SlideShare a Scribd company logo
Security the IoT
World!
Hello!
I am Aaron
Guzman
Pentester
Chapter Leader for OWASP CSA HTCIA
You can find me at:
@scriptingxss
Agenda
The Basics
IoT?
The concepts
Digging a little deeper
Supply Chain
Push out those ideas to
market
The realities
Numbers on the rise
The issues
Pfft...whats security? But wait,
my privacy
The Resolutions
Saving the world
The Basics
IoT
What Exactly is IoT?
“The Internet of Things (IoT) is the
network of physical objects that
contain embedded technology to
communicate and sense or interact
with their internal states or the
external environment..Source: http://www.gartner.com/it-glossary/internet-of-things/
Source http://postscapes.com/what-exactly-is-the-internet-of-things-
infographic
The Concepts
IoT
Digging a little deeper
Hardware
IoT OS and Frameworks
Platform = The Cloud
Io t slides_iotvillage
Protocols for Communication
❏ Zigbee
❏ Wi-Fi
❏ NFC
❏ Z-Wave
❏ CoAP
❏ 6LoPAN
❏ XMPP
❏ BLe
❏ SOAP
❏ REST
❏ MQTT
❏ Lutron
❏ RFID
❏ GSM
Io t slides_iotvillage
Hubs
4.9 Billion
Connected Devices in 2015
Source:http://www.gartner.com/newsroom/id/2905717
Pads
Leads
Traces
Silkscreens
Analog vs Digital
Layers (4)
Reflow
PCB
source: https://learn.sparkfun.com/tutorials/electronics-assembly
❏ VxWorks
❏ Marvell
❏ Broadcom
❏ Texas Instruments
❏ Intel
❏ AMD
❏ NXP
★ Create the device
drivers
Board Support Packages (BSP)
Original Design Manufacturer (ODM)
❏ designs and manufactures a product
❏ eventually rebranded by another firm for sale
❏ allow the brand firm to produce (either as a supplement or
solely) without having to engage in the organization or running
of a factory.
❏ own cloud infrastructures for customers
❏ Provide SDKs
★ Many ODMs in China
★ A dime a dozen
http://en.wikipedia.org/wiki/Original_design_manufa
cturer
Cloud Service Providers
❏ Amazon
❏ Microsoft
❏ Google
❏ Thingsworx
❏ ODM Clouds
❏ Have their own SDKs
❏ Who knows where else?
http://en.wikipedia.org/wiki/Original_design_manufa
cturer
Original Equipment Manufacturer (OEM)
❏ Manufacturers who resell another company's
product under their own name and branding.
❏ Offers its own warranty, support and licensing
of the product.
http://en.wikipedia.org/wiki/Original_design_manufa
cturer
IoT Supply Chain Process
BSP ODM OEM
★ Each likely to outsource development work
and have multiple teams
CSP
Keep in Mind
Hardware comes from everywhere
PMs
Primary Roles
Sales Engineers
Supply Chain Process (Cont)
Sales
★ Get the
business
★ Outreach
★ Create
relationships
PM’s
★ Prioritizes
★ Objective
Based
★ Project specific
to engineer
team
Engineers
★ Write Code
★ May not be a
big team
★ Different
workflows per
dev team
★ Split up into
features. I.E UI
team, UX team,
backend,
Android, iOS
Io t slides_iotvillage
Anyone Looking
at Security??
Io t slides_iotvillage
Vectors
❏ UART
❏ JTAG
❏ EEPROM
❏ SPI
❏ SOIC
❏ I2C
Tools
❏ Shikra (UART SPI JTAG)
❏ Bus Pirate
❏ JTagulator
❏ GoodFET
❏ flashrom
❏ EE Tools
❏ Chipquick
Hardware Security
(Exploitation)
Source:my linksys 1900ac :)
Common
❏ TCP
❏ ToolChains (Libs)
❏ UART
❏ JTAG
❏ Layer 7
❏ EEPROM
❏ Bluetooth
Less Common
❏ TCP
❏ Flash
❏ GSM
❏ GPS
❏ I2C
❏ Kernel (115 CVEs 2014)
Embedded Security
Source:http://lwn.net/talks/2015/kr-lca-
2015.pdf
