SlideShare a Scribd company logo
IoT	Security:	How	Your	TV	and	
Thermostat	are	A9acking	the	Internet	
Nathan	Wallace,	PhD,	CSSA	
Dir.	of	Cyber	OperaHons,	Cybirical,	LLC	
Dec.	05	2016	
Computer Science
Outline
•  The Internet of Things (Everything)
Examples of IoT Devices
Power Grid (‘Grid of Things’)
•  Security Challenges
End-Point Security, Global Issues,
0-Days, No Motivation
•  The Mirai Botnet
Background (DNS)
Oct. 21st Summary
•  Tinkering Around
Experimenting with an IP Cam
What is this ‘thing’ really doing
Source: http://www.comsoc.org/blog/infographic-internet-things-iot
By the numbers
By the numbers
Source: http://www.comsoc.org/blog/infographic-internet-things-iot
By the numbers
Source: http://www.comsoc.org/blog/infographic-internet-things-iot
Internet of Things
Examples
Video
Video
FEATURES
Integrated cleansing.
Adjustable spray shape, position, water pressure, temperature, pulsate.
Self-cleaning
Warm-air drying system with adjustable temperature settings.
Automatic deodorization system.
Heated seat with adjustable temperature settings.
Motion-activated
LED lighting illuminates the bowl to serve as a night-light.
Touchscreen LCD remote control.
Plays Music
Internet of Things
Examples
Video
Grid of Things
State of Affairs Power Grid
“Our expectations is that the modernized
electricity grid will be 100 to 1000 times larger
than the Internet”
– CISCO VP
Advanced
Metering
Electric
Vehicles
Distributed
Generation
Grid Modernization
Distribution
Automation
IoT Security => Safety
ICS-CERT
Wait, so what exactly is IoT?
Wait, so what exactly is IoT?
Source: IoT European Research Cluster, IERC, 2014
IoT Defined... Now Security...
Implementing security with:
•  No Incentives (or Consequences)
•  Do vendors and consumers even care
•  World economy, markets, and conflicts
•  Engineering silos
•  Engineering ethical barriers
•  Limited understanding of complexity and emergent issues
Miria Botnet
Source: Level 3 Communications
Outage Map October 21 2016
Background
Source: Simon Liu, "Surviving Distributed Denial-of-Service Attacks", IT Professional
vol. 11, p. 51-53, September/October, 2009
Background
How Domain Name Service Works
‘The Phone Book of the Internet’
(1) Where is Google?
DNS Server
Google
(2) Google is at
108.177.8.113
(3) Searching the Web
108.177.8.113/search?q=IEEE
Summary
Source: http://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/
Dyn’s Key Findings:
•  ‘The Friday October 21, 2016 attack has been analyzed as a
complex & sophisticated attack, using maliciously targeted,
masked TCP and UDP traffic over port 53.’
•  Dyn confirms Mirai botnet as primary source of malicious attack
traffic.
•  Attack generated compounding recursive DNS retry traffic,
further exacerbating its impact.
DNS Server
DYN Attack cont. and IoT Security Hearing
‘Level 3 detected approximately 150,000 IoT devices were
used to … generate significant amount of bandwidth use that
threatens the fabric of the global internet.’
Source: U.S. House of Representatives Joint Hearing “Understanding the
Role of Connected Devices in Recent Cyber Attacks” November 16, 2016
‘We believe that in the case of Dyn, the relatively unsophisticated’
Summary
‘The distributed denial-of-service attack that caused the
outages, and the vulnerabilities that made the attack possible,
was as much a failure of market and policy as it was of
technology’
Witness Testimonies
Recon...
the Internet of Things
Power Plants, Refrigerators,
…, Buildings, Webcams, …
Source: Shodan
Recon...
