SlideShare a Scribd company logo
#ATAGTR2017
16th 17th March
Security Testing/ IoT
Testing in Real World
Aditya Upadhya
Agile Testing Alliance Global Testing Retreat 2017
Security testing
Internet Of Things
• Age of Information Warfare
Agile Testing Alliance Global Testing Retreat 2017
whoami
Name : Aditya Upadhya
Occupation: Information security consultant at Capgemini
Location: Navi Mumbai
OSCP certified
Agile Testing Alliance Global Testing Retreat 2017
• the interconnection via the Internet of
computing devices embedded in everyday
objects, enabling them to send and receive
data. [Wikipedia]
What is IOT ?
Agile Testing Alliance Global Testing Retreat 2017
• Experts estimate that the IoT will consist of
almost 50 billion objects by 2020. [Wikipedia]
Agile Testing Alliance Global Testing Retreat 2017
Almost Everywhere!
• Mobile devices, Health bands, sensors, GPS
• Driverless cars/vehicles
• Drones UAV
• Daily life usage Household electronics (STB, refrigerators,
smart automated home appliances, CCTV etc.)
• Surveillance systems
• Measuring pollution levels, water level alerts, earthquake and
tectonic alerts
• Industries: machine maintenance, tracking assets, quality
check, safety checks, SCADA-PLC systems, smart grids, nuclear
reactors .
• POS machines , ATM, Routers.
• Health industries.
Uses of IOT ?
Agile Testing Alliance Global Testing Retreat 2017
Threats- IOT
Agile Testing Alliance Global Testing Retreat 2017
• Smartphone :- If Compromised can makes your location, your
habits, and yourself more predictable , privacy compromised.
• Smart home devices:- can be misused to play pranks, can
make life miserable, or even be used to leverage anonymity of
a hacker to perform illegal activities.
• Driverless cars/vehicles - faulty protocols to failure of security
compliance can be threat, vehicles manipulated controls
overtaken, risk to life.
• Surveillance access:- failure of security compliance,
Information gathering made easy for terrorists if not secure.
• Sensors: that helps during natural calamities if manipulated,
can cause panic among people or reporting false normality in
high alerts can be hazardous.
Threats
Agile Testing Alliance Global Testing Retreat 2017
• Industrial devices :- nuclear reactor controllers , PLC – SCADA
systems, Smart grid controllers, driverless trains and more
such systems if compromised can cause a great deal of
damage to property and life.
• Healthcare :- an attacker can gain access to PHI and also
manipulate the devices that control drug dosage
• Future :- Nano bots in health cares Who knows ? May be they
can be reprogrammed for malicious intent ?
Threats
Agile Testing Alliance Global Testing Retreat 2017
Threats
Agile Testing Alliance Global Testing Retreat 2017
Business loss
• 3.2 million debit cards compromised; SBI, HDFC Bank, ICICI,
YES Bank and Axis worst hit
-Economic times.
• Ransom ware hits, guests locked in rooms hotel had to pay
1500 EU to save people :
http://www.thelocal.at/20170128/hotel-ransomed-by-
hackers-as-guests-locked-in-rooms
Real life events
Agile Testing Alliance Global Testing Retreat 2017
•Stuxnet – case of attack on iran nuclear reactor
https://en.wikipedia.org/wiki/Stuxnet
•botnets and malwares caused billions of loss
https://en.wikipedia.org/wiki/Mirai_(malware)
The case of mirai botnet made giants like akamai fall on their
knees (internal sources say)
Real life events
Agile Testing Alliance Global Testing Retreat 2017
•Drones hacked
https://packetstormsecurity.com/news/26287/NASA-Hack-
AnonSec-Attempts-To-Crash-222m-Drone-Release-Secret-
Flight-Videos-And-Employee-Data.html
Real life events
Agile Testing Alliance Global Testing Retreat 2017
•Cars hacked:
• https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
•https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese-
hack-remote-control-brakes
Real life events
Agile Testing Alliance Global Testing Retreat 2017
The Dangers of the Smart Grid
• In 2012, the Department of Homeland Security discovered a
flaw in hardened grid and router provider RuggedCom’s
devices.