Wireless Security aka RF
❏ Zigbee (2.4GHZ 915MHZ)
❏ Killerbee Framework
❏ Soon Xipiter’s “RFCat Zigbee”
❏ Atmel
❏ 802.11
❏ Hundreds of tools
❏ Z-Wave
❏ Z-force
❏ Bluetooth LE
❏ nRF51822 - v1.0
❏ Proprietary bands
❏ TI C1111
First time sniffing BLE traffic
source:http://securityreactions.tumblr.com/
Android App
Security
❏ Webview Security
❏ Privacy
❏ Client-side Inject
❏ AndroidManifest.xml
❏ Permissions
❏ Activities, Broadcast
Receivers, Services
❏ Android APIs
❏ Memory Security
❏ addJavascriptInterface
❏ Secure Storage
❏ Transport Security
❏ SSL Pinning
iPhone App
Security
❏ UIWebView Security
❏ Privacy
❏ Client-side Inject
❏ Data Protection
❏ Cloud API security
❏ iOS SDK API
❏ Memory Security
❏ Injection Attacks
❏ Memory Corruption
❏ Transport Security
❏ SSL Pinning
❏ Blackbox Assessments
❏ Logging
❏ Homekit
❏ Network Security
❏ ACLs
❏ Systems
❏ DB
❏ Web servers
❏ LBs
❏ Daemons
❏ Application Security
❏ Language
❏ Frameworks
❏ 3rd Party Libs
Web App / Operational Security
A lot of work!!!....
❏ Windows
❏ OSX
❏ Old School CD setup
❏ Data storage
❏ Data permissions
❏ Persistence
Desktop Apps
source:http://securityreactions.tumblr.com/
source:http://securityreactions.tumblr.com/
Known Security
Downfalls
source:http://securityreactions.tumblr.com/
“Because computers go through so
many hands before they’re delivered
to you, there’s a serious concern
that anyone could backdoor the
computer without your knowledge
Source: Jonathan Brossard-http://resources.infosecinstitute.com/hardware-attacks-
backdoors-and-electronic-component-qualification/
What not to do
❏ UART pins exposed unauthenticated or using
simple passwords
❏ Manufacturing Debugging Scripts
❏ Backdoors using secret user agents
❏ Private Keys on devices (Dont rely on
obscurity)
❏ Default Passwords
★ Ton of other backdoors from software down to
HDL code in the chipset
Secure It Already (Embedded)
❏ Restrict Shell with
tamper resistant
epoxy and silk
screen
❏ Very long passwds
❏ Update Kernel and
Packages
❏ Harden OS by
removing unused
code
❏ Secure updates
❏ Secure C Functions
❏ Verify and test code
Io t slides_iotvillage
Regulatory
Impact
“Implement “security by design.”
Rather than grafting security on as
an afterthought, build it into your
products or services at the outset of
your planning process
Source:https://www.ftc.gov/system/files/documents/plain-language/pdf0199-
carefulconnections-buildingsecurityinternetofthings.pdf
FTC and EU Commission
❏ Privacy By Design
❏ Security By Design
❏ Categorization of IoT devices
❏ Biggest Consumer Protection
http://www.ftc.gov/news-events/press-releases/2013/04/ftc-seeks-
input-privacy-and-security-implications-internet-things
Io t slides_iotvillage
Io t slides_iotvillage
Io t slides_iotvillage
Io t slides_iotvillage
Io t slides_iotvillage
Something is
Missing
IoT Supply Chain
How can we make it more secure?
Fixing The IoT
❏ LIABILITY!
❏ Security service agreements with ODMs
❏ Legal repercussions
❏ Community Projects
❏ Security Awareness
❏ Security Processes into SDLC
❏ A common certification standard (Wi-FI &
Zigbee)
★ Realistic? ……… Maybe
Defense in
Depth!!!
How to help
Io t slides_iotvillage
Thanks!
Any questions?
You can find me at:
@scriptingxss
aaron.guzman@owasp.org

