KPN REDTEAM
Be Smart Be Secure
KPN REDTEAM
What is a Smart City?
Using modern ICT and IoT technology in a secure way to manage a
city’s asset and improve urban space with interaction with citizens
to increase quality of life
KPN REDTEAM
Implementations:
• Lanterns
• Industrial Cooling
• Smart waste
• Legionella detector
• Street cover
• Sea pumps
• Bike
• Luxury asset
• Solar Panel
• Smart office space
• Parking
• Transport management
• Health sector
• City information
KPN REDTEAM
KPN REDTEAM
Kill Chain Stages of a Target Cyber Intrusion
Stage Action Methodology
Stage 1 Reconnaissance Harvesting Email Addresses, Social Networking, Passive Search, IP Port Scanning
Weaponization Developing Exploit with Payload Creation, Malware, Delivery systems, Decoys
Delivery Spear Phishing, Infected Website, Service Provider, USB
Stage 2 Exploitation Activation, Execute Code, Establish Foothold, 3rd party Exploitation
Installation Trojan or Backdoor, Escalate Privileges, Root Kit, Establish Persistence
Stage 3 Command & Control Command Channel, Lateral Movement, Internal Recon, Maintain Persistence
Actions on Target Expand Compromise, Consolidate Persistence, identify Targets, Data Ex-filtration
KPN REDTEAM
KPN REDTEAM
KPN REDTEAM
KPN REDTEAM
Some of the challenges
Contracts
What	about	cyber	security	and	privacy?
Development
With	all	of	the	technology	and	standards	how	can	
we	make	this	secure?
Monitor
How	can	we	monitor	attacks	and	unusual	
behavior?
Architecture
Can	we	scale	the	architecture	for	the	long	term?	
And	what	about	multiple	layers	of	defense?
Maintain
How	can	we	update	and	manage	so	many	
devices?
KPN REDTEAM
Contract challenges
How does cyber
security fit into a
30 year contract?
KPN REDTEAM
Development challenges
Extensive—but not exhaustive—list of
Internet of Things (IoT) protocols:
Bluetooth
BLE
ZigBee
Z-Wave
6LoWPAN
Thread
WiFi-ah (HaLow)
2G (GSM)
3G & 4G
LTE Cat 0, 1, & 3
LTE-M1
NB-IoT
5G
NFC
RFID
SigFox
LoRaWAN
Ingenu
Weightless-W
ANT & ANT+
DigiMesh
MiWi
EnOcean
Dash7
The application shall
communicate with mobiles,
cloud, data hub and sensors
from all of our suppliers. Oh
yeah, it must be secure and we
need it next week
KPN REDTEAM
Architecture challenges
How flexible is our architecture with the
amount of growing devices and
standards?
How to deal with segmentation to
reduce risks in case of a compromise?
KPN REDTEAM
Vulnerability management
How do we perform patch
management?
Can we reduce the life time of a
sensor?
KPN REDTEAM
REDteaming model
Level 3
Level 2
Level 1
Cyber
Zero
knowledge
Physical
Zero
knowledge
Human
Zero
knowledge
Cyber
Limited
insider
Physical
Limited
insider
Human
Limited
insider
Cyber
Trusted
insider
Physical
Trusted
insider
Human
Trusted
insider
Target
KPN REDTEAM
Elements of REDteaming
A red team exercise simulates criminal activity to challenge a company on their social, technical, and physical
defenses:
Physical
Finding weaknesses in your physical
defenses
• Gaining unauthorized access to
buildings and area’s
• Tailgating,
• Badge ID’s
• Drones
• Lock picking doors
Cyber
Finding weaknesses in your technical
defenses
• Gaining unauthorized access to your
infrastructure and your data
• Malware attack
• Password brute force on all systems
Human
Finding weaknesses in your social
defenses
• Gaining unauthorized access
through your employees
• Social engineering
• Infected USB sticks
• Excuses to gain access
• Gain trust from employees
KPN REDTEAM
KPN REDTEAM
Take away
• Embed security into the DNA of smart city development
• Hug the hackers and promote responsible disclosure
• Perform regular REDteam/simulation exercises
KPN REDTEAM
• Twee losse arduino’s
• De rechter heeft een temp sensor
• De linker heeft een LCD scherm
• Middels 433 mhz verbinding wordt de temperatuur
verzonden.
KPN REDTEAM
GQRX
• De signaal kunnen we
capturen met een SDR
software defined Radio
• Het signaal recorden en
vervolgens analyseren
KPN REDTEAM
Audacity
• Het signaal heeft een
binary structuur
• De temperatuur is
22 graden
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 01 1 0
KPN REDTEAM
Thank you
Mark de Groot
TeamLead KPN REDteam
markdegroot@kpn.com
IoT is all about the application and infrastructure
and it must be secure from the start and into the future

