SlideShare a Scribd company logo
Bigger on the Inside: The Tardis Effect on the Security of Embedded Systems Image: http://www.flickr.com/photos/bupswee/2738391972/
Problem space Embedded systems are frequently overlooked during a security audit.  This can have surprising results during an actual incident. Security auditors need to pay attention to devices that appear to be limited function, as they may be bigger in the inside.
What is an embedded system? “ An  embedded system  is a computer system designed to perform one or a few dedicated functions often with real-time computing constraints. It is  embedded  as part of a complete device often including hardware and mechanical parts.” -Wikipedia http://www.flickr.com/photos/squeezyboy/3300595223/
Why are they overlooked? Ubiquitous Small Appear limited Not sexy Lack of attack tools Cramped payloads http://www.flickr.com/photos/cogdog/3771231430/
Why are they vulnerable? Virtues of a programmer Laziness, Impatience, Hubris Code re-use: BSD Systems reuse: Linux, Windows Lack of security orientation
Who overlooks them? Rushed security auditors Busy sysadmins Unaware designers Tool-using hackers Internal bad actors?  Well… High-level, determined attackers?  Er… http://www.flickr.com/photos/sophos_germany/3321595771/
What happens when they fail? Device goes away Low-profile attack platform Opportunity to quietly mess with the victim Can operate quietly forever Possibly forensics resistant http://www.flickr.com/photos/heinousjay/517339489/
The Xerox Workcentre™ Unintentional Server BH 2006 Brendan O'Connor  “Vulnerabilities in Not-So Embedded Systems” Multifunction copy/scan/print 1GHz AMD, 256MB, 80GB HDD Linux, Apache, Postgress Authentication Bypass by switching URL Command injection to iptables from admin interface Image: Courtesy of Xerox Corporation.
Shmoocon Talk: Femtocell Fail "Through the theoretical attack method outlined in our talk, the attacker would compromise the femtocell device to gain full root access over the device," Fasel said. "As the attacker has access to the device, any services the device offers [are] subject to the attacker's control, including voice, data, authentication and access to the femtocell's home network.“ Zfasel, jaku, the information wants to be free! http://www.flickr.com/photos/yourdon/4254008662/in/photostream/
A Radio, and a Whole Lot More The information wants to be free…but so do I. Unnamed Radio System (URS) Software Radios Embedded Linux controller Blank root password, root allowed Telnet Ancient version of the commercial Linux Image: http://www.flickr.com/photos/synthesisstudios/414382700/
How can they be addressed? Research Scanners Fingerprinting Others… http://www.flickr.com/photos/tjt195/380173157/
Let’s Review Frequently skipped Best intentions lead to failure Best intentions fail to find them Worst intentions seem to, though Real-world examples exist Mix of techniques http://www.flickr.com/photos/sheepbackcabin/3219647072/
Wake up! http://www.flickr.com/photos/walkn/3526522573/

More Related Content

PDF
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
PDF
Android system security
PPTX
Nimrod duck hunter copy
PDF
Securing the Socks Shop
PDF
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 1)
PDF
Brief Tour about Android Security
PPTX
Android rooting
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Android system security
Nimrod duck hunter copy
Securing the Socks Shop
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 1)
Brief Tour about Android Security
Android rooting
2015.04.24 Updated > Android Security Development - Part 1: App Development

What's hot (20)

PDF
Andriod Pentesting and Malware Analysis
PPT
Attacking Embedded Devices (No Axe Required)
PPTX
Pentesting Android Apps
PDF
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
PPTX
PowerShell: A Language for the Internet of Things #ATLPUG
PDF
2015.10.05 Updated > Network Device Development - Part 1: Switch
PPTX
Practical Security Assessments of IoT Devices and Systems
PDF
Finding the needle in the hardware haystack - HRES (1)
PDF
Let's Hack a House
PDF
Android Security
PDF
Status of AEM for Intel and AMD
PPTX
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
PPTX
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
PDF
Resin.io contribution to the AGILE-IoT project
PDF
It’s All In The Name - Deral Heiland
PDF
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Direc...
PDF
The Infosec Revival
PPTX
Test & Tea : ITSEC testing, manual vs automated
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PPTX
Intel McAfee DeepSAFE Technology
Andriod Pentesting and Malware Analysis
Attacking Embedded Devices (No Axe Required)
Pentesting Android Apps
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
PowerShell: A Language for the Internet of Things #ATLPUG
2015.10.05 Updated > Network Device Development - Part 1: Switch
Practical Security Assessments of IoT Devices and Systems
Finding the needle in the hardware haystack - HRES (1)
Let's Hack a House
Android Security
Status of AEM for Intel and AMD
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Resin.io contribution to the AGILE-IoT project
It’s All In The Name - Deral Heiland
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Direc...
The Infosec Revival
Test & Tea : ITSEC testing, manual vs automated
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Intel McAfee DeepSAFE Technology
Ad