More Related Content

PPTX
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
PPTX
Ransomware - what is it, how to protect against it
PDF
IoT security is a nightmare. But what is the real risk?
PPTX
Firmware analysis 101
PDF
Mickey pacsec2016_final
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
Beginners guide on how to start exploring IoT 2nd session
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
Ransomware - what is it, how to protect against it
IoT security is a nightmare. But what is the real risk?
Firmware analysis 101
Mickey pacsec2016_final
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginners guide on how to start exploring IoT 2nd session
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...

What's hot (20)

PDF
IoT security zigbee -- Null Meet bangalore
PDF
The art of android hacking
PDF
Hacking Windows 95 #33c3
PPT
Firewalls (Distributed computing)
PDF
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
PPTX
ShadyRAT: Anatomy of targeted attack
PDF
Practical cryptanalysis for hackers
PDF
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
PDF
From printed circuit boards to exploits
PPTX
Corporate Espionage without the Hassle of Committing Felonies
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PDF
Let's Hack a House
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PDF
The Internet of Things: We've Got to Chat
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
FRONTIERS IN CRYPTOGRAPHY
PDF
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
IoT security zigbee -- Null Meet bangalore
The art of android hacking
Hacking Windows 95 #33c3
Firewalls (Distributed computing)
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
ShadyRAT: Anatomy of targeted attack
Practical cryptanalysis for hackers
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
From printed circuit boards to exploits
Corporate Espionage without the Hassle of Committing Felonies
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Let's Hack a House
Webinar On Ethical Hacking & Cybersecurity - Day2
The Internet of Things: We've Got to Chat
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
FRONTIERS IN CRYPTOGRAPHY
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Ad

Similar to Io t slides_iotvillage (20)

PPTX
Successful Industrial IoT patterns
PPTX
Hugo Fiennes - Security and the IoT - Electric Imp
PPTX
IoT Security Risks and Challenges
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
WSO2Con EU 2015: IoT in Finance
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
[TestWarez 2017] Securing the Internet of Things
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
PDF
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
PPTX
Security Testing for IoT Systems
PDF
IoT – Breaking Bad
PDF
Bridgera enterprise IoT security
PDF
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
PDF
Best Practices for Design Hardware APIs
PDF
IoT Security and Privacy Considerations
PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PDF
Successful Industrial IoT Patterns
PPTX
Fundamental Best Practices in Secure IoT Product Development
PPTX
IoT security
Successful Industrial IoT patterns
Hugo Fiennes - Security and the IoT - Electric Imp
IoT Security Risks and Challenges
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
WSO2Con EU 2015: IoT in Finance
IoT Security: Debunking the "We Aren't THAT Connected" Myth
[TestWarez 2017] Securing the Internet of Things
Ryan Wilson - ryanwilson.com - IoT Security
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
Security Testing for IoT Systems
IoT – Breaking Bad
Bridgera enterprise IoT security
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Best Practices for Design Hardware APIs
IoT Security and Privacy Considerations
This Time, It’s Personal: Why Security and the IoT Is Different
Successful Industrial IoT Patterns
Fundamental Best Practices in Secure IoT Product Development
IoT security
Ad