Source: Shodan
Experimenting
IP Camera 3.6mm 4MP Full HD IR Mini
Dome PoE Network Camera Built-in Mic
What is this ‘thing’ really doing…?
Inspiration
Source: http://securityaffairs.co/wordpress/53588/malware/mirai-infection-
test.html
Experimenting
Design
1.  No Router Connection
2.  Internet Connectivity
3.  Port Forwarding (Future)
- Network Monitoring
- Port Scan
- Network Monitoring
- Port Scan
- Network Monitoring
- Port Scan
Experimenting
Design
1.  No Router Connection
Experimenting
Design
1.  No Router Connection
Default Open Ports Web
Real Time Streaming
Print Services Interface
Universal Plug and Play
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.
Experimenting
Design
1.  No Router Connection
Multicasting
Who has 192.168.1.1? Tell 192.168.1.108
Simple Service Discovery Protocol
192.168.1.108 239.255.255.250 NOTIFY
192.168.1.108 224.0.0.22 IGMPv360
Report / Join group 239.255.255.250 for any sources
Experimenting
Design
2. Internet Connectivity
-ROUTER_12:6d:81 e0:50:8b:0a:06:d3 192.168.1.254 is at …
target 192.168.1.66
-192.168.1.66 192.168.1.254 DNS 81 Standard query 0x016f A
www.dahuap2pcloud.com
-192.168.1.254192.168.1.66 DNS 97 Standard query
response 0x016f A www.dahuap2pcloud.com A 121.199.3.195
DHGET /online/p2psrv/2J03977PAA00347 HTTP/1.1CSeq: 1927610396Authorization: WSSE
profile="UsernameToken"X-WSSE: UsernameToken Username="2J03977PAA00347",
PasswordDigest="NanYJZWK4bKmrYW7ngt2EK50AY80", Nonce="-691305717",
Created="2000-01-01T02:52:12Z"
-192.168.1.66 121.199.3.195 UDP 303 58124 8800 Len=261
ExperimentingDesign
2. Internet Connectivity
-192.168.1.254192.168.1.66 DNS 97 Standard query
response 0x0173 A www.dahuap2pcloud.com A 120.26.104.240
-192.168.1.66 192.168.1.254 DNS 81 Standard query
0x0173 A www.dahuap2pcloud.com
-192.168.1.66 120.26.104.240 UDP 310 46071 8800
Experimenting
Design
2. Internet Connectivity
- 192.168.1.254 192.168.1.66 DNS 92 Standard query
response 0x0170 A www.dahuap2p.com A 223.6.252.231
-192.168.1.66 192.168.1.254 DNS 76 Standard query 0x0170 A
www.dahuap2p.com
- 192.168.1.66 223.6.252.231 TCP 60 41776 12366 [ACK]
Seq=1 Ack=1 Win=14608 Len=0
What are you sending?
Experimenting
Design
2. Internet Connectivity
What are you sending?
192.168.1.66 -> 223.6.252.231
Experimenting
Design
2. Internet Connectivity
-192.168.1.66 192.168.1.254 DNS 74 Standard query 0x0171 A
rs.lechange.cn
-192.168.1.254192.168.1.66 DNS 90 Standard query response
0x0171 A rs.lechange.cn A 114.55.152.165
-192.168.1.66 114.55.152.165 TCP 74 46241 9084
What are you sending?
ExperimentingDesign
2. Internet Connectivity
What are you sending?
192.168.1.66 -> 114.55.152.165
Why would it need to
send the local IP address?
ExperimentingDesign
2. Internet Connectivity
What are you sending?
192.168.1.66 -> 114.55.152.165
ExperimentingDesign
2. Internet Connectivity
Same story…
Summary:
Time Elapsed: 00:03:50
Packets: 3647
Total External IPs: 7
Total UDP: 3 IPs
Total TCP: 4 IPs
Experimenting
Wireshark I/O Graph
Interesting looking spike…
Experimenting
Experimenting
Trying to determine exactly what ‘jpeg’ images are being sent…
Python Snippet
Network
Capture
File
Experimenting
THIS IS BAD‘Plug and Play’?
Automatically streams
live feed to remote server.
Resources
http://iot.ieee.org/
http://standards.ieee.org/innovate/iot/
Final Points
1. IoT Security is a Safety/Privacy Issue
2.  …
3. Consider the devices you bring into
your home and to work
Questions?
Nathan Wallace, PhD, CSSA
nathanwallace@computer.org
@NathanSWallace
Thoughts?

More Related Content

PPTX
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
PPTX
IoT Security Briefing FBI 07 23-2017 final
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PDF
The 5 elements of IoT security
PPTX
IoT Security: Cases and Methods
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PDF
Internet of Things Security Patterns
PDF
IoT Security, Mirai Revisited
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
IoT Security Briefing FBI 07 23-2017 final
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
The 5 elements of IoT security
IoT Security: Cases and Methods
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Internet of Things Security Patterns
IoT Security, Mirai Revisited

What's hot (20)

PPTX
The Future of Embedded and IoT Security: Kaspersky Operating System
PDF
IoT Security and Privacy Considerations
PPTX
Privacy and security in IoT
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
IoT security fresh thinking 2017 sep 9
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
Practical IoT Security in the Enterprise
PPTX
Iot Security
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PPTX
Internet of Things Security
DOCX
Security and Privacy considerations in Internet of Things
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PPTX
Iot(security)
PPTX
Introduction to IoT Security
 
PPTX
Security issues and solutions : IoT
PDF
IOT Security
PPTX
IoT Security: Cases and Methods [CON5446]
The Future of Embedded and IoT Security: Kaspersky Operating System
IoT Security and Privacy Considerations
Privacy and security in IoT
Enabling Data Protection through PKI encryption in IoT m-Health Devices
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security fresh thinking 2017 sep 9
Ryan Wilson - ryanwilson.com - IoT Security
Practical IoT Security in the Enterprise
Iot Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
IoT Security Imperative: Stop your Fridge from Sending you Spam
Internet of Things Security
Security and Privacy considerations in Internet of Things
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Iot(security)
Introduction to IoT Security
 
Security issues and solutions : IoT
IOT Security
IoT Security: Cases and Methods [CON5446]
Ad

Viewers also liked (20)

PPTX
When Ransomware Attacks: Emergency Measures to Save Your Business
PPTX
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
PDF
Designing for IoT and Cyber-Physical System
PDF
Will Internet of Things (IoT) be secure enough?
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Integrated Cybersecurity and the Internet of Things
PDF
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
PPTX
IoT based on cyber security in defense industry and critical infrastructures
PPTX
Security in IoT
PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
PDF
Scaling IoT Security
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PDF
7 Strategies for Reducing IoT Cyber Risk
PPTX
CyberSecurity Best Practices for the IIoT
PPTX
Ransomware
PPTX
Principals of IoT security
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
When Ransomware Attacks: Emergency Measures to Save Your Business
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Designing for IoT and Cyber-Physical System
Will Internet of Things (IoT) be secure enough?
Track 5 session 1 - st dev con 2016 - need for security for iot
Integrated Cybersecurity and the Internet of Things
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
IoT based on cyber security in defense industry and critical infrastructures
Security in IoT
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Scaling IoT Security
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
7 Strategies for Reducing IoT Cyber Risk
CyberSecurity Best Practices for the IIoT
Ransomware
Principals of IoT security
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Ad

Similar to IoT Security: How Your TV and Thermostat are Attacking the Internet (20)

PDF
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
Incident Response: SIEM
PDF
Management Information Systems 12th Edition Laudon Test Bank 2024 scribd down...
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
DDoS Attack on DNS using infected IoT Devices
PDF
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
PPTX
How to use shodan more powerful
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
The Internet of Things: We've Got to Chat
PPTX
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
PDF
The evolving threat in the face of increased connectivity
PDF
How to prevent cyber terrorism taragana
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
SCADA Security: The Five Stages of Cyber Grief
PDF
Management Information Systems 12th Edition Laudon Test Bank
PPTX
D3SF17- Improving Our China Clients Performance
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PPTX
Data Junk VTS Prez - 20150925-3
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
Disruptionware-TRustedCISO103020v0.7.pptx
Incident Response: SIEM
Management Information Systems 12th Edition Laudon Test Bank 2024 scribd down...
Management Information Systems 12th Edition Laudon Test Bank
DDoS Attack on DNS using infected IoT Devices
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
How to use shodan more powerful
Management Information Systems 12th Edition Laudon Test Bank
The Internet of Things: We've Got to Chat
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
The evolving threat in the face of increased connectivity
How to prevent cyber terrorism taragana
Management Information Systems 12th Edition Laudon Test Bank
SCADA Security: The Five Stages of Cyber Grief
Management Information Systems 12th Edition Laudon Test Bank
D3SF17- Improving Our China Clients Performance
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Data Junk VTS Prez - 20150925-3

More from Nathan Wallace, PhD, PE (6)

PPTX
Automating the Point-to-Point Testing of Hundreds of Substations
PPTX
S4x19 Stage 2 Making Power System Cybersecurity Part of the Engineering Process
PDF
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
PPTX
Power System Cybersecurity: Barriers and Challenges
PDF
IEEE PES GM 2017 Cybersecurity Panel Talk
PDF
Power System Cybersecurity: Threats, Challenges, and Barriers
Automating the Point-to-Point Testing of Hundreds of Substations
S4x19 Stage 2 Making Power System Cybersecurity Part of the Engineering Process
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
Power System Cybersecurity: Barriers and Challenges
IEEE PES GM 2017 Cybersecurity Panel Talk
Power System Cybersecurity: Threats, Challenges, and Barriers

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
737-MAX_SRG.pdf student reference guides
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Current and future trends in Computer Vision.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Artificial Intelligence
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
Embodied AI: Ushering in the Next Era of Intelligent Systems
737-MAX_SRG.pdf student reference guides
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Internet of Things (IOT) - A guide to understanding
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Fundamentals of Mechanical Engineering.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT 4 Total Quality Management .pptx
Safety Seminar civil to be ensured for safe working.
Current and future trends in Computer Vision.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
III.4.1.2_The_Space_Environment.p pdffdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Artificial Intelligence
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Foundation to blockchain - A guide to Blockchain Tech

IoT Security: How Your TV and Thermostat are Attacking the Internet