Viewers also liked (20)

PPTX
The MonmouthpediA Innovation project & its implications for the Welsh Tourism...
PPT
Pain Management: Lewis Pain
PPTX
Мониторинг приложений ASP.NET на основе сервиса Application Insights
PPTX
Northumbria_BA1_SarahCharlton
PPT
Great Idea
PPT
Mercer Island Relational Aggression Presentation
PPTX
1960's horror
PPTX
A Godless Generation
PPT
Culture
PPTX
METAL
PDF
Spoken language quiz
PDF
My Awesome Resume
PDF
Cut the Crap: Why Marketing Hasn't Changed And You Should Stop Chasing Shiny ...
RTF
PPTX
Establishing a climate smart agricultural world
PDF
Turn Your Designers Into Death Stars with Angular
PPTX
Unblocking the brain so you can think creatively
PPTX
Design in Transit: Moving Forward
PPTX
back yard farming
PDF
Kompyuterlə ilkin tanışlıq. Kompyuterin tərkib hissələri
The MonmouthpediA Innovation project & its implications for the Welsh Tourism...
Pain Management: Lewis Pain
Мониторинг приложений ASP.NET на основе сервиса Application Insights
Northumbria_BA1_SarahCharlton
Great Idea
Mercer Island Relational Aggression Presentation
1960's horror
A Godless Generation
Culture
METAL
Spoken language quiz
My Awesome Resume
Cut the Crap: Why Marketing Hasn't Changed And You Should Stop Chasing Shiny ...
Establishing a climate smart agricultural world
Turn Your Designers Into Death Stars with Angular
Unblocking the brain so you can think creatively
Design in Transit: Moving Forward
back yard farming
Kompyuterlə ilkin tanışlıq. Kompyuterin tərkib hissələri
Ad

Similar to Bigger On The Inside (20)

PDF
iThome CyberSec2021 Container Security
PDF
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
PPT
Firewalls (Distributed computing)
PPT
Ethical Hacking
PDF
CarolinaCon 2008 Rootkits Then and Now
PDF
EMBA - From Firmware to Exploit - BHEU22
PDF
The Internet of Insecure Things: 10 Most Wanted List
PDF
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
PDF
Rootkit&honeypot aalonso-dcu-dec09
PDF
The Internet of Things: We've Got to Chat
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
UEFI Firmware Rootkits: Myths and Reality
PDF
20+ Ways to Bypass Your macOS Privacy Mechanisms
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PPTX
News Bytes - May 2015
PDF
20+ ways to bypass your mac os privacy mechanisms
PPTX
PPT ON CYBER SECURITY FRAMEWORK & CYBER AUDITING IN CRPF .pptx
PPTX
Iot through hardware
iThome CyberSec2021 Container Security
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
Firewalls (Distributed computing)
Ethical Hacking
CarolinaCon 2008 Rootkits Then and Now
EMBA - From Firmware to Exploit - BHEU22
The Internet of Insecure Things: 10 Most Wanted List
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
Rootkit&honeypot aalonso-dcu-dec09
The Internet of Things: We've Got to Chat
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
UEFI Firmware Rootkits: Myths and Reality
20+ Ways to Bypass Your macOS Privacy Mechanisms
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
News Bytes - May 2015
20+ ways to bypass your mac os privacy mechanisms
PPT ON CYBER SECURITY FRAMEWORK & CYBER AUDITING IN CRPF .pptx
Iot through hardware