More Related Content

PPTX
Security Impact of Data Visibility - Your New 90-Second Superpower
PPTX
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
PPTX
Mobile device forensics
PPT
Why Risk Management is Impossible
PPTX
Physical Security and Digital Security
PPTX
Modern Cyber Threat Protection techniques for Enterprises
PDF
Security News Bytes
PPTX
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
Security Impact of Data Visibility - Your New 90-Second Superpower
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Mobile device forensics
Why Risk Management is Impossible
Physical Security and Digital Security
Modern Cyber Threat Protection techniques for Enterprises
Security News Bytes
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...

What's hot (20)

PPTX
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
PPTX
Wireless Networking
PPT
Nguyen nielsenkim palmvein
PDF
Securing IoT Applications
PPTX
The New frontiers in Information Security
PPTX
IoT Security
ODP
Ethical hacking for beginners and professionals
PDF
Securing Internet of Things
PPTX
Embedded Systems: Future trends, Employer Expectations
PPTX
Privacy and Security in the Internet of Things
PDF
Man in the Binder
PDF
Blackhat USA Mobile Security Panel 2011
PDF
MacIT 2014
PPTX
Cyber Crime
PDF
DARPA: Cyber Analytical Framework (Kaufman)
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
DOCX
Markbrakent war
PPTX
The value of Deep Instinct’s prediction model – Copy Cat Test Case
PDF
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
PPTX
Digital Watermarking Report
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Wireless Networking
Nguyen nielsenkim palmvein
Securing IoT Applications
The New frontiers in Information Security
IoT Security
Ethical hacking for beginners and professionals
Securing Internet of Things
Embedded Systems: Future trends, Employer Expectations
Privacy and Security in the Internet of Things
Man in the Binder
Blackhat USA Mobile Security Panel 2011
MacIT 2014
Cyber Crime
DARPA: Cyber Analytical Framework (Kaufman)
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Markbrakent war
The value of Deep Instinct’s prediction model – Copy Cat Test Case
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Digital Watermarking Report

Similar to Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt? (20)

PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
Cybersecurity Risk from User Perspective
PDF
Soc analyst course content
PDF
Soc analyst course content v3
PDF
Tecomex Forensics Brochure 2014
PDF
Cyber intelligence for corporate security
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPTX
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
PDF
What You’ll Learn in a Cybersecurity Course
PDF
Cyber Defense - How to be prepared to APT
PDF
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
PPTX
Avila 3 b
PDF
Compliance made easy. Pass your audits stress-free.
PPTX
2012 Reenergize the Americas 3B: Angel Avila
PPTX
Workshop on Cyber security and investigation
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
Io t security defense in depth charles li v1 20180425c
PPTX
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Cybersecurity Risk from User Perspective
Soc analyst course content
Soc analyst course content v3
Tecomex Forensics Brochure 2014
Cyber intelligence for corporate security
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
What You’ll Learn in a Cybersecurity Course
Cyber Defense - How to be prepared to APT
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Avila 3 b
Compliance made easy. Pass your audits stress-free.
2012 Reenergize the Americas 3B: Angel Avila
Workshop on Cyber security and investigation
LoginCat - Zero Trust Integrated Cybersecurity
IoT Security, Threats and Challenges By V.P.Prabhakaran
Io t security defense in depth charles li v1 20180425c
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights

More from IoT Academy (20)

PDF
Online meetup 28 mei | IoT Academy
PDF
KVK meetup januari 2020 | IoT Academy
PDF
IoT Academy Meetup Januari 2020 | ABN Amro & Firmhouse
PPTX
Smart Building - Wageningen University & Research | IoT Meetup November 2019
PDF
Lonely Rooftop | IoT Academy Meetup November 2019
PDF
IoT Update Oktober 2019 | Paul Coppes @ KPN | De do's en don'ts als je start ...
PDF
IoT Update Oktober 2019 | Irene Barten @Munisense | Online & Real-time metingen
PDF
IoT Update Oktober 2019 | Sijmen Ruwhof @KPN | Huidige staat van IoT Cyber S...
PDF
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
PDF
IoT Update Oktober 2019 | Industrie 4.0 en nu?
PDF
IoT Update oktober 2019 | Introductie van IoT educatie kit
PDF
IoT Update Oktober 2019 | Pedro de Smit @Clickey Solutions |
PDF
IoT Update Oktober 2019 | Titia Houwing @KPN | De rol van 5G in een verbonden...
PDF
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
PDF
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG | Edge co...
PDF
IoT Meetup September 2019
PDF
Lte-m Sierra Wireless V1
PDF
IoT Academy Meetup - LTE-M: wat kun je ermee?
PDF
Whitepaper IoT Platformen
PDF
IoT meetup september 2017
Online meetup 28 mei | IoT Academy
KVK meetup januari 2020 | IoT Academy
IoT Academy Meetup Januari 2020 | ABN Amro & Firmhouse
Smart Building - Wageningen University & Research | IoT Meetup November 2019
Lonely Rooftop | IoT Academy Meetup November 2019
IoT Update Oktober 2019 | Paul Coppes @ KPN | De do's en don'ts als je start ...
IoT Update Oktober 2019 | Irene Barten @Munisense | Online & Real-time metingen
IoT Update Oktober 2019 | Sijmen Ruwhof @KPN | Huidige staat van IoT Cyber S...
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Industrie 4.0 en nu?
IoT Update oktober 2019 | Introductie van IoT educatie kit
IoT Update Oktober 2019 | Pedro de Smit @Clickey Solutions |
IoT Update Oktober 2019 | Titia Houwing @KPN | De rol van 5G in een verbonden...
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG | Edge co...
IoT Meetup September 2019
Lte-m Sierra Wireless V1
IoT Academy Meetup - LTE-M: wat kun je ermee?
Whitepaper IoT Platformen
IoT meetup september 2017

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Architecture types and enterprise applications.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Five Habits of High-Impact Board Members
Group 1 Presentation -Planning and Decision Making .pptx
Module 1.ppt Iot fundamentals and Architecture
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hindi spoken digit analysis for native and non-native speakers
observCloud-Native Containerability and monitoring.pptx
Tartificialntelligence_presentation.pptx
Benefits of Physical activity for teenagers.pptx
Hybrid model detection and classification of lung cancer
sustainability-14-14877-v2.pddhzftheheeeee
Taming the Chaos: How to Turn Unstructured Data into Decisions
Architecture types and enterprise applications.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf
What is a Computer? Input Devices /output devices
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Five Habits of High-Impact Board Members

Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?