Io t slides_iotvillage

  • 2. Hello! I am Aaron Guzman Pentester Chapter Leader for OWASP CSA HTCIA You can find me at: @scriptingxss
  • 3. Agenda The Basics IoT? The concepts Digging a little deeper Supply Chain Push out those ideas to market The realities Numbers on the rise The issues Pfft...whats security? But wait, my privacy The Resolutions Saving the world
  • 5. “The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment..Source: http://www.gartner.com/it-glossary/internet-of-things/
  • 9. IoT OS and Frameworks
  • 10. Platform = The Cloud
  • 12. Protocols for Communication ❏ Zigbee ❏ Wi-Fi ❏ NFC ❏ Z-Wave ❏ CoAP ❏ 6LoPAN ❏ XMPP ❏ BLe ❏ SOAP ❏ REST ❏ MQTT ❏ Lutron ❏ RFID ❏ GSM
  • 14. Hubs
  • 15. 4.9 Billion Connected Devices in 2015 Source:http://www.gartner.com/newsroom/id/2905717
  • 16. Pads Leads Traces Silkscreens Analog vs Digital Layers (4) Reflow PCB source: https://learn.sparkfun.com/tutorials/electronics-assembly
  • 17. ❏ VxWorks ❏ Marvell ❏ Broadcom ❏ Texas Instruments ❏ Intel ❏ AMD ❏ NXP ★ Create the device drivers Board Support Packages (BSP)
  • 18. Original Design Manufacturer (ODM) ❏ designs and manufactures a product ❏ eventually rebranded by another firm for sale ❏ allow the brand firm to produce (either as a supplement or solely) without having to engage in the organization or running of a factory. ❏ own cloud infrastructures for customers ❏ Provide SDKs ★ Many ODMs in China ★ A dime a dozen http://en.wikipedia.org/wiki/Original_design_manufa cturer
  • 19. Cloud Service Providers ❏ Amazon ❏ Microsoft ❏ Google ❏ Thingsworx ❏ ODM Clouds ❏ Have their own SDKs ❏ Who knows where else? http://en.wikipedia.org/wiki/Original_design_manufa cturer
  • 20. Original Equipment Manufacturer (OEM) ❏ Manufacturers who resell another company's product under their own name and branding. ❏ Offers its own warranty, support and licensing of the product. http://en.wikipedia.org/wiki/Original_design_manufa cturer
  • 21. IoT Supply Chain Process BSP ODM OEM ★ Each likely to outsource development work and have multiple teams CSP
  • 23. Hardware comes from everywhere
  • 25. Supply Chain Process (Cont) Sales ★ Get the business ★ Outreach ★ Create relationships PM’s ★ Prioritizes ★ Objective Based ★ Project specific to engineer team Engineers ★ Write Code ★ May not be a big team ★ Different workflows per dev team ★ Split up into features. I.E UI team, UX team, backend, Android, iOS
  • 29. Vectors ❏ UART ❏ JTAG ❏ EEPROM ❏ SPI ❏ SOIC ❏ I2C Tools ❏ Shikra (UART SPI JTAG) ❏ Bus Pirate ❏ JTagulator ❏ GoodFET ❏ flashrom ❏ EE Tools ❏ Chipquick Hardware Security (Exploitation) Source:my linksys 1900ac :)
  • 30. Common ❏ TCP ❏ ToolChains (Libs) ❏ UART ❏ JTAG ❏ Layer 7 ❏ EEPROM ❏ Bluetooth Less Common ❏ TCP ❏ Flash ❏ GSM ❏ GPS ❏ I2C ❏ Kernel (115 CVEs 2014) Embedded Security Source:http://lwn.net/talks/2015/kr-lca- 2015.pdf
  • 31. Wireless Security aka RF ❏ Zigbee (2.4GHZ 915MHZ) ❏ Killerbee Framework ❏ Soon Xipiter’s “RFCat Zigbee” ❏ Atmel ❏ 802.11 ❏ Hundreds of tools ❏ Z-Wave ❏ Z-force ❏ Bluetooth LE ❏ nRF51822 - v1.0 ❏ Proprietary bands ❏ TI C1111
  • 32. First time sniffing BLE traffic source:http://securityreactions.tumblr.com/
  • 33. Android App Security ❏ Webview Security ❏ Privacy ❏ Client-side Inject ❏ AndroidManifest.xml ❏ Permissions ❏ Activities, Broadcast Receivers, Services ❏ Android APIs ❏ Memory Security ❏ addJavascriptInterface ❏ Secure Storage ❏ Transport Security ❏ SSL Pinning
  • 34. iPhone App Security ❏ UIWebView Security ❏ Privacy ❏ Client-side Inject ❏ Data Protection ❏ Cloud API security ❏ iOS SDK API ❏ Memory Security ❏ Injection Attacks ❏ Memory Corruption ❏ Transport Security ❏ SSL Pinning ❏ Blackbox Assessments ❏ Logging ❏ Homekit
  • 35. ❏ Network Security ❏ ACLs ❏ Systems ❏ DB ❏ Web servers ❏ LBs ❏ Daemons ❏ Application Security ❏ Language ❏ Frameworks ❏ 3rd Party Libs Web App / Operational Security A lot of work!!!....
  • 36. ❏ Windows ❏ OSX ❏ Old School CD setup ❏ Data storage ❏ Data permissions ❏ Persistence Desktop Apps
  • 41. “Because computers go through so many hands before they’re delivered to you, there’s a serious concern that anyone could backdoor the computer without your knowledge Source: Jonathan Brossard-http://resources.infosecinstitute.com/hardware-attacks- backdoors-and-electronic-component-qualification/
  • 42. What not to do ❏ UART pins exposed unauthenticated or using simple passwords ❏ Manufacturing Debugging Scripts ❏ Backdoors using secret user agents ❏ Private Keys on devices (Dont rely on obscurity) ❏ Default Passwords ★ Ton of other backdoors from software down to HDL code in the chipset
  • 43. Secure It Already (Embedded) ❏ Restrict Shell with tamper resistant epoxy and silk screen ❏ Very long passwds ❏ Update Kernel and Packages ❏ Harden OS by removing unused code ❏ Secure updates ❏ Secure C Functions ❏ Verify and test code
  • 46. “Implement “security by design.” Rather than grafting security on as an afterthought, build it into your products or services at the outset of your planning process Source:https://www.ftc.gov/system/files/documents/plain-language/pdf0199- carefulconnections-buildingsecurityinternetofthings.pdf
  • 47. FTC and EU Commission ❏ Privacy By Design ❏ Security By Design ❏ Categorization of IoT devices ❏ Biggest Consumer Protection http://www.ftc.gov/news-events/press-releases/2013/04/ftc-seeks- input-privacy-and-security-implications-internet-things
  • 54. IoT Supply Chain How can we make it more secure?
  • 55. Fixing The IoT ❏ LIABILITY! ❏ Security service agreements with ODMs ❏ Legal repercussions ❏ Community Projects ❏ Security Awareness ❏ Security Processes into SDLC ❏ A common certification standard (Wi-FI & Zigbee) ★ Realistic? ……… Maybe
  • 59. Thanks! Any questions? You can find me at: @scriptingxss aaron.guzman@owasp.org