• Ukraine power station hacked multiple times
• https://motherboard.vice.com/en_us/article/ukrainian-
power-station-hacking-december-2016-report
Real life events
Agile Testing Alliance Global Testing Retreat 2017
•Health industry :-
In April 2014, Scott Erven and his team of security
researchers released the results of a two-year study on the
vulnerability of medical devices. They found that they could
remotely manipulate devices, including those that controlled
dosage levels for drug infusion pumps and connected
defibrillators.
•http://www.zdnet.com/article/st-jude-releases-security-patches-for-vulnerable-
cardiac-devices/
http://m.healthcareitnews.com/news/massive-ddos-attack-harnesses-145000-
hacked-iot-devices
https://www.cbinsights.com/blog/iot-healthcare-market-map-company-list/
•Hacking blood pressure monitor
https://www.edusteinhorst.com/hacking-a-blood-pressure-monitor/
Real life events
Agile Testing Alliance Global Testing Retreat 2017
• Shodan search engine has collection of open
CCTVs, industrial devices, dumb boxes
connected to internet
• Thinkful, censys etc
• https://thingful.net/adityaupadhya
• Demo
Search engines
Agile Testing Alliance Global Testing Retreat 2017
• In computing, a hacker is any highly skilled computer expert
capable of breaking into computer systems and networks using
bugs and exploits. [Wikipedia]
• A child playing with his remote control car gets curious to know
how it operates so, disintegrates the controller and toy car to
know about it’s working is also a hacker !
Who is a Hacker ?
Agile Testing Alliance Global Testing Retreat 2017
• IOT security Break into several categories
• Top 10 from owasp is available but top 10 are not everything.
• No standard Methodology can be implemented as IOT is not one
thing or framework.
• Different (IOT)things has different approach
• Analyzing hardware memory devices, wireless devices, and other
components like JTAG, UART debugging interfaces
• After gathering all information you can identify all attack surface,
threat agents and document them.
• Prepare a checklist of testing methods against the device and cross
check with existing ones to identify if some thing is missing.
• Identify vulnerabilities and see if you can exploit further more.
• Research, learn and do more information gathering.
For techies – how to attack ?
Agile Testing Alliance Global Testing Retreat 2017
• https://github.com/nebgnahz/awesome-iot-hacks
• http://blog.j-michel.org/post/86992432269/from-nand-chip-
to-files
• Metasploit enters IOT
https://community.rapid7.com/community/transpo-
security/blog/2017/02/02/exiting-the-matrix
• Defcon , blackhat, conference archives for reference
some resources
Agile Testing Alliance Global Testing Retreat 2017
• Ensure CIA compliance
• Secure by design approach to develop
• Changing of default password on first use and strong
password policy
• Strong encryption mechanisms
• Secure application interface
• Firmware upgrades
• Disable remote access whenever not required
• Hardware security
• Network layer security
• Keep eye on latest security updates and patches
For techies – how to defend?
Agile Testing Alliance Global Testing Retreat 2017
• Keep yourself such abreast of such developments
• Explore insurance options
• Have a robust strategy before rolling out the services that
depends on IOT.
• Lead your security team for attending more and more
world hacking conferences like blackhat, defcon, HITB,
nullcon etc
• Encourage your team mate security testers to explore
and research about IOT, learn new case studies and try to
replicate.
• Encourage them for Technical certifications like OSCP,
OSCE etc.