  • 2. KPN REDTEAM What is a Smart City? Using modern ICT and IoT technology in a secure way to manage a city’s asset and improve urban space with interaction with citizens to increase quality of life
  • 3. KPN REDTEAM Implementations: • Lanterns • Industrial Cooling • Smart waste • Legionella detector • Street cover • Sea pumps • Bike • Luxury asset • Solar Panel • Smart office space • Parking • Transport management • Health sector • City information
  • 5. KPN REDTEAM Kill Chain Stages of a Target Cyber Intrusion Stage Action Methodology Stage 1 Reconnaissance Harvesting Email Addresses, Social Networking, Passive Search, IP Port Scanning Weaponization Developing Exploit with Payload Creation, Malware, Delivery systems, Decoys Delivery Spear Phishing, Infected Website, Service Provider, USB Stage 2 Exploitation Activation, Execute Code, Establish Foothold, 3rd party Exploitation Installation Trojan or Backdoor, Escalate Privileges, Root Kit, Establish Persistence Stage 3 Command & Control Command Channel, Lateral Movement, Internal Recon, Maintain Persistence Actions on Target Expand Compromise, Consolidate Persistence, identify Targets, Data Ex-filtration
  • 9. KPN REDTEAM Some of the challenges Contracts What about cyber security and privacy? Development With all of the technology and standards how can we make this secure? Monitor How can we monitor attacks and unusual behavior? Architecture Can we scale the architecture for the long term? And what about multiple layers of defense? Maintain How can we update and manage so many devices?
  • 10. KPN REDTEAM Contract challenges How does cyber security fit into a 30 year contract?
  • 11. KPN REDTEAM Development challenges Extensive—but not exhaustive—list of Internet of Things (IoT) protocols: Bluetooth BLE ZigBee Z-Wave 6LoWPAN Thread WiFi-ah (HaLow) 2G (GSM) 3G & 4G LTE Cat 0, 1, & 3 LTE-M1 NB-IoT 5G NFC RFID SigFox LoRaWAN Ingenu Weightless-W ANT & ANT+ DigiMesh MiWi EnOcean Dash7 The application shall communicate with mobiles, cloud, data hub and sensors from all of our suppliers. Oh yeah, it must be secure and we need it next week
  • 12. KPN REDTEAM Architecture challenges How flexible is our architecture with the amount of growing devices and standards? How to deal with segmentation to reduce risks in case of a compromise?
  • 13. KPN REDTEAM Vulnerability management How do we perform patch management? Can we reduce the life time of a sensor?
  • 14. KPN REDTEAM REDteaming model Level 3 Level 2 Level 1 Cyber Zero knowledge Physical Zero knowledge Human Zero knowledge Cyber Limited insider Physical Limited insider Human Limited insider Cyber Trusted insider Physical Trusted insider Human Trusted insider Target
  • 15. KPN REDTEAM Elements of REDteaming A red team exercise simulates criminal activity to challenge a company on their social, technical, and physical defenses: Physical Finding weaknesses in your physical defenses • Gaining unauthorized access to buildings and area’s • Tailgating, • Badge ID’s • Drones • Lock picking doors Cyber Finding weaknesses in your technical defenses • Gaining unauthorized access to your infrastructure and your data • Malware attack • Password brute force on all systems Human Finding weaknesses in your social defenses • Gaining unauthorized access through your employees • Social engineering • Infected USB sticks • Excuses to gain access • Gain trust from employees
  • 17. KPN REDTEAM Take away • Embed security into the DNA of smart city development • Hug the hackers and promote responsible disclosure • Perform regular REDteam/simulation exercises
  • 18. KPN REDTEAM • Twee losse arduino’s • De rechter heeft een temp sensor • De linker heeft een LCD scherm • Middels 433 mhz verbinding wordt de temperatuur verzonden.
  • 19. KPN REDTEAM GQRX • De signaal kunnen we capturen met een SDR software defined Radio • Het signaal recorden en vervolgens analyseren
  • 20. KPN REDTEAM Audacity • Het signaal heeft een binary structuur • De temperatuur is 22 graden 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 01 1 0
  • 21. KPN REDTEAM Thank you Mark de Groot TeamLead KPN REDteam markdegroot@kpn.com IoT is all about the application and infrastructure and it must be secure from the start and into the future