SlideShare a Scribd company logo
IOT SECURITY FUN-DAMENTAL
AN OFFENSIVE PERSPECTIVE
Cyber Sec
Satria Ady Pradana
April 14th, 2020
2
Who am I?
Satria Ady Pradana
Ordinary Cyber Security Guy
• Cyber Security Consultant of Mitra Integrasi Informatika
• Penetration Tester, Red Team
• IoT / OT Cyber Security Special Interest Group
• Community Leader of Reversing.ID
• Love Low-Level Stuffs
xathrya
@xathrya
xathrya
Imagine in (Near) Future …
Smart City
SmartHome
Smart Factory
Smart Agriculture
Small; Connected; Continuous
DISASTROUS
Cause irreversible
damage
DISRUPTIVE
Disrupt operational
processes.
DAMAGING
Enable information
stealing
Danger
Classification
10
Authentication: how to prove identities claimed by
devices or users?
Authorization: what set of actions a user can do?
Update: how do we upgrade the system or part of it?
communication:
• how do we ensure no one can read or modify the
messages?
• how do we detect and response to disruption the
communication channel?
Data: how do we ensure the generated data are
valid?
Security Issues
11
2018
Weak Guessable or Hardcoded Passwords
Insecure Network Services
Insecure Ecosystem Interfaces
Lack of Secure Update Mechanism
Insufficient Privacy Protection
Insecure Data Transfer and Storage
Lack of Device Management
Insecure Default Settings
Lack of Physical Hardening
Internet of Things
Security on IoT is a serious concern …
Development Monitoring Assessment
Unique Approach
 Rapid growth, massive volume.
 Distinctive technology.
 Wide range of implementations.
 Multilayered stacks.
 End to end system.
 Web protocol technology.
 Embedded systems
Knowledge Needed
Cyber Sec
14
• Nodes
• Edge Gateway
• Cloud Gateway
• Data storage
• Analytics
• User business
Cyber Sec
15
Integrated Testing for IoT Ecosystem
Things Network Compute
Cyber Sec
THINGS
Devices | Sensors | Machines
MII CYBERSEC 16
17
DEFINE: The Things
• Programmable machine built for specific purpose(s)
• Sense physical events in surrounding.
• Control the connected peripherals.
• Adaptive actions, based on the dynamic of events and commands.
• Able to communicate with peers and servers, directly or indirectly.
a.k.a Embedded Systems
Not all devices are qualified to be “things”
18
ATTACK: The Things
• Change Behavior
• Take Over
• Disable
Physical or Logical
Goal
Techniques
• Exploitation (memory corruption, race condition, etc.)
• Injection (command or telemetry)
• Code Rewrite (firmware replace or downgrade)
• Side-Channel (timing, hardware glitching, power analysis)
• Hardcoded secret
19
FirmwareMost common Analysis Target
Bare Metal Firmware Full-Stack Firmware
• Single program
• No operating system
• Direct access and full control of low level hardware
• Primitive operations.
• Typically used for specific hardware.
• One or more application
• Include embedded OS (ex: linux)
• Higher level of operations
• Typically used
NETWORK
Data | Protocol | Media
20MII CYBERSEC
21
DEFINE: The Network
• Medium for connection.
• Over the air
• Over the wire
• Uniquely addressing the things by identity.
• Protocol for data transport.
22
ATTACK: The Network
• Disrupt communication
Goal
Techniques
• Replay Attack
• Spoofing
• Packet Tampering
• Jamming or Flooding
23
Communication
Data Transmissions
Wireless Wired
• WiFi (IEEE 802.11)
• Bluetooth
• ZigBee
• LoRaWAN
• Cellular (GSM, LTE)
• Z-Wave
• Sigfox
• Ethernet (IEEE 802.3)
• USB
• RS-232
• UART
24
Messaging
Data Transport and Format
• MQTT (Message Queue Telemetry Transport)
• CoAP (Constrained Application Protocol)
• DDS (Data Distribution Service)
• AMQP (Advanced Queuing Protocol)
COMPUTE
Storage | Analysis | Visualization
25MII CYBERSEC
26
DEFINE: The Compute
• Aggregate and store all data generated by things.
• Process and analyze the data.
• Visualize the data, based on certain rules.
• Control the things
Web Applications | Web Service | Mobile Application
27
ATTACK: The Compute
• Take Over
• Data Exfiltration
• Data Modification
Goal Techniques
• Injections
• Command
• Query
• Telemetry
• Broken Session
• Data Poisoning
REFERENCES
28
• https://scriptingxss.gitbook.io/firmware-security-testing-methodology/
• https://github.com/ReversingID/Awesome-Reversing/
• https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Top_10
THANK YOU
xathrya [at] reversing.id
https://xathrya.id
xathrya
@xathrya
xathrya

More Related Content

PPTX
IoT Security - Preparing for the Worst
PDF
IoT Security, Mirai Revisited
PPTX
Iot Security, Internet of Things
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PPTX
Persistence is Key: Advanced Persistent Threats
PDF
Deception Technology: Use Cases & Implementation Approaches
PDF
IoT/M2M Security
IoT Security - Preparing for the Worst
IoT Security, Mirai Revisited
Iot Security, Internet of Things
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Persistence is Key: Advanced Persistent Threats
Deception Technology: Use Cases & Implementation Approaches
IoT/M2M Security

What's hot (20)

PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PPTX
DDOS ATTACK - MIRAI BOTNET
PDF
Ransomware ly
PDF
Security Aspects in IoT - A Review
PDF
How to Respond to Industrial Intrusions
PPTX
IoT security
PDF
Trisis in Perspective: Implications for ICS Defenders
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
PDF
Secure Software Design for Data Privacy
PPTX
Maltego Webinar Slides
PPTX
The Four Types of Threat Detection and Use Cases in Industrial Security
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PDF
Managing Next Generation Threats to Cyber Security
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
IoT Security: Debunking the "We Aren't THAT Connected" Myth
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
DDOS ATTACK - MIRAI BOTNET
Ransomware ly
Security Aspects in IoT - A Review
How to Respond to Industrial Intrusions
IoT security
Trisis in Perspective: Implications for ICS Defenders
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Secure Software Design for Data Privacy
Maltego Webinar Slides
The Four Types of Threat Detection and Use Cases in Industrial Security
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Incident Response: Validation, Containment & Forensics
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Managing Next Generation Threats to Cyber Security
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Ad

Similar to IOT Security FUN-damental (20)

DOCX
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
PPTX
Iot cyber security
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PPTX
Iot(security)
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Protecting your home and office in the era of IoT
PDF
Introduction To Cybersecurity In The Internet Of Things Keke Gai
PDF
[TestWarez 2017] Securing the Internet of Things
PPTX
IoT Security Briefing FBI 07 23-2017 final
PDF
IoT – Breaking Bad
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PDF
Securing the Internet of Things
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Security of iot device
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
DOCX
For this assignment, review the article abomhara, m., & koien,
PPTX
Security in IoT
PPTX
Security challenges for internet of things
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Iot cyber security
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Iot(security)
Track 5 session 1 - st dev con 2016 - need for security for iot
Protecting your home and office in the era of IoT
Introduction To Cybersecurity In The Internet Of Things Keke Gai
[TestWarez 2017] Securing the Internet of Things
IoT Security Briefing FBI 07 23-2017 final
IoT – Breaking Bad
LIFT OFF 2017: IoT and MSS Deep Dive
Securing the Internet of Things
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Security of iot device
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
IRJET - Cyber Security Threats and Vulnerabilities in IoT
For this assignment, review the article abomhara, m., & koien,
Security in IoT
Security challenges for internet of things
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
Ad

More from Satria Ady Pradana (20)

PPTX
Malware for Red Team
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPTX
MITM: Tales of Trust and Betrayal
PPTX
Berkarir di Cyber Security
PPTX
Python-Assisted Red-Teaming Operation
PDF
Silabus Training Reverse Engineering
PPTX
Practical Security - Modern Day Software
PPTX
Firmware Reverse Engineering
PPTX
Reverse Engineering: The Crash Course
PPTX
The Offensive Python: Practical Python for Penetration Testing
PPTX
From Reversing to Exploitation: Android Application Security in Essence
PPTX
Android Security: Art of Exploitation
PPTX
Bypass Security Checking with Frida
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Reverse Engineering: Protecting and Breaking the Software (Workshop)
PPTX
Reverse Engineering: Protecting and Breaking the Software
PPTX
Memory Forensic: Investigating Memory Artefact (Workshop)
PPTX
Memory Forensic: Investigating Memory Artefact
PPTX
Another Side of Hacking
PPTX
Automatic Malware Analysis & Repository
Malware for Red Team
Down The Rabbit Hole, From Networker to Security Professional
MITM: Tales of Trust and Betrayal
Berkarir di Cyber Security
Python-Assisted Red-Teaming Operation
Silabus Training Reverse Engineering
Practical Security - Modern Day Software
Firmware Reverse Engineering
Reverse Engineering: The Crash Course
The Offensive Python: Practical Python for Penetration Testing
From Reversing to Exploitation: Android Application Security in Essence
Android Security: Art of Exploitation
Bypass Security Checking with Frida
Malware: To The Realm of Malicious Code (Training)
Reverse Engineering: Protecting and Breaking the Software (Workshop)
Reverse Engineering: Protecting and Breaking the Software
Memory Forensic: Investigating Memory Artefact (Workshop)
Memory Forensic: Investigating Memory Artefact
Another Side of Hacking
Automatic Malware Analysis & Repository

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Getting Started with Data Integration: FME Form 101
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
Machine Learning_overview_presentation.pptx
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Getting Started with Data Integration: FME Form 101

IOT Security FUN-damental

Editor's Notes

  • #4: Imagine in near future, we live in era …
  • #5: Smart City: city infused with technology to improve living experience Features: street light: public lighting adapts, dims when no activity and brighten up when detecting motion traffic light: coordinate with cluster of traffic light to regulate the traffics. Results: Get information of how city is functioning in real time Predicts how crowd react to something
  • #6: Smart Home: living area with connected technology meant to enhance the home adapts the room temperature based on people inside. detect visitor and devise countermeasure for uninvited guests dish suggestion based on available ingredients and reminding for restocking the supply (or even contact the vendor automatically).
  • #7: Features: Get the current condition of machine Detect anomaly of production machine Coordinated goods transporting between warehouse and machine. Results: Predict machine wear off
  • #8: Features: Automatic plant watering Soil condition monitoring Results: * Efficient soil treatment
  • #10: Function failure -> can happen to any system. Failure can lead to danger. What if the failure can be intentionally triggered?
  • #13: Often IoT is mission critical, security should be
  • #14: IoT pentest need unique approach It also need specific knowledge that might be specialized field