Testing Process

Encryption

Pairing

Access control

Command and control

Replay attacks.

Radio (RF)

Page 35: IoT Security – Executing an Effective Security Testing Process

RF AnalysisInsteon Vulnerable to Replay Attacks

Page 36: IoT Security – Executing an Effective Security Testing Process

Circle back around for more Insteon RF recon

•Peter Shipley•Defcon23 (False Security and Deceptive Documentation)•https://github.com/evilpete/insteonrf

Appears this issues have never been correctly, specially the unencrypted communication – even on their own products

Insteon RF Analysis Reconnaissance

Page 37: IoT Security – Executing an Effective Security Testing Process

Reduced issues

Reduced risk

Better products

Deeper understanding

Conclusion

Page 38: IoT Security – Executing an Effective Security Testing Process

Questions

Deral Heiland - Research Lead (IoT)deral_heiland@rapid7

@percent_xhttp://www.rapid7.com