SlideShare a Scribd company logo
Ike Clinton and Lance Cook
Analyzing Vulnerabilities in Embedded
Systems
What is the Internet of Things?
The Internet of Things(IoT) is a vast and rapidly growing frontier
of new technology that includes a variety of “smart” devices.
It is the network of physical objects or “things” embedded with
electronics, software, sensors, and connectivity.
The IoT can refer to a wide range of devices from heart monitors
to smart fridges.
Connect the world
Security of the Internet of Things
How can this interconnected system of “smart” devices affect
security?
What implications will it have on the global internet community?
Our Research
Overview of the current internet landscape
Survey of current TTPs for embedded device reverse engineering
and firmware analysis
Practical analysis and penetration test of 3 smart devices.
Our Research
Purchased 3 “smart” devices
Become familiar with intended use cases
Analyze default configurations of different devices
Study past/current exploitation techniques
Obtain device firmware through various methods
Analyze firmware and determine potential vulnerabilities
Test exploitation techniques
Report findings
Research Timeline
24 Feb: Proposal submitted
March 1: Surveyed current IoT landscape
March 9-13: Researched tools and techniques needed for analysis
March 16-20: Identified devices to order. D-Link device arrives, testing
begins
March 20: Two additional devices ordered (WeMo)
April 28: Testing concludes
May 5: Presentation of findings
Belkin WeMo Product Line
 Home automation products
 Light switches, motion sensors, IP cameras, croc pots. . .
 Uses one app to control all devices
 Syncs settings to the cloud
 Allows for remote access
 Embedded devices running on Linux
Insight Switch
 “Control your electronics”
 Running linux on a MIPS processor
 Uses UPnP to communicate and punch holes in the router
 UPnP vulnerable to XML injection
 Clever trick to get telnetd running on switch
Wemo NetcamHD+
 Cloud controlled Ipcam
 Uses netcam app to control camera
 Saves video/recordings to cloud service
 No local access
 Service intermittent
Device History
 Several vulnerabilities disclosed in the past
 Malicious firmware attack
 XML UPnP injection
 Netcam had telnet open by default
 Netcam default admin:admin creds
 Belkin fixed most of them. . .
Binwalk
 Firmware analysis tool
 Extracts .bin files
 Can view linux file systems of embedded
devices
 Great for finding default passwords,
grabbing binaries from device for analysis
(IDA), etc
 Also has nice entropy analysis tools
msf
 Exploitation framework by HD Moore and
rapid7
 DB of known vulnerabilities
 Modular design
 Also incorporates auxiliary modules, scanners,
post exploitation, and payload encoders
Nmap
 Network scanning
 Service discovery
 Banner grabbing
 Other custom scans
IDA
 Interactive Disassembler
 Can be compared to ollydbg, gdb,
radare2, etc
 Used to identify buffer overflows
 Other RE tasks
Github/Metasploit modules
 /dev/ttyS0
 disconnected.io
 Custom msf modules from github
 Slightly modified ruby code
 Ufuzz
Other tools
 Netcat (swiss army knife)
 telnet
 GPG (GNU Privacy Guard) successor of PGP
 Other linux utils for RE and analysis (strings, hexdump, find, grep, etc)
 QEMU
The Good
 Wemo provides decent home automation solutions with their products when they work
 Belkin/ D-Link Have addressed most/all of the disclosed vulnerabilities
 Wemo devices no longer store GPG private key on devices
 Netcam no longer has telnet open by default
 Netcam longer has default password on web interface
 Firmware is now encrypted “properly”
 SSL encryption used when devices communicate with cloud service
The Bad
 Netcam requires cloud service to operate, no local access
 Service is intermittent at best
 There are still more unaddressed/undisclosed exploits
 Old exploits still work intermittently on fully patched devices
 Belkin never changed the GPG keys . . .
 Legacy hardcoded credentials and blank passwords still exist
The Ugly. . .
Summary of Findings
 XML UPnP injection still works on other parameters
 Devices still ship unpatched
 Belkin never changed GPG keys. . .
 Can sign and flash our own custom firmware
 Devices could be flashed with malicious firmware without the owner knowing
 Dangerous considering some users wont bother to update
Further Research
 More 0-Days?
 Fuzz the other attack surfaces/UPnP commands
 Flash custom firmware onto device
 Discover devices on the internet using shodan/masscan
 Investigate other embedded devices
Belkin WeMo Remote Shell and Rapid State Change
Exploit
https://www.youtube.com/watch?v=BcW2q0aHOFo
Lessons Learned
 Pay attention to your professor when he lectures on protocols
 Sanitize, sanitize, sanitize
 Vendors are not implementing UPnP properly/securely
 Sometimes logical security > Technical security
Resources
 http://binwalk.org/
 https://github.com/phikshun
 http://disconnected.io/
 http://www.devttys0.com/
 https://github.com/issackelly/wemo
 http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf
 http://www.shodan.io
 https://www.scadahacker.com
 http://www.exploit-db.com/
 https://nvd.nist.gov/
 http://1337day.com/exploit/20633
 Various Blackhat and Defcon presentations
 Scholarly journals/whitepapers
Special Thanks
 Thanks to The Citadel CSCI department for purchasing the two WeMo devices!
Questions?