Editor's Notes

  • #18: In embedded systems, a board support package (BSP) is implementation of specific support code (software) for a given (device motherboard) board that conforms to a given operating system. It is commonly built with a bootloader that contains the minimal device support to load the operating system and device drivers for all the devices on the board. Some suppliers also provide a root file system, a toolchain for making programs to run on the embedded system (which would be part of the architecture support package), and configurators for the devices (while running). http://en.wikipedia.org/wiki/Board_support_package
  • #31: RTOS - vxworks
  • #32: http://www.ti.com/tool/packet-sniffer https://code.google.com/p/z-force/
  • #37: Common in cameras, routers malware worms?
  • #48: First, companies should build security into their devices at the outset, rather than as an afterthought. As part of the security by design process, companies should consider: (1) conducting a privacy or security risk assessment; (2) minimizing the data they collect and retain; and (3) testing their security measures before launching their products. Second, with respect to personnel practices, companies should train all employees about good security, and ensure that security issues are addressed at the appropriate level of responsibility within the organization. Third, companies should retain service providers that are capable of maintaining reasonable security and provide reasonable oversight for these service providers. Fourth, when companies identify significant risks within their systems, they should implement a defense-indepth approach, in which they consider implementing security measures at several levels. Fifth, companies should consider implementing reasonable access control measures to limit the ability of an unauthorized person to access a consumer’s device, data, or even the consumer’s network. Finally, companies should continue to monitor products throughout the life cycle and, to the extent feasible, patch known vulnerabilities.
  • #56: Liability
  • #59: lets keep rippin them!!!