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
August Patch Tuesday
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting Started with Data Integration: FME Form 101
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TLE Review Electricity (Electricity).pptx
August Patch Tuesday
Web App vs Mobile App What Should You Build First.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles – August ’25 Week III
Univ-Connecticut-ChatGPT-Presentaion.pdf
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
O2C Customer Invoices to Receipt V15A.pptx
1. Introduction to Computer Programming.pptx
DP Operators-handbook-extract for the Mautical Institute
OMC Textile Division Presentation 2021.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf

Bigger On The Inside

  • 1. Bigger on the Inside: The Tardis Effect on the Security of Embedded Systems Image: http://www.flickr.com/photos/bupswee/2738391972/
  • 2. Problem space Embedded systems are frequently overlooked during a security audit. This can have surprising results during an actual incident. Security auditors need to pay attention to devices that appear to be limited function, as they may be bigger in the inside.
  • 3. What is an embedded system? “ An embedded system is a computer system designed to perform one or a few dedicated functions often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts.” -Wikipedia http://www.flickr.com/photos/squeezyboy/3300595223/
  • 4. Why are they overlooked? Ubiquitous Small Appear limited Not sexy Lack of attack tools Cramped payloads http://www.flickr.com/photos/cogdog/3771231430/
  • 5. Why are they vulnerable? Virtues of a programmer Laziness, Impatience, Hubris Code re-use: BSD Systems reuse: Linux, Windows Lack of security orientation
  • 6. Who overlooks them? Rushed security auditors Busy sysadmins Unaware designers Tool-using hackers Internal bad actors? Well… High-level, determined attackers? Er… http://www.flickr.com/photos/sophos_germany/3321595771/
  • 7. What happens when they fail? Device goes away Low-profile attack platform Opportunity to quietly mess with the victim Can operate quietly forever Possibly forensics resistant http://www.flickr.com/photos/heinousjay/517339489/
  • 8. The Xerox Workcentre™ Unintentional Server BH 2006 Brendan O'Connor “Vulnerabilities in Not-So Embedded Systems” Multifunction copy/scan/print 1GHz AMD, 256MB, 80GB HDD Linux, Apache, Postgress Authentication Bypass by switching URL Command injection to iptables from admin interface Image: Courtesy of Xerox Corporation.
  • 9. Shmoocon Talk: Femtocell Fail "Through the theoretical attack method outlined in our talk, the attacker would compromise the femtocell device to gain full root access over the device," Fasel said. "As the attacker has access to the device, any services the device offers [are] subject to the attacker's control, including voice, data, authentication and access to the femtocell's home network.“ Zfasel, jaku, the information wants to be free! http://www.flickr.com/photos/yourdon/4254008662/in/photostream/
  • 10. A Radio, and a Whole Lot More The information wants to be free…but so do I. Unnamed Radio System (URS) Software Radios Embedded Linux controller Blank root password, root allowed Telnet Ancient version of the commercial Linux Image: http://www.flickr.com/photos/synthesisstudios/414382700/
  • 11. How can they be addressed? Research Scanners Fingerprinting Others… http://www.flickr.com/photos/tjt195/380173157/
  • 12. Let’s Review Frequently skipped Best intentions lead to failure Best intentions fail to find them Worst intentions seem to, though Real-world examples exist Mix of techniques http://www.flickr.com/photos/sheepbackcabin/3219647072/

Editor's Notes

  • #4: Like probably everyone else in the room, I asked Google…which told me I should have started with Wikipedia. Note what is doesn’t say: nowhere does it say an embedded system can’t use general purpose software and hardware components, only that it isn’t designed to.
  • #6: Laziness The quality that makes you go to great effort to reduce overall energy expenditure. It makes you write labor-saving programs that other people will find useful, and document what you wrote so you don't have to answer so many questions about it. Impatience:This makes you write programs that don't just react to your needs, but actually anticipate them. Hubris: Also the quality that makes you write (and maintain) programs that other people won't want to say bad things about. Common software components mean that existing techniques will work, albeit with custom payloads. People securing servers have pretty much gotten it. Hopefully your programming classes are showing it to you. If not, please ask your professors to stop hurting the world. The designers of small, limited function devices? Not so much.