SlideShare uma empresa Scribd logo
1 de 67
Baixar para ler offline
The Internet Of Insecure Things: 
10 Most Wanted List 
! 
Paul Asadoorian 
Founder & CEO 
http://securityweekly.com
Things About Paul 
http://securityweekly.com Copyright 2014 
Work Thing 
Podcast thing 
Hacks things 
Enjoys things
Things About This 
Presentation 
• Yes, I may say “The Internet of Things” 
• This is not about “watch me hack this device” 
• While this is fun, we’ve established things are vulnerable 
• Also, the sky is not falling because someone can hack your 
toaster (yet) 
http://securityweekly.com Copyright 2014
Its More About… 
• Real attack vectors against embedded systems 
• Some examples of vulnerabilities and attacks (we have to 
have some fun!) 
• Understanding the different types of systems and 
applications 
• Most important, what do “we” do about it? 
• The manufacturers of embedded systems 
• The folks tasked with protecting networks, systems and infrastructure 
http://securityweekly.com Copyright 2014
Embedded Systems 
“An embedded system is 
a special-purpose system 
in which the computer is 
completely encapsulated 
by the device it controls.” 
! 
http://www.ece.ncsu.edu/research/cas/ecs
Consumer 
http://securityweekly.com Copyright 2014
I Think This Is Cool but… 
http://hackalizer.com/nest-thermostat-torn-analyzed/ 
http://securityweekly.com Copyright 2014
People cared when…
Why Do We Care? 
• Who cares if someone hacks my TV, fridge, lights, scale or 
treadmill or wireless router? 
• Attackers install Adware/Spyware/Ransomware to these devices 
• Ads will be displayed on your devices without your permission 
http://securityweekly.com Copyright 2014
Care more now?
Why Do We Care? Privacy. 
• I can see you watching TV 
• I know what you eat and drink, 
how often you do laundry, and 
when you turn your lights/TV on 
• I know how long you spend on the 
toilet 
• I collect all this data and use it to 
send targeted ads 
• Distribute pictures of you getting a 
snack in your underwear at 3AM 
http://securityweekly.com Copyright 2014
Things are real 
http://securityweekly.com Copyright 2014
What if this could be 
prevented? 
http://securityweekly.com Copyright 2014
By This? 
http://securityweekly.com Copyright 2014
Why We [Should] Care 
• Attackers will find ways to monetize 
• They will use any system to: 
• Mine Bitcoins (as silly as that sounds, essentially printing currency) 
• Build botnets to send SPAM and launch DDoS attacks 
http://threatpost.com/dns-based-amplification-attacks- 
key-on-home-routers/105220 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC 
! 
http://www.wired.com/2014/04/hikvision/
Industrial Control Systems 
Turck BL67 Tridium Niagara AX 
Text 
Siemens SCALANCE X-200 
http://securityweekly.com Copyright 2014 
Clorius Controls ISC 
Magnum MNS-6K 
http://www.tenable.com/plugins/index.php?view=all&family=SCADA
Why Do We Care? 
• Potentially life threatening 
• Historically operated on closed networks 
• Physical attacks are in play 
• Economics still apply, cost is a huge factor 
• Devices have to “live” for a really long time 
• It costs money to replace them 
http://securityweekly.com Copyright 2014
Corporate 
• Building Entry 
• Environmental 
• Lighting 
• Security Cameras 
• Hotel Key Cards 
• Timeclocks 
• Headsets & Phones 
• Printers & Multi-Function 
http://securityweekly.com Copyright 2014
Why Do We Care? 
• Attackers will use “things” as a jumping off point (ala 
Target) 
• Attackers will prey on weaknesses, such as POS systems 
• Physical access is not the primary concern, but still possible 
• The challenge of economics applies, low cost solutions that 
solve problems will win over security 
http://securityweekly.com Copyright 2014
Medical 
• IV Pumps / Drug infusion pumps 
• Insulin Pumps (Wearable) 
• Surgical and anesthesia devices 
• Ventilators 
• External defibrillators 
• Patient monitors 
• Laboratory and analysis equipment 
Researchers Billy Rios and Terry McCorkle of Cylance have reported a hard-coded password vulnerability 
affecting roughly 300 medical devices across approximately 40 vendors. According to their report, the 
vulnerability could be exploited to potentially change critical settings and/or modify device firmware. 
http://arstechnica.com/security/2013/06/vast-array-of-medical-devices-vulnerable-to-serious-hacks-feds-warn/ 
http://securityweekly.com Copyright 2014
Why Do We Care? 
• Life threatening for sure 
• Patient care will trump security every time 
• Connectivity and ease of use will trump security 
• Oh sorry, I can’t give you pain meds, IV pump is updating patches 
• Patient confidentiality also trumps security 
• More important to be compliant than secure 
http://securityweekly.com Copyright 2014
Already Happening 
• http://www.proofpoint.com/about-us/press-releases/ 
01162014.php 
• “More than 750,000 Phishing and SPAM emails Launched from 
"Thingbots" Including Televisions, Fridge” 
• Okay, well one fridge, on purpose? By accident? Where is the 
data? 
• http://thehackernews.com/2014/03/linux-worm-targets-internet- 
http://securityweekly.com Copyright 2014 
enabled.html 
• “A Linux worm named Linux.Darlloz, earlier used to target Internet of 
Things (IoT) devices, i.e. Home Routers, Set-top boxes, Security 
Cameras, printers and Industrial control systems; now have been 
upgraded to mine Crypto Currencies like Bitcoin.”
More Already Happening 
• https://blog.kaspersky.com/gaming-console-hacks/ 
• “I also have a bad feeling that the time for gaming malware is now, and I 
am not totally sure what it will take to protect ourselves.” 
• http://www.wired.com/2014/04/hikvision/ 
• “Hackers Turn Security Camera DVRs Into Worst Bitcoin Miners Ever” 
• “The low-powered ARM chip is one of the worst possible processors 
you could pick for the crypto-heavy calculations that make up bitcoin 
mining.” 
• “The malicious software seems to spread using the default usernames 
and passwords for the Hikvision devices” 
http://securityweekly.com Copyright 2014
If I Had To Pick One 
Example…. 
Of a really insecure embedded system it would be…
“Inside Joel’s Backdoor” 
D-LINK DIR-100
Background 
• I want to show how an attacker would exploit vulnerabilities on 
embedded systems for profit 
• I found some excellent research published by Craig Heffner, author 
of binwalk and one of the most talented embedded device security 
researchers on the planet 
- Hak.5 Interview with Craig Heffner on the issues: http:// 
hak5.org/episodes/hak5-1513 
http://wiki.securityweekly.com/wiki/index.php/Episode320#Interview:_Craig_Heffner 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Background 
• The other rock star is Zach Cutlip, both work for Tactical 
Network Solutions and deserve A LOT of praise for their 
research 
• Joel’s Backdoor is one of the most interesting embedded 
device vulnerabilities I’ve seen Text 
in some time 
• Combined with several other flaws on the D-Link DIR-100 
http://wiki.securityweekly.com/wiki/index.php/Episode342#Tech_Segment:_Zach_Cutlip 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Exemplify Problem Areas 
1. Backdoors inside of firmware 
2. Default credentials 
3. Functions prone to overflow conditions 
4. Secure web management interfaces 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
BTW, Many of these vulns are 
old… 
Not as old as Jack…
Joel’s Backdoor 
• October 2013 Craig Heffner released details on a backdoor 
affecting D-Link routers 
• Reverse engineering the authentication process, Craig finds a 
special compare 
• Turns out if you set your User-Agent to 
“xmlset_roodkcableoj28840ybtide” you can access web 
management 
• No password required! 
edit by 04882 joel backdoor 
• Who is Joel anyway? 
• http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Why Joel Did This? 
The ever neighborly Travis Goodspeed pointed out that this backdoor is used by 
the /bin/xmlsetc binary in the D-Link firmware. After some grepping, I found several 
binaries that appear to use xmlsetc to automatically re-configure the device’s 
settings (example: dynamic DNS). My guess is that the developers realized that 
some programs/services needed to be able to change the device’s settings 
automatically; realizing that the web server already had all the code to change 
these settings, they decided to just send requests to the web server whenever they 
needed to change something. The only problem was that the web server required a 
username and password, which the end user could change. Then, in a eureka 
moment, Joel jumped up and said, “Don’t worry, for I have a cunning plan!”. 
http://pastebin.com/aMz8eYGa 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Russians Found It First 
• Looking to root an ISPs router 
• They found the string, and tried it as the TELNET login 
• They could have found it and never posted it 
• Or they never figured out its the User-Agent string 
January 24, 2010 
http://forum.codenet.ru/q58748/%D0%BF%D0%B5%D1%80%D0%B5%D0%B1%D0%BE%D1%80+%D0%BB%D0%BE%D0%B3%D0%B8%D0%BD%D0%BE%D0%B2+-+ 
%D0%B4%D0%B0%D0%B9%D1%82%D0%B5+%D1%81%D0%BE%D0%B2%D0%B5%D1%82 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Exploit Is Simple 
DIR-100: 
! 
wget -U ‘xmlset_roodkcableoj28840ybtide’ http:// 
192.168.1.85/Status/Device_Info.shtml 
TM-G5240 (Firmware Version:v4.0.0b28) 
! 
wget -U 'xmlset_roodkcableoj28840ybtide' http:// 
192.168.1.87/Status/st_devic.htm 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
But, No One Exposes Web 
Management Interfaces To 
The Internet? 
Because no presentation is complete without a Shodan 
screenshot
Canadians & Chinese 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC 
thttpd-alphanetworks is a 
fork of thttpd by a spin-off of 
Dlinks
Remote Exploitation Via 
Browser 
• But wait, what if you could get someone to click on a link? 
• Could you send authentication + exploit to the router? 
• You need a few things to happen: 
• The victim must load a web page with your exploit code 
• Your exploit code must be able to modify the User-Agent 
• Your have to know the IP address (192.168.0.1) of the device 
• Your must run a command through the web interface to do something evil 
• Your must bypass the Same Origin policy 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
DIR-100 Buffer Overflow 
• But wait, there’s more! Craig also released a buffer 
overflow vulnerability and exploit code: 
• http://pastebin.com/vbiG42VD 
• Limited to 200 bytes of shellcode 
• Requires admin 
# strings webs | egrep '(sprintf|strcpy)' 
strcpy 
sprintf 
Benefit: Now we can upload and execute code on the device, allowing 
us to execute commands and/or install software. 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Multi-Stage Dropper MIPS 
Shellcode 
• Zach Cutlip is awesome, and his shellcode is damn sexy: 
• https://github.com/tacnetsol/exploit-tools/tree/master/shellcode/mips/ 
trojan-dropper 
• Or callback in 184 bytes: 
• https://github.com/tacnetsol/exploit-tools/blob/master/shellcode/mips/ 
connect-back/callback_payload.py 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
It’s not dead yet... 
But wait, there’s even more!
Dir-100 XSS & So Much More 
• December 2013 researcher Felix Richter exposes several more 
vulnerabilities affecting DIR-100 routers 
• http://packetstormsecurity.com/files/125041/D-Link-DIR-100-CSRF-XSS-Disclosure- 
Authentication.html 
• Retrieve the Administrator password without authentication leading to 
authentication bypass [CWE-255] 
• Retrieve sensitive configuration parameters like the pppoe username and 
password without authentication [CWE-200] 
• Execute privileged Commands without authentication through a race condition 
leading to weak authentication enforcement [CWE-287] 
• Sending formatted request to a victim which then will execute arbitrary commands 
on the device (CSRF) [CWE-352] 
• Store arbitrary javascript code which will be executed when a victim accesses the 
administrator interface [CWE-79] 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
I See Your Privates 
root@embeddedcourse:/home/firmware/TM-G5240/squashfs-root/etc# cat stunnel.pem 
-----BEGIN CERTIFICATE----- 
MIID+jCCAuKgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBrjELMAkGA1UEBhMCVFcx 
DzANBgNVBAgTBlRhaXdhbjEPMA0GA1UEBxMGVGFpcGVpMRwwGgYDVQQKExNBbHBo 
YSBOZXR3b3JrcyBJbmMuMQwwCgYDVQQLEwNGRDMxJDAiBgNVBAMTG0FscGhhIE5l 
dHdvcmtzIERlbW8gUm9vdCBDQTErMCkGCSqGSIb3DQEJARYcU3RhbmxleV9MaUBh 
bHBoYW5ldHdvcmtzLmNvbTAeFw0wNTA1MTMwNzQxMjVaFw0xNTA1MTEwNzQxMjVa 
<snip> 
WY3y9dVFwtZdfOgYcCSqnn1ehDxHN8XsjOylZ53SuapRmPTjuOQR4k+P18XdxZuY 
RlBSV1vTRWsLncFEQH326MQNyxlQG5om9tZ/+k+kuVt3iImdwBp+cveMaRcw3wHz 
qDfxLwCL9K4icRhPeYk= 
-----END CERTIFICATE----- 
-----BEGIN RSA PRIVATE KEY----- 
MIIEowIBAAKCAQEAtkENCho2fHuiaVHofYl87EGYleFFlw9dv9dDeF/2HX9DEQo4 
+ctCESsU8uvSIm+iTB2bTN1R1qLGdwXjFWFjveLOkP9UMv33kD/eAvA3WIjK99PH 
Rz+Be9bLqtZRehNMXAQV0HFTiLZD3mzo/2gUYtHDUXFAU22HcM/iSVQUpPNytL1/ 
wE3xtBExLgB51d0CHKL6NXoM0JXEdmpUAhee3QlyGGZU8XpDDizThBnD/QoI2RAN 
iBcVm/Frcls2dzZ8Qsg1ipJ1OCdZJ4KmdfQhrCTTNCeZ8xyzvyUBrBUkJ+sb6O2f 
J8OoZ2OIRVIjJ4GeAu5T4vFteLh3XRTVkT8JLQIDAQABAoIBAEI5pQlUuRPGwR9Q 
GhDz0qbutwlPUEAx3zkEeYnWJNJXGgGpG0b5aspeQ0B6HGNS+UB7SaFGkqRRhZhe 
<snip> 
vSC/wQKBgDnnrkbsCg5HsnDFHQu9zSlNrMNwtc3H9fD5TMgFOj7nJBJTLGh/JbXM 
GaXBOxb1BbVVTmNDvYEMpS+7QPIsA1PVZE3ixYDCI9EuGNSCCd6wwsLkf2mcUH3G 
mDUZ/Mdnc5uQWU+NWA0LpnVPt546RMk9l5soHc7W5M8MtmnCwMDD 
-----END RSA PRIVATE KEY-----
Let’s Recap 
• For your enjoyment, DIR-100 has: 
• At least 2 different authentication bypass vulnerabilities 
• Information disclosure, leading to PPPOE passwords 
• A CSRF vulnerability 
• A remote buffer overflow 
• A stored XSS vulnerability 
• Select models use static keys 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
0wning D-Link? 
• http://suporte.dlink.com.br/suporte/emuladores/DIR/ 
DIR_100/Status/st_device.htm 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
These Conditions Can’t 
Exist On Other Devices? 
• Medical: http://arstechnica.com/security/2013/06/vast-array-of-medical- 
devices-vulnerable-to-serious-hacks-feds-warn/ 
• SCADA: http://seclists.org/fulldisclosure/2012/Apr/277 
• Industrial Automation: http://www.ioactive.com/news-events/ 
ioactive_discovers_backdoor_vulnerabilities_in_turck_industrial_a 
utomation_devices.html 
• Building Automation: https://www.youtube.com/watch? 
v=c4LMrKEO_t0 (BACNet) 
• Home Automation: http://www.ioactive.com/news-events/ 
IOActive_advisory_belkinwemo_2014.html 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Even More Attacks 
• HD Moore found several flaws in VxWorks, scanned 3.1 
billion IP addresses and found 250,000 systems exposed 
to the Internet 
- http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html 
• Craig Heffner discovered a DNS rebinding attack on 
several routers allowing attackers to gain control of 
administrative interfaces 
- http://code.google.com/p/rebind/ 
http://securityweekly.com Copyright 2014
Even More Attacks (2) 
• Ki-Chan Ahn and Dong-Joo Ha created malware for 
Nintendo Wii and DS systems 
- http://games.venturebeat.com/2010/07/31/live-demos-of-hacking-the-nintendo- 
ds-and-the-wii-to-spread-malware/ 
• Barnaby Jack remotely attacked two different ATMs and 
“made the money come out” (without a card+pin #) 
- http://www.youtube.com/watch?v=qwMuMSPW3bU 
http://securityweekly.com Copyright 2014
But Why? 
Why are embedded systems left out in the cold when it comes to 
security?
Why? 
• Embedded systems, across all major categories are 
designed with two things in mind: 
• Usability - Does the system work as intended for the user? (e.g. my TV 
turns on, allows me to change the channel, displays an image) 
• Reliability - Does the system catch fire, break, fall over, or cease 
functioning under certain conditions? (e.g. does my TV catch fire if left on 
or melt due to temperature being too high?) 
! 
• What are they not designing for? 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
Why? 
• What happens if an external user takes control of the 
system and makes it to “bad things”? 
• Think of it like a hammer: 
• I make sure it can pound stuff (usability) 
• I make sure the head doesn’t come flying off and kill someone (reliability) 
• I don’t design it so someone doesn’t try to use it to smash someone’s face 
Credit: 
http://wiki.securityweekly.com/wiki/ 
index.php/ 
Episode_386#Interview:_Mike_Murray 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
These are no ordinary 
hammers 
• The hammers, embedded systems, we speak of have 
connectivity! 
• Ethernet 
• Wifi 
• Bluetooth 
• ZigBee 
• RFID 
• NFC 
http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
What Do We Do About It? 
10 Most Wanted List: A Guide For Embedded Device 
Manufacturer and Software Developers
10 Most Wanted List 
1. Backdoors inside of firmware 
2. Default credentials 
3. Insecure Remote management (Defaults & Clear-Text Transmissions) 
4. Open-source software and drivers, NOT binary blobs 
5. Functions prone to overflow conditions 
6. Firmware and configuration encryption 
7. Easy-to-use firmware updates (auto-updates) 
8. Secure web management interfaces 
9. Maintain a CIRT and provide a program for security researchers 
10. Implement Protocols Security / Implement Secure Protocols 
http://securityweekly.com Copyright 2014
1. Firmware Backdoors 
• A “secret” account (or access) created by the vendor that 
allows remote management 
• Excuse is this is done for support reasons (password 
resets) 
• The problem is: its not so secret 
http://securityweekly.com Copyright 2014
Backdoor password was... 
Derived from the MAC address....
2. Default Credentials 
• A known set of credentials used out-of-the-box 
• Typically found via Google or in documentation 
• The problems: Anyone can discover this value and users/ 
administrators don’t change it 
• Also: Firmware updates sometimes reset it to the default 
value 
http://securityweekly.com Copyright 2014
3. Insecure Remote 
Management 
• HTTP & TELNET - Its 2014, why are we still using these 
protocols to manage systems? 
• HTTPS - Yes, there is a cost for a certificate. And yes, 
sometimes vendors will use the same one for every device 
• SSH - Same thing here, but easier to enable by default 
• Oh, and weak passwords 
http://securityweekly.com Copyright 2014
4. Open-Source drivers 
• Interoperability is nice, but also begs the security question 
• How do I keep my software and hardware up-to-date if 
you don’t provide me with a new driver! 
• Open-source drivers allow for more eyes, and typically are 
patched more quickly 
http://securityweekly.com Copyright 2014
5. Functions prone to 
overflow 
• Wait, we know strcpy() is bad, right? 
• Why do we still use it? 
• And yes, programmers still use it 
• In fact, if you take it out, they will just put it back 
! 
• https://community.rapid7.com/community/metasploit/blog/2013/11/06/ 
supermicro-ipmi-firmware-vulnerabilities 
http://securityweekly.com Copyright 2014
Funny Thing About 
Encryption 
http://securityweekly.com Copyright 2014
6. Firmware Encryption 
• Signing firmware updates makes it harder to backdoor 
existing firmware 
• Encrypting firmware makes it tougher to reverse engineer 
(though don’t let that replace real security) 
• Also, XOR is NOT encryption 
! 
• http://www.darkreading.com/vulnerabilities---threats/hacking-firmware-and- 
detecting-backdoors/d/d-id/1139859? 
http://securityweekly.com Copyright 2014
7. User Friendly Firmware 
Updates 
• Take a page right from Microsoft’s playbook (I can’t believe 
I just wrote that, but...) 
• Step back, most are unaware devices need to be updated 
for security, amazed that it actually works 
• Even the term “update firmware” is too geeky, we need to 
change this 
• Smartphones are a great example 
http://securityweekly.com Copyright 2014
8. Secure Web Frameworks 
• The code behind the web management interface is typically 
poorly implemented 
• Java, Ruby, Python, .NET - all too “heavy” to implement on 
small systems 
• Developers typically write their own, similar results to 
“Well, I’ll just implement my own encryption algorithm” 
http://securityweekly.com Copyright 2014
9. Maintain a CIRT 
• Look, this FREE help! 
• D-Link has fixed the problems we covered earlier 
• Some vulnerabilities never get fixed 
• Researchers get frustrated and just post the exploits to 
pastebin 
• Prezi got hacked, paid the researcher money, and wrote a 
nice blog post about it and linked to the researcher’s 
presentation (not in Prezi) 
• It pays to work and collaborate with security researchers 
http://securityweekly.com Copyright 2014
10. Secure Protocols 
• UPnP, IPMI, HNLP, DLNA are common protocols on 
consumer devices 
• Modbus is popular on SCADA devices 
• The problem is they offer great functionality 
• But security is often left out entirely 
• IPMI and HNLP have had huge problems, leading to major 
issues and even the “Linksys Router Worm” 
• The protocols desperately need security... 
http://securityweekly.com Copyright 2014
http://www.blackhillsinfosec.com 
For Slides Join Our Mailing List: http://securityweekly.com/insider 
! 
Podcasts/Blogs/Videos: http://securityweekly.com 
! 
Contact Me: paul@securityweekly.com

Mais conteúdo relacionado

Mais procurados

Getting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionGetting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionJoe McCray
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppAppsecco
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityPriyanka Aash
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan NovikovOWASP Russia
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...LINE Corporation
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433Terry Gilsenan
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
Software Attacks on Hardware Wallets
Software Attacks on Hardware WalletsSoftware Attacks on Hardware Wallets
Software Attacks on Hardware WalletsRiscure
 
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014
50 Shades of RED: Stories from the “Playroom”  from CONFidence 201450 Shades of RED: Stories from the “Playroom”  from CONFidence 2014
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014Chris Nickerson
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursDavid Busby, CISSP
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructurePositive Hack Days
 

Mais procurados (20)

Getting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionGetting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking Competition
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber Security
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Software Attacks on Hardware Wallets
Software Attacks on Hardware WalletsSoftware Attacks on Hardware Wallets
Software Attacks on Hardware Wallets
 
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014
50 Shades of RED: Stories from the “Playroom”  from CONFidence 201450 Shades of RED: Stories from the “Playroom”  from CONFidence 2014
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yours
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Fingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare InfrastructureFingerprinting and Attacking a Healthcare Infrastructure
Fingerprinting and Attacking a Healthcare Infrastructure
 

Destaque

How To Do A Podcast - Bsides RI 2013
How To Do A Podcast - Bsides RI 2013How To Do A Podcast - Bsides RI 2013
How To Do A Podcast - Bsides RI 2013Security Weekly
 
unidad estudio de la web
unidad  estudio de la webunidad  estudio de la web
unidad estudio de la webJeffer Ramos
 
Investigacion2 hoja de calculo
Investigacion2 hoja de calculoInvestigacion2 hoja de calculo
Investigacion2 hoja de calculoJeffer Ramos
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devicesYashin Mehaboobe
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Qatar Presentation
Qatar PresentationQatar Presentation
Qatar Presentationguestef71b3
 
Communiqué de presse EntrepreneurSHIP Festival 2016
Communiqué de presse EntrepreneurSHIP Festival 2016Communiqué de presse EntrepreneurSHIP Festival 2016
Communiqué de presse EntrepreneurSHIP Festival 2016Jean-Baptiste Say Institute
 
Intersystems Cache - Как не загреметь в долговую яму
Intersystems Cache - Как не загреметь в долговую ямуIntersystems Cache - Как не загреметь в долговую яму
Intersystems Cache - Как не загреметь в долговую ямуDenis Pavlov
 
tik bab 1
tik bab 1tik bab 1
tik bab 1Rizatun
 

Destaque (18)

How To Do A Podcast - Bsides RI 2013
How To Do A Podcast - Bsides RI 2013How To Do A Podcast - Bsides RI 2013
How To Do A Podcast - Bsides RI 2013
 
Educational justice
Educational justiceEducational justice
Educational justice
 
Impacto web 3.0
Impacto web 3.0Impacto web 3.0
Impacto web 3.0
 
unidad estudio de la web
unidad  estudio de la webunidad  estudio de la web
unidad estudio de la web
 
PPP for Infrastructure Projects
PPP for Infrastructure ProjectsPPP for Infrastructure Projects
PPP for Infrastructure Projects
 
Investigacion2 hoja de calculo
Investigacion2 hoja de calculoInvestigacion2 hoja de calculo
Investigacion2 hoja de calculo
 
Glutamato
Glutamato Glutamato
Glutamato
 
FINAL PROJECT
FINAL PROJECTFINAL PROJECT
FINAL PROJECT
 
PACE-IT: Securing the Workstation
PACE-IT: Securing the WorkstationPACE-IT: Securing the Workstation
PACE-IT: Securing the Workstation
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devices
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Qatar Presentation
Qatar PresentationQatar Presentation
Qatar Presentation
 
Communiqué de presse EntrepreneurSHIP Festival 2016
Communiqué de presse EntrepreneurSHIP Festival 2016Communiqué de presse EntrepreneurSHIP Festival 2016
Communiqué de presse EntrepreneurSHIP Festival 2016
 
Il quaderno
Il quadernoIl quaderno
Il quaderno
 
Intersystems Cache - Как не загреметь в долговую яму
Intersystems Cache - Как не загреметь в долговую ямуIntersystems Cache - Как не загреметь в долговую яму
Intersystems Cache - Как не загреметь в долговую яму
 
C V
C VC V
C V
 
tik bab 1
tik bab 1tik bab 1
tik bab 1
 

Semelhante a The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014

Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherVerein FM Konferenz
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...APNIC
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsn|u - The Open Security Community
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure WebsiteImperva Incapsula
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 

Semelhante a The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014 (20)

Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 

Último

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014

  • 1. The Internet Of Insecure Things: 10 Most Wanted List ! Paul Asadoorian Founder & CEO http://securityweekly.com
  • 2. Things About Paul http://securityweekly.com Copyright 2014 Work Thing Podcast thing Hacks things Enjoys things
  • 3. Things About This Presentation • Yes, I may say “The Internet of Things” • This is not about “watch me hack this device” • While this is fun, we’ve established things are vulnerable • Also, the sky is not falling because someone can hack your toaster (yet) http://securityweekly.com Copyright 2014
  • 4. Its More About… • Real attack vectors against embedded systems • Some examples of vulnerabilities and attacks (we have to have some fun!) • Understanding the different types of systems and applications • Most important, what do “we” do about it? • The manufacturers of embedded systems • The folks tasked with protecting networks, systems and infrastructure http://securityweekly.com Copyright 2014
  • 5. Embedded Systems “An embedded system is a special-purpose system in which the computer is completely encapsulated by the device it controls.” ! http://www.ece.ncsu.edu/research/cas/ecs
  • 7. I Think This Is Cool but… http://hackalizer.com/nest-thermostat-torn-analyzed/ http://securityweekly.com Copyright 2014
  • 9. Why Do We Care? • Who cares if someone hacks my TV, fridge, lights, scale or treadmill or wireless router? • Attackers install Adware/Spyware/Ransomware to these devices • Ads will be displayed on your devices without your permission http://securityweekly.com Copyright 2014
  • 11. Why Do We Care? Privacy. • I can see you watching TV • I know what you eat and drink, how often you do laundry, and when you turn your lights/TV on • I know how long you spend on the toilet • I collect all this data and use it to send targeted ads • Distribute pictures of you getting a snack in your underwear at 3AM http://securityweekly.com Copyright 2014
  • 12. Things are real http://securityweekly.com Copyright 2014
  • 13. What if this could be prevented? http://securityweekly.com Copyright 2014
  • 15. Why We [Should] Care • Attackers will find ways to monetize • They will use any system to: • Mine Bitcoins (as silly as that sounds, essentially printing currency) • Build botnets to send SPAM and launch DDoS attacks http://threatpost.com/dns-based-amplification-attacks- key-on-home-routers/105220 http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC ! http://www.wired.com/2014/04/hikvision/
  • 16. Industrial Control Systems Turck BL67 Tridium Niagara AX Text Siemens SCALANCE X-200 http://securityweekly.com Copyright 2014 Clorius Controls ISC Magnum MNS-6K http://www.tenable.com/plugins/index.php?view=all&family=SCADA
  • 17. Why Do We Care? • Potentially life threatening • Historically operated on closed networks • Physical attacks are in play • Economics still apply, cost is a huge factor • Devices have to “live” for a really long time • It costs money to replace them http://securityweekly.com Copyright 2014
  • 18. Corporate • Building Entry • Environmental • Lighting • Security Cameras • Hotel Key Cards • Timeclocks • Headsets & Phones • Printers & Multi-Function http://securityweekly.com Copyright 2014
  • 19. Why Do We Care? • Attackers will use “things” as a jumping off point (ala Target) • Attackers will prey on weaknesses, such as POS systems • Physical access is not the primary concern, but still possible • The challenge of economics applies, low cost solutions that solve problems will win over security http://securityweekly.com Copyright 2014
  • 20. Medical • IV Pumps / Drug infusion pumps • Insulin Pumps (Wearable) • Surgical and anesthesia devices • Ventilators • External defibrillators • Patient monitors • Laboratory and analysis equipment Researchers Billy Rios and Terry McCorkle of Cylance have reported a hard-coded password vulnerability affecting roughly 300 medical devices across approximately 40 vendors. According to their report, the vulnerability could be exploited to potentially change critical settings and/or modify device firmware. http://arstechnica.com/security/2013/06/vast-array-of-medical-devices-vulnerable-to-serious-hacks-feds-warn/ http://securityweekly.com Copyright 2014
  • 21. Why Do We Care? • Life threatening for sure • Patient care will trump security every time • Connectivity and ease of use will trump security • Oh sorry, I can’t give you pain meds, IV pump is updating patches • Patient confidentiality also trumps security • More important to be compliant than secure http://securityweekly.com Copyright 2014
  • 22. Already Happening • http://www.proofpoint.com/about-us/press-releases/ 01162014.php • “More than 750,000 Phishing and SPAM emails Launched from "Thingbots" Including Televisions, Fridge” • Okay, well one fridge, on purpose? By accident? Where is the data? • http://thehackernews.com/2014/03/linux-worm-targets-internet- http://securityweekly.com Copyright 2014 enabled.html • “A Linux worm named Linux.Darlloz, earlier used to target Internet of Things (IoT) devices, i.e. Home Routers, Set-top boxes, Security Cameras, printers and Industrial control systems; now have been upgraded to mine Crypto Currencies like Bitcoin.”
  • 23. More Already Happening • https://blog.kaspersky.com/gaming-console-hacks/ • “I also have a bad feeling that the time for gaming malware is now, and I am not totally sure what it will take to protect ourselves.” • http://www.wired.com/2014/04/hikvision/ • “Hackers Turn Security Camera DVRs Into Worst Bitcoin Miners Ever” • “The low-powered ARM chip is one of the worst possible processors you could pick for the crypto-heavy calculations that make up bitcoin mining.” • “The malicious software seems to spread using the default usernames and passwords for the Hikvision devices” http://securityweekly.com Copyright 2014
  • 24. If I Had To Pick One Example…. Of a really insecure embedded system it would be…
  • 26. Background • I want to show how an attacker would exploit vulnerabilities on embedded systems for profit • I found some excellent research published by Craig Heffner, author of binwalk and one of the most talented embedded device security researchers on the planet - Hak.5 Interview with Craig Heffner on the issues: http:// hak5.org/episodes/hak5-1513 http://wiki.securityweekly.com/wiki/index.php/Episode320#Interview:_Craig_Heffner http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 27. Background • The other rock star is Zach Cutlip, both work for Tactical Network Solutions and deserve A LOT of praise for their research • Joel’s Backdoor is one of the most interesting embedded device vulnerabilities I’ve seen Text in some time • Combined with several other flaws on the D-Link DIR-100 http://wiki.securityweekly.com/wiki/index.php/Episode342#Tech_Segment:_Zach_Cutlip http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 28. Exemplify Problem Areas 1. Backdoors inside of firmware 2. Default credentials 3. Functions prone to overflow conditions 4. Secure web management interfaces http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 29. BTW, Many of these vulns are old… Not as old as Jack…
  • 30. Joel’s Backdoor • October 2013 Craig Heffner released details on a backdoor affecting D-Link routers • Reverse engineering the authentication process, Craig finds a special compare • Turns out if you set your User-Agent to “xmlset_roodkcableoj28840ybtide” you can access web management • No password required! edit by 04882 joel backdoor • Who is Joel anyway? • http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 31. Why Joel Did This? The ever neighborly Travis Goodspeed pointed out that this backdoor is used by the /bin/xmlsetc binary in the D-Link firmware. After some grepping, I found several binaries that appear to use xmlsetc to automatically re-configure the device’s settings (example: dynamic DNS). My guess is that the developers realized that some programs/services needed to be able to change the device’s settings automatically; realizing that the web server already had all the code to change these settings, they decided to just send requests to the web server whenever they needed to change something. The only problem was that the web server required a username and password, which the end user could change. Then, in a eureka moment, Joel jumped up and said, “Don’t worry, for I have a cunning plan!”. http://pastebin.com/aMz8eYGa http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 32. Russians Found It First • Looking to root an ISPs router • They found the string, and tried it as the TELNET login • They could have found it and never posted it • Or they never figured out its the User-Agent string January 24, 2010 http://forum.codenet.ru/q58748/%D0%BF%D0%B5%D1%80%D0%B5%D0%B1%D0%BE%D1%80+%D0%BB%D0%BE%D0%B3%D0%B8%D0%BD%D0%BE%D0%B2+-+ %D0%B4%D0%B0%D0%B9%D1%82%D0%B5+%D1%81%D0%BE%D0%B2%D0%B5%D1%82 http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 33. Exploit Is Simple DIR-100: ! wget -U ‘xmlset_roodkcableoj28840ybtide’ http:// 192.168.1.85/Status/Device_Info.shtml TM-G5240 (Firmware Version:v4.0.0b28) ! wget -U 'xmlset_roodkcableoj28840ybtide' http:// 192.168.1.87/Status/st_devic.htm http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 34. But, No One Exposes Web Management Interfaces To The Internet? Because no presentation is complete without a Shodan screenshot
  • 35. Canadians & Chinese http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC thttpd-alphanetworks is a fork of thttpd by a spin-off of Dlinks
  • 36. Remote Exploitation Via Browser • But wait, what if you could get someone to click on a link? • Could you send authentication + exploit to the router? • You need a few things to happen: • The victim must load a web page with your exploit code • Your exploit code must be able to modify the User-Agent • Your have to know the IP address (192.168.0.1) of the device • Your must run a command through the web interface to do something evil • Your must bypass the Same Origin policy http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 37. DIR-100 Buffer Overflow • But wait, there’s more! Craig also released a buffer overflow vulnerability and exploit code: • http://pastebin.com/vbiG42VD • Limited to 200 bytes of shellcode • Requires admin # strings webs | egrep '(sprintf|strcpy)' strcpy sprintf Benefit: Now we can upload and execute code on the device, allowing us to execute commands and/or install software. http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 38. Multi-Stage Dropper MIPS Shellcode • Zach Cutlip is awesome, and his shellcode is damn sexy: • https://github.com/tacnetsol/exploit-tools/tree/master/shellcode/mips/ trojan-dropper • Or callback in 184 bytes: • https://github.com/tacnetsol/exploit-tools/blob/master/shellcode/mips/ connect-back/callback_payload.py http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 39. It’s not dead yet... But wait, there’s even more!
  • 40. Dir-100 XSS & So Much More • December 2013 researcher Felix Richter exposes several more vulnerabilities affecting DIR-100 routers • http://packetstormsecurity.com/files/125041/D-Link-DIR-100-CSRF-XSS-Disclosure- Authentication.html • Retrieve the Administrator password without authentication leading to authentication bypass [CWE-255] • Retrieve sensitive configuration parameters like the pppoe username and password without authentication [CWE-200] • Execute privileged Commands without authentication through a race condition leading to weak authentication enforcement [CWE-287] • Sending formatted request to a victim which then will execute arbitrary commands on the device (CSRF) [CWE-352] • Store arbitrary javascript code which will be executed when a victim accesses the administrator interface [CWE-79] http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 41. I See Your Privates root@embeddedcourse:/home/firmware/TM-G5240/squashfs-root/etc# cat stunnel.pem -----BEGIN CERTIFICATE----- MIID+jCCAuKgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBrjELMAkGA1UEBhMCVFcx DzANBgNVBAgTBlRhaXdhbjEPMA0GA1UEBxMGVGFpcGVpMRwwGgYDVQQKExNBbHBo YSBOZXR3b3JrcyBJbmMuMQwwCgYDVQQLEwNGRDMxJDAiBgNVBAMTG0FscGhhIE5l dHdvcmtzIERlbW8gUm9vdCBDQTErMCkGCSqGSIb3DQEJARYcU3RhbmxleV9MaUBh bHBoYW5ldHdvcmtzLmNvbTAeFw0wNTA1MTMwNzQxMjVaFw0xNTA1MTEwNzQxMjVa <snip> WY3y9dVFwtZdfOgYcCSqnn1ehDxHN8XsjOylZ53SuapRmPTjuOQR4k+P18XdxZuY RlBSV1vTRWsLncFEQH326MQNyxlQG5om9tZ/+k+kuVt3iImdwBp+cveMaRcw3wHz qDfxLwCL9K4icRhPeYk= -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAtkENCho2fHuiaVHofYl87EGYleFFlw9dv9dDeF/2HX9DEQo4 +ctCESsU8uvSIm+iTB2bTN1R1qLGdwXjFWFjveLOkP9UMv33kD/eAvA3WIjK99PH Rz+Be9bLqtZRehNMXAQV0HFTiLZD3mzo/2gUYtHDUXFAU22HcM/iSVQUpPNytL1/ wE3xtBExLgB51d0CHKL6NXoM0JXEdmpUAhee3QlyGGZU8XpDDizThBnD/QoI2RAN iBcVm/Frcls2dzZ8Qsg1ipJ1OCdZJ4KmdfQhrCTTNCeZ8xyzvyUBrBUkJ+sb6O2f J8OoZ2OIRVIjJ4GeAu5T4vFteLh3XRTVkT8JLQIDAQABAoIBAEI5pQlUuRPGwR9Q GhDz0qbutwlPUEAx3zkEeYnWJNJXGgGpG0b5aspeQ0B6HGNS+UB7SaFGkqRRhZhe <snip> vSC/wQKBgDnnrkbsCg5HsnDFHQu9zSlNrMNwtc3H9fD5TMgFOj7nJBJTLGh/JbXM GaXBOxb1BbVVTmNDvYEMpS+7QPIsA1PVZE3ixYDCI9EuGNSCCd6wwsLkf2mcUH3G mDUZ/Mdnc5uQWU+NWA0LpnVPt546RMk9l5soHc7W5M8MtmnCwMDD -----END RSA PRIVATE KEY-----
  • 42. Let’s Recap • For your enjoyment, DIR-100 has: • At least 2 different authentication bypass vulnerabilities • Information disclosure, leading to PPPOE passwords • A CSRF vulnerability • A remote buffer overflow • A stored XSS vulnerability • Select models use static keys http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 43. 0wning D-Link? • http://suporte.dlink.com.br/suporte/emuladores/DIR/ DIR_100/Status/st_device.htm http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 44. These Conditions Can’t Exist On Other Devices? • Medical: http://arstechnica.com/security/2013/06/vast-array-of-medical- devices-vulnerable-to-serious-hacks-feds-warn/ • SCADA: http://seclists.org/fulldisclosure/2012/Apr/277 • Industrial Automation: http://www.ioactive.com/news-events/ ioactive_discovers_backdoor_vulnerabilities_in_turck_industrial_a utomation_devices.html • Building Automation: https://www.youtube.com/watch? v=c4LMrKEO_t0 (BACNet) • Home Automation: http://www.ioactive.com/news-events/ IOActive_advisory_belkinwemo_2014.html http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 45. Even More Attacks • HD Moore found several flaws in VxWorks, scanned 3.1 billion IP addresses and found 250,000 systems exposed to the Internet - http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html • Craig Heffner discovered a DNS rebinding attack on several routers allowing attackers to gain control of administrative interfaces - http://code.google.com/p/rebind/ http://securityweekly.com Copyright 2014
