Introduction to IoT Security
1. What is IoT Security?
2. Why it is so important? W
3. IoT Security Challenge
4. Divide 4
5. Learning concepts
6. Need a hardware to break hardware
Agenda 1. What is IoT Security? 2. Why it is so important? 3. IoT Security Challenges 4. Divide 4 5. Learning concepts 6. Need a hardware to break a hardware
IoT Security ..! What it is..? • IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things Simply : we need to secure the device which is connected to internet IoT - Internet of things IIoT - Industrial internet of things (Automobile) OT - Operational Technology(ICS/SCADA)
Importance of IoT 1. Human Race 2. Health care 3. Industrial 4. Home automation 5. Wearables 6. Smart Cars (automobiles) 7. Smart Cities 8. IoT in Agriculture 9. Power Engagement
Entry Level Testing in IoT • Default Login attacks • Open ports and running services • Hardcoded data like api keys , URLs , certificates , passwords • Using publicly available exploits like blue borne • Using Metasploit payloads and exploits • Spidering the web for login forms and parameter • Protocols information gathering • Looking for plaintext information • Tools : burp , curl , Nikto , dirb , Nmap , Metasploit , brute force tools , hci tool , nRF connect app,
Middleware Level Testing • Fuzzing URLs and identifying the input locations on embedded applications • Enumerating data of device from search engines - Shodan , fofa, Censys, zoomeye • Dorks for devices - Shodan and zoom eye • Hashing breaking • Communication Protocols testing – with Wireshark and other proxy tools • Firmware analysis static • Software application testing (thick client) • Datasheets and reconnaissance about the devices • Tools : exploit,
Advance Level Testing • Rewriting code or exploit to test – gnuradio scripts and python scripts • Replay attacks – car and door systems • Identifying architecture and analyzing the board to exploit it • Getting shell from hardware and testing filesystem • Firmware analysis dynamic • Re-flashing vulnerable firmware to devices • Debugging the hardware • Debug the Firmware / Software – buffer overflow/heap overflow/stack overflow • Tools: Jtag , UART, SPI&i2C , gdb, , x64dbg , radare2, ,Objdump, IDA Disassembler, Wireshark, hping3, Protocol Fuzzers (HTTP, Network), DetecItEasy , Fiddler, Echo Mirage, Sysinternals suite
For Best Resources follow me • @v33riot • https://github.com/V33RU/IoTSecurity101 • Join Telegram Group “iotsecurity1011” • Email me : [email protected] • iotpentest.com