For CXO
Agile Testing Alliance Global Testing Retreat 2017
• My personal experience in IPTV set top box
security testing. Was able to stream TV
channels for free using VLC media player and
much more…
Case study
Agile Testing Alliance Global Testing Retreat 2017
Information gathering- Nmap
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
MITM
Agile Testing Alliance Global Testing Retreat 2017
Local storage sqlite files
Agile Testing Alliance Global Testing Retreat 2017
Local storgae syslog file
Agile Testing Alliance Global Testing Retreat 2017
UART
Agile Testing Alliance Global Testing Retreat 2017
SQLi
Agile Testing Alliance Global Testing Retreat 2017
LFI
Agile Testing Alliance Global Testing Retreat 2017
Network local storage information
Agile Testing Alliance Global Testing Retreat 2017
• Started simply with nmap
• Performing Arp poison with mitm revealed
information flying around in GBs
• From analysis we got authentication mechanism,
types of servers and infrastructure design to
some extent
• Analyzing local storage device gave IP, channel,
port, streaming address, SAP, middleware,
backend servers and many other information
Summary
Agile Testing Alliance Global Testing Retreat 2017
• After having as much as information gathered
as possible time to exploit !
• Found LFI, SQLi, user:pass revealed in mitm,
authentication mechanism easily bypassed,
streaming for free, got ssl pem keys for
infrastructure, access to server possible. (not
shown in poc)
Summary
Agile Testing Alliance Global Testing Retreat 2017
• Information gathering
• Research
• Analyze
• Attack
• Reform (new 0-day)
• Analyze
• Improvise
• Defend and finally
• Evolve.
Summary
Agile Testing Alliance Global Testing Retreat 2017
Email: adityapadhya@gmail.com
Questions ?
Agile Testing Alliance Global Testing Retreat 2017
Thank you

More Related Content

PPTX
ATAGTR2017 Static and dynamic code analysis for mobile applications - Act ear...
PPTX
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
PPTX
ATAGTR2017 Test the REST
PPT
ATAGTR2017 Bee-Hive approach for Big Data Testing [End to End Continuous Test...
PPTX
ATAGTR2017 Security Test Driven Development (STDD)
PPTX
ATAGTR2017 HikeRunner: Load Test Framework
PPTX
ATAGTR2017 Wearable App Testing
PPTX
ATAGTR2017 SPEAKING EYE for differently abled people to see the web content
ATAGTR2017 Static and dynamic code analysis for mobile applications - Act ear...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Test the REST
ATAGTR2017 Bee-Hive approach for Big Data Testing [End to End Continuous Test...
ATAGTR2017 Security Test Driven Development (STDD)
ATAGTR2017 HikeRunner: Load Test Framework
ATAGTR2017 Wearable App Testing
ATAGTR2017 SPEAKING EYE for differently abled people to see the web content

What's hot (20)

PPTX
ATAGTR2017 The way to recover the issue faced in IoT regression Testing
PDF
Ast in CI/CD by Ofer Maor
PPTX
ATAGTR2017 Testing of Connected Cars Based on IOT
PPTX
ATAGTR2017 Artificial Intelligence in Software Testing – Demystified
PDF
From rogue one to rebel alliance by Peter Chestna
PPTX
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
PDF
Devops: Security's big opportunity by Peter Chestna
PPTX
Null application security in an agile world
PPTX
DevSecOps - It can change your life (cycle)
PDF
Application Security in an Agile World - Agile Singapore 2016
PPTX
DevSecOps-OWASP Indonesia Day 2017
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
PDF
Deploy + Destroy Complete Test Environments
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
End-to-end Testing for IoT Integrity
PDF
A Secure DevOps Journey
PPTX
The State of Testing 2017
PDF
Engineering Trust in Your Automated Tests
PDF
Measuring your way_to_successful_automation_webinar
PPTX
Maturing your path toward DevOps with Continuous Testing
ATAGTR2017 The way to recover the issue faced in IoT regression Testing
Ast in CI/CD by Ofer Maor
ATAGTR2017 Testing of Connected Cars Based on IOT
ATAGTR2017 Artificial Intelligence in Software Testing – Demystified
From rogue one to rebel alliance by Peter Chestna
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Devops: Security's big opportunity by Peter Chestna
Null application security in an agile world
DevSecOps - It can change your life (cycle)
Application Security in an Agile World - Agile Singapore 2016
DevSecOps-OWASP Indonesia Day 2017
DevSecCon London 2017: How far left do you want to go with security? by Javie...
Deploy + Destroy Complete Test Environments
Application Security at DevOps Speed - DevOpsDays Singapore 2016
End-to-end Testing for IoT Integrity
A Secure DevOps Journey
The State of Testing 2017
Engineering Trust in Your Automated Tests
Measuring your way_to_successful_automation_webinar
Maturing your path toward DevOps with Continuous Testing
Ad

Similar to ATAGTR2017 Security Testing / IoT Testing in Real World (20)

PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PDF
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PPTX
Law seminars intl cybersecurity in the power industry
ODP
Web application-security-and-why-you-should-review-yours
PDF
Conférence ENGIE ACSS 2018
PDF
New technologies security threats (Brussels 2014)
PPTX
Ple18 web-security-david-busby
PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PDF
Fall2015SecurityShow
PDF
New challenges to secure the IoT (with notes)
PPTX
Keynote at the Cyber Security Summit Prague 2015
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
From Identity to Ownership Theft
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
PDF
Cyber Security in Manufacturing
PPTX
Security Testing for IoT Systems
PDF
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Spirent: The Internet of Things: The Expanded Security Perimeter
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Law seminars intl cybersecurity in the power industry
Web application-security-and-why-you-should-review-yours
Conférence ENGIE ACSS 2018
New technologies security threats (Brussels 2014)
Ple18 web-security-david-busby
This Time, It’s Personal: Why Security and the IoT Is Different
Fall2015SecurityShow
New challenges to secure the IoT (with notes)
Keynote at the Cyber Security Summit Prague 2015
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
From Identity to Ownership Theft
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Cyber Security in Manufacturing
Security Testing for IoT Systems
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Ad

More from Agile Testing Alliance (20)

PPTX
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
PDF
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...
PPTX
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...
PDF
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
PDF
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
PPTX
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
PPTX
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
PPTX
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
PDF
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
PPTX
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
PPTX
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
PPTX
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
PPTX
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
PDF
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
PPTX
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
PDF
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
PDF
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
PPTX
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
PDF
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...
PPTX
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...

ATAGTR2017 Security Testing / IoT Testing in Real World

  • 1. #ATAGTR2017 16th 17th March Security Testing/ IoT Testing in Real World Aditya Upadhya
  • 2. Agile Testing Alliance Global Testing Retreat 2017 Security testing Internet Of Things • Age of Information Warfare
  • 3. Agile Testing Alliance Global Testing Retreat 2017 whoami Name : Aditya Upadhya Occupation: Information security consultant at Capgemini Location: Navi Mumbai OSCP certified
  • 4. Agile Testing Alliance Global Testing Retreat 2017 • the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. [Wikipedia] What is IOT ?
  • 5. Agile Testing Alliance Global Testing Retreat 2017 • Experts estimate that the IoT will consist of almost 50 billion objects by 2020. [Wikipedia]
  • 6. Agile Testing Alliance Global Testing Retreat 2017 Almost Everywhere! • Mobile devices, Health bands, sensors, GPS • Driverless cars/vehicles • Drones UAV • Daily life usage Household electronics (STB, refrigerators, smart automated home appliances, CCTV etc.) • Surveillance systems • Measuring pollution levels, water level alerts, earthquake and tectonic alerts • Industries: machine maintenance, tracking assets, quality check, safety checks, SCADA-PLC systems, smart grids, nuclear reactors . • POS machines , ATM, Routers. • Health industries. Uses of IOT ?