  • 46. Even More Attacks (2) • Ki-Chan Ahn and Dong-Joo Ha created malware for Nintendo Wii and DS systems - http://games.venturebeat.com/2010/07/31/live-demos-of-hacking-the-nintendo- ds-and-the-wii-to-spread-malware/ • Barnaby Jack remotely attacked two different ATMs and “made the money come out” (without a card+pin #) - http://www.youtube.com/watch?v=qwMuMSPW3bU http://securityweekly.com Copyright 2014
  • 47. But Why? Why are embedded systems left out in the cold when it comes to security?
  • 48. Why? • Embedded systems, across all major categories are designed with two things in mind: • Usability - Does the system work as intended for the user? (e.g. my TV turns on, allows me to change the channel, displays an image) • Reliability - Does the system catch fire, break, fall over, or cease functioning under certain conditions? (e.g. does my TV catch fire if left on or melt due to temperature being too high?) ! • What are they not designing for? http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 49. Why? • What happens if an external user takes control of the system and makes it to “bad things”? • Think of it like a hammer: • I make sure it can pound stuff (usability) • I make sure the head doesn’t come flying off and kill someone (reliability) • I don’t design it so someone doesn’t try to use it to smash someone’s face Credit: http://wiki.securityweekly.com/wiki/ index.php/ Episode_386#Interview:_Mike_Murray http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 50. These are no ordinary hammers • The hammers, embedded systems, we speak of have connectivity! • Ethernet • Wifi • Bluetooth • ZigBee • RFID • NFC http://securityweekly.com Copyright © 2014 by Defensive Intuition, LLC
  • 51. What Do We Do About It? 10 Most Wanted List: A Guide For Embedded Device Manufacturer and Software Developers
  • 52. 10 Most Wanted List 1. Backdoors inside of firmware 2. Default credentials 3. Insecure Remote management (Defaults & Clear-Text Transmissions) 4. Open-source software and drivers, NOT binary blobs 5. Functions prone to overflow conditions 6. Firmware and configuration encryption 7. Easy-to-use firmware updates (auto-updates) 8. Secure web management interfaces 9. Maintain a CIRT and provide a program for security researchers 10. Implement Protocols Security / Implement Secure Protocols http://securityweekly.com Copyright 2014
  • 53. 1. Firmware Backdoors • A “secret” account (or access) created by the vendor that allows remote management • Excuse is this is done for support reasons (password resets) • The problem is: its not so secret http://securityweekly.com Copyright 2014
  • 54. Backdoor password was... Derived from the MAC address....
  • 55. 2. Default Credentials • A known set of credentials used out-of-the-box • Typically found via Google or in documentation • The problems: Anyone can discover this value and users/ administrators don’t change it • Also: Firmware updates sometimes reset it to the default value http://securityweekly.com Copyright 2014
  • 56. 3. Insecure Remote Management • HTTP & TELNET - Its 2014, why are we still using these protocols to manage systems? • HTTPS - Yes, there is a cost for a certificate. And yes, sometimes vendors will use the same one for every device • SSH - Same thing here, but easier to enable by default • Oh, and weak passwords http://securityweekly.com Copyright 2014
  • 57. 4. Open-Source drivers • Interoperability is nice, but also begs the security question • How do I keep my software and hardware up-to-date if you don’t provide me with a new driver! • Open-source drivers allow for more eyes, and typically are patched more quickly http://securityweekly.com Copyright 2014
  • 58. 5. Functions prone to overflow • Wait, we know strcpy() is bad, right? • Why do we still use it? • And yes, programmers still use it • In fact, if you take it out, they will just put it back ! • https://community.rapid7.com/community/metasploit/blog/2013/11/06/ supermicro-ipmi-firmware-vulnerabilities http://securityweekly.com Copyright 2014
  • 59.
  • 60.
  • 61. Funny Thing About Encryption http://securityweekly.com Copyright 2014
  • 62. 6. Firmware Encryption • Signing firmware updates makes it harder to backdoor existing firmware • Encrypting firmware makes it tougher to reverse engineer (though don’t let that replace real security) • Also, XOR is NOT encryption ! • http://www.darkreading.com/vulnerabilities---threats/hacking-firmware-and- detecting-backdoors/d/d-id/1139859? http://securityweekly.com Copyright 2014
  • 63. 7. User Friendly Firmware Updates • Take a page right from Microsoft’s playbook (I can’t believe I just wrote that, but...) • Step back, most are unaware devices need to be updated for security, amazed that it actually works • Even the term “update firmware” is too geeky, we need to change this • Smartphones are a great example http://securityweekly.com Copyright 2014
  • 64. 8. Secure Web Frameworks • The code behind the web management interface is typically poorly implemented • Java, Ruby, Python, .NET - all too “heavy” to implement on small systems • Developers typically write their own, similar results to “Well, I’ll just implement my own encryption algorithm” http://securityweekly.com Copyright 2014
  • 65. 9. Maintain a CIRT • Look, this FREE help! • D-Link has fixed the problems we covered earlier • Some vulnerabilities never get fixed • Researchers get frustrated and just post the exploits to pastebin • Prezi got hacked, paid the researcher money, and wrote a nice blog post about it and linked to the researcher’s presentation (not in Prezi) • It pays to work and collaborate with security researchers http://securityweekly.com Copyright 2014
  • 66. 10. Secure Protocols • UPnP, IPMI, HNLP, DLNA are common protocols on consumer devices • Modbus is popular on SCADA devices • The problem is they offer great functionality • But security is often left out entirely • IPMI and HNLP have had huge problems, leading to major issues and even the “Linksys Router Worm” • The protocols desperately need security... http://securityweekly.com Copyright 2014
  • 67. http://www.blackhillsinfosec.com For Slides Join Our Mailing List: http://securityweekly.com/insider ! Podcasts/Blogs/Videos: http://securityweekly.com ! Contact Me: paul@securityweekly.com