More Related Content

What's hot

Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
guest990c6c
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
Sam Bowne
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
Sam Bowne
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
aissa benyahya
 
Cisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and PolicyCisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and Policy
Mike Pruett
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
17 resources to become an IoT Pro
17 resources to become an IoT Pro17 resources to become an IoT Pro
17 resources to become an IoT Pro
Allied Consultants
 
Presentation on Malicious Hardware_Lisi_2020
Presentation on Malicious Hardware_Lisi_2020Presentation on Malicious Hardware_Lisi_2020
Presentation on Malicious Hardware_Lisi_2020
Marco Lisi
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
sr1nu
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Security tools
Security toolsSecurity tools

What's hot (18)

Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
 
SSVPS
SSVPSSSVPS
SSVPS
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Cisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and PolicyCisco Security Agent - Theory, Practice, and Policy
Cisco Security Agent - Theory, Practice, and Policy
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
17 resources to become an IoT Pro
17 resources to become an IoT Pro17 resources to become an IoT Pro
17 resources to become an IoT Pro
 
Presentation on Malicious Hardware_Lisi_2020
Presentation on Malicious Hardware_Lisi_2020Presentation on Malicious Hardware_Lisi_2020
Presentation on Malicious Hardware_Lisi_2020
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Security tools
Security toolsSecurity tools
Security tools
 

Viewers also liked

Evaluation questions 4&5
Evaluation questions 4&5Evaluation questions 4&5
Evaluation questions 4&5
xeniademosthenous
 
Tarea 3
Tarea 3Tarea 3
Tarea 3
Uniand
 
Portfolio Carakole Design Comunicação 2016
Portfolio Carakole Design Comunicação 2016Portfolio Carakole Design Comunicação 2016
Portfolio Carakole Design Comunicação 2016
Carakole Design e Comunicação
 
SILABO INFORMATICA
SILABO INFORMATICASILABO INFORMATICA
SILABO INFORMATICA
pumasayay
 
Marketing de Conteúdo - Aula 3
Marketing de Conteúdo - Aula 3 Marketing de Conteúdo - Aula 3
Marketing de Conteúdo - Aula 3
lapacomunicacao
 
silabo
silabosilabo
silabo
pumasayay
 
Pindu Shoes Pumps catalogue 16/1
Pindu Shoes Pumps catalogue 16/1Pindu Shoes Pumps catalogue 16/1
Pindu Shoes Pumps catalogue 16/1
伟芬 谢
 
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
Александр Ст
 
Chengdu Pindu Shoes Company Brief Introduction
Chengdu Pindu Shoes Company Brief IntroductionChengdu Pindu Shoes Company Brief Introduction
Chengdu Pindu Shoes Company Brief Introduction
伟芬 谢
 
Terhab dubai by manazil
Terhab dubai by manazilTerhab dubai by manazil
Terhab dubai by manazil
Manazil_Global_Property_Development
 

Viewers also liked (12)

Evaluation questions 4&5
Evaluation questions 4&5Evaluation questions 4&5
Evaluation questions 4&5
 
Tarea 3
Tarea 3Tarea 3
Tarea 3
 
Portfolio Carakole Design Comunicação 2016
Portfolio Carakole Design Comunicação 2016Portfolio Carakole Design Comunicação 2016
Portfolio Carakole Design Comunicação 2016
 
SILABO INFORMATICA
SILABO INFORMATICASILABO INFORMATICA
SILABO INFORMATICA
 
Marketing de Conteúdo - Aula 3
Marketing de Conteúdo - Aula 3 Marketing de Conteúdo - Aula 3
Marketing de Conteúdo - Aula 3
 
silabo
silabosilabo
silabo
 
Pindu Shoes Pumps catalogue 16/1
Pindu Shoes Pumps catalogue 16/1Pindu Shoes Pumps catalogue 16/1
Pindu Shoes Pumps catalogue 16/1
 
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
ВЛИЯНИЕ ЭНОАНТА НА КОГНИТИВНЫЕ ФУНКЦИИ У БОЛЬНЫХ С ГИПЕРТОНИЧЕСКОЙ БОЛЕЗНЬЮ
 
jeelanicv
jeelanicvjeelanicv
jeelanicv
 
Chengdu Pindu Shoes Company Brief Introduction
Chengdu Pindu Shoes Company Brief IntroductionChengdu Pindu Shoes Company Brief Introduction
Chengdu Pindu Shoes Company Brief Introduction
 
THWIRE 10-05-16
THWIRE 10-05-16THWIRE 10-05-16
THWIRE 10-05-16
 
Terhab dubai by manazil
Terhab dubai by manazilTerhab dubai by manazil
Terhab dubai by manazil
 

Similar to Analyzing Vulnerabilities in the Internet of Things

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
Nikhil Mittal
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
Nitesh Malviya
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
Priyanka Aash
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
Syaiful Ahdan
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
Speck&Tech
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
shawn_merdinger
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
CODE BLUE
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
Lohith Haravu Chandrashekar
 

Similar to Analyzing Vulnerabilities in the Internet of Things (20)

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 

Analyzing Vulnerabilities in the Internet of Things

  • 1. Ike Clinton and Lance Cook Analyzing Vulnerabilities in Embedded Systems
  • 2. What is the Internet of Things? The Internet of Things(IoT) is a vast and rapidly growing frontier of new technology that includes a variety of “smart” devices. It is the network of physical objects or “things” embedded with electronics, software, sensors, and connectivity. The IoT can refer to a wide range of devices from heart monitors to smart fridges. Connect the world
  • 3. Security of the Internet of Things How can this interconnected system of “smart” devices affect security? What implications will it have on the global internet community?
  • 4.
  • 5.
  • 6. Our Research Overview of the current internet landscