@libertyunix
An Introduction to IoT Penetration Testing
www.kmco.com
An Introduction to IoT Penetration Testing @libertyunix - - PowerPoint PPT Presentation
An Introduction to IoT Penetration Testing @libertyunix www.kmco.com The Agenda n IoT Attack Surface l OWASP IoT Top 10 l -1 Ring in IoT n Wireless Topics in IoT n IoT Pen Testing Tools & Examples n Q&A 2 Getting Started in IoT
@libertyunix
www.kmco.com
2
The Agenda
n IoT Attack Surface
l OWASP IoT Top 10 l -1 Ring in IoT
n Wireless Topics in IoT n IoT Pen Testing Tools & Examples n Q&A
3
Getting Started in IoT Penetration Testing
www.kmco.com
4
OWASP IoT Top 10
5
OWASP IoT Top 10
l Hard Code Everything
l Ecosystem services are vulnerable?
l Account Lockout? l Credentials Exposed in Network Traffic
l More info in the clear & OTA
6
OWASP IoT Top 10 Cont.
l Supply Chain Risk Management
l GDPR for IoT?
l More info in the clear
7
OWASP IoT Top 10 Cont.
l Lack of Password Security Options l Security Monitoring & Logging?
l Encryption Not Used to Fetch Updates l Update File not Encrypted l Update Not Verified before Upload
l USB l SPI l JTAG
8
*Not an Official Term
9
Software Defined Radio & FCC ID
10
l Vertical distance between crests
Amplitude
11
Frequency, Cycles, and Hertz
l The frequency determines how often a signal is seen l 1 cycle per second = 1 Hertz
12
Modulation
13
Digital Modulation
Digital Modulation Amplitude Shift Keying(ASK) On Off Keying Doors, Bells, Lights, Keys Frequency Shift Keying(FSK) Gaussian FSK BLE , ZWave Phase Shift Keying(PSK) Offset Quadrature PSK(OQPSK) Zigbee
14
IoT Networks
– “the software” – Network, Security & Application layers IEEE 802.15.4 – “the hardware” – Physical & Media Access Control layers
IEEE 802.15.4 & ZigBee
PHY
868MHz / 915MHz / 2.4GHz
MAC Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bit encryption
Application API
ZigBee Alliance IEEE 802.15.4 Customer
Silicon Stack App
Source: http://www.zigbee.org/resources/documents/IWAS_presentation_Mar04_Designing_with_802154_and_zigbee.ppt16
Z-WAVE
17
Z-WAVE Packet
18
RFID
LF - 125-134 kHz HF - 13.56 MHz UHF - 433 MHz & 856-960 MHz
19
Bluetooth Cross Compatibility
20
BLE Application
21
BLE - (Adaptive) Frequency Hopping
n When in a data connection, a frequency hopping algorithm is used
to cycle through the data channels
n Access Addresses to avoid collisions
22
BLE Stack
23
GATT Example
24
IoT Pen Testing Tools & Examples
25
IoT Penetration Testing
Wireless Cloud & Mobile Physical
26
IoT Testing Roadmap Example
IoT SME
Discovery
ID Attack Surface
IoT Top
Technical Testing
Gathering
Vulnerability Ranking
Reporting
27
IoT Setup
Laptop – USE LINUX § Preferably a dual boot or dedicated machine OS/Software § Ubuntu LTS – Most common § Kali Linux – apt-get install kali-linux-all § Universal Radio Hacker § GNU Radio § Blue hydra § Bettercap § KillerBee § Binwalk § Firmadyne § APKtool
Hardware § HackRF § BladeRF § Yardstick One § Atmel RZ RAVEN § Ubertooth One § Proxmark3 Dev Kit § Arduino Nano § Every cable and adapter you can think of § PC Repair and Build Kit § Misc § A patient wife
28
Access Control Systems
29
CCTV System
n The real time streaming protocol “RTSP” uses port 554 to connect via
TCP
n Locating cameras:
l #nmap –p554 192.168.1.1/24
30
Access Panel Discovery
31
API Interaction
32
API Interaction
n There are three major fields analyzed :
l EncodedNum, Card Format, and the Access Levels
33
IoT On-Boarding
34
Fun with GNU Radio
35
Zigbee “Smart” Home
36
Sniffing BLE
37
Sniffing BLE
38
Exploring Services with Bettercap
39
Extracting Sensitive Data
40
Exploiting BLE
41
Exploiting BLE
42
Binwalk
43
Firmadyne
n An automated and scalable system for
performing emulation and dynamic analysis of Linux-based embedded firmware
n It includes the following components:
l Modified kernels (MIPS,ARM)
instrumentation of firmware execution
l Ability to emulate a hardware NVRAM
peripheral
l An extractor to extract a filesystem and
kernel
l A small console application to spawn an
additional shell for debugging
44
Firmadyne
www.kmco.com
45
Hard Coded Passwords
46
APKTool
www.kmco.com
47
Locating Keys
48
Automotive Security
49
Bypassing Rolling Codes
www.kmco.com
50
Bypassing Rolling Codes
51
Vapor Trail –Data Exfiltration Tool of Tomorrow
www.kmco.com
52