  • 7. Agile Testing Alliance Global Testing Retreat 2017 Threats- IOT
  • 8. Agile Testing Alliance Global Testing Retreat 2017 • Smartphone :- If Compromised can makes your location, your habits, and yourself more predictable , privacy compromised. • Smart home devices:- can be misused to play pranks, can make life miserable, or even be used to leverage anonymity of a hacker to perform illegal activities. • Driverless cars/vehicles - faulty protocols to failure of security compliance can be threat, vehicles manipulated controls overtaken, risk to life. • Surveillance access:- failure of security compliance, Information gathering made easy for terrorists if not secure. • Sensors: that helps during natural calamities if manipulated, can cause panic among people or reporting false normality in high alerts can be hazardous. Threats
  • 9. Agile Testing Alliance Global Testing Retreat 2017 • Industrial devices :- nuclear reactor controllers , PLC – SCADA systems, Smart grid controllers, driverless trains and more such systems if compromised can cause a great deal of damage to property and life. • Healthcare :- an attacker can gain access to PHI and also manipulate the devices that control drug dosage • Future :- Nano bots in health cares Who knows ? May be they can be reprogrammed for malicious intent ? Threats
  • 10. Agile Testing Alliance Global Testing Retreat 2017 Threats
  • 11. Agile Testing Alliance Global Testing Retreat 2017 Business loss • 3.2 million debit cards compromised; SBI, HDFC Bank, ICICI, YES Bank and Axis worst hit -Economic times. • Ransom ware hits, guests locked in rooms hotel had to pay 1500 EU to save people : http://www.thelocal.at/20170128/hotel-ransomed-by- hackers-as-guests-locked-in-rooms Real life events
  • 12. Agile Testing Alliance Global Testing Retreat 2017 •Stuxnet – case of attack on iran nuclear reactor https://en.wikipedia.org/wiki/Stuxnet •botnets and malwares caused billions of loss https://en.wikipedia.org/wiki/Mirai_(malware) The case of mirai botnet made giants like akamai fall on their knees (internal sources say) Real life events
  • 13. Agile Testing Alliance Global Testing Retreat 2017 •Drones hacked https://packetstormsecurity.com/news/26287/NASA-Hack- AnonSec-Attempts-To-Crash-222m-Drone-Release-Secret- Flight-Videos-And-Employee-Data.html Real life events
  • 14. Agile Testing Alliance Global Testing Retreat 2017 •Cars hacked: • https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ •https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese- hack-remote-control-brakes Real life events
  • 15. Agile Testing Alliance Global Testing Retreat 2017 The Dangers of the Smart Grid • In 2012, the Department of Homeland Security discovered a flaw in hardened grid and router provider RuggedCom’s devices. • Ukraine power station hacked multiple times • https://motherboard.vice.com/en_us/article/ukrainian- power-station-hacking-december-2016-report Real life events
  • 16. Agile Testing Alliance Global Testing Retreat 2017 •Health industry :- In April 2014, Scott Erven and his team of security researchers released the results of a two-year study on the vulnerability of medical devices. They found that they could remotely manipulate devices, including those that controlled dosage levels for drug infusion pumps and connected defibrillators. •http://www.zdnet.com/article/st-jude-releases-security-patches-for-vulnerable- cardiac-devices/ http://m.healthcareitnews.com/news/massive-ddos-attack-harnesses-145000- hacked-iot-devices https://www.cbinsights.com/blog/iot-healthcare-market-map-company-list/ •Hacking blood pressure monitor https://www.edusteinhorst.com/hacking-a-blood-pressure-monitor/ Real life events
  • 17. Agile Testing Alliance Global Testing Retreat 2017 • Shodan search engine has collection of open CCTVs, industrial devices, dumb boxes connected to internet • Thinkful, censys etc • https://thingful.net/adityaupadhya • Demo Search engines
  • 18. Agile Testing Alliance Global Testing Retreat 2017 • In computing, a hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits. [Wikipedia] • A child playing with his remote control car gets curious to know how it operates so, disintegrates the controller and toy car to know about it’s working is also a hacker ! Who is a Hacker ?
  • 19. Agile Testing Alliance Global Testing Retreat 2017 • IOT security Break into several categories • Top 10 from owasp is available but top 10 are not everything. • No standard Methodology can be implemented as IOT is not one thing or framework. • Different (IOT)things has different approach • Analyzing hardware memory devices, wireless devices, and other components like JTAG, UART debugging interfaces • After gathering all information you can identify all attack surface, threat agents and document them. • Prepare a checklist of testing methods against the device and cross check with existing ones to identify if some thing is missing. • Identify vulnerabilities and see if you can exploit further more. • Research, learn and do more information gathering. For techies – how to attack ?
  • 20. Agile Testing Alliance Global Testing Retreat 2017 • https://github.com/nebgnahz/awesome-iot-hacks • http://blog.j-michel.org/post/86992432269/from-nand-chip- to-files • Metasploit enters IOT https://community.rapid7.com/community/transpo- security/blog/2017/02/02/exiting-the-matrix • Defcon , blackhat, conference archives for reference some resources
  • 21. Agile Testing Alliance Global Testing Retreat 2017 • Ensure CIA compliance • Secure by design approach to develop • Changing of default password on first use and strong password policy • Strong encryption mechanisms • Secure application interface • Firmware upgrades • Disable remote access whenever not required • Hardware security • Network layer security • Keep eye on latest security updates and patches For techies – how to defend?
  • 22. Agile Testing Alliance Global Testing Retreat 2017 • Keep yourself such abreast of such developments • Explore insurance options • Have a robust strategy before rolling out the services that depends on IOT. • Lead your security team for attending more and more world hacking conferences like blackhat, defcon, HITB, nullcon etc • Encourage your team mate security testers to explore and research about IOT, learn new case studies and try to replicate. • Encourage them for Technical certifications like OSCP, OSCE etc. For CXO
  • 23. Agile Testing Alliance Global Testing Retreat 2017 • My personal experience in IPTV set top box security testing. Was able to stream TV channels for free using VLC media player and much more… Case study
  • 24. Agile Testing Alliance Global Testing Retreat 2017 Information gathering- Nmap
  • 25. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 26. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 27. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 28. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 29. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 30. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 31. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 32. Agile Testing Alliance Global Testing Retreat 2017 MITM
  • 33. Agile Testing Alliance Global Testing Retreat 2017 Local storage sqlite files
  • 34. Agile Testing Alliance Global Testing Retreat 2017 Local storgae syslog file
  • 35. Agile Testing Alliance Global Testing Retreat 2017 UART
  • 36. Agile Testing Alliance Global Testing Retreat 2017 SQLi
  • 37. Agile Testing Alliance Global Testing Retreat 2017 LFI
  • 38. Agile Testing Alliance Global Testing Retreat 2017 Network local storage information
  • 39. Agile Testing Alliance Global Testing Retreat 2017 • Started simply with nmap • Performing Arp poison with mitm revealed information flying around in GBs • From analysis we got authentication mechanism, types of servers and infrastructure design to some extent • Analyzing local storage device gave IP, channel, port, streaming address, SAP, middleware, backend servers and many other information Summary
  • 40. Agile Testing Alliance Global Testing Retreat 2017 • After having as much as information gathered as possible time to exploit ! • Found LFI, SQLi, user:pass revealed in mitm, authentication mechanism easily bypassed, streaming for free, got ssl pem keys for infrastructure, access to server possible. (not shown in poc) Summary
  • 41. Agile Testing Alliance Global Testing Retreat 2017 • Information gathering • Research • Analyze • Attack • Reform (new 0-day) • Analyze • Improvise • Defend and finally • Evolve. Summary
  • 42. Agile Testing Alliance Global Testing Retreat 2017 Email: adityapadhya@gmail.com Questions ?
  • 43. Agile Testing Alliance Global Testing Retreat 2017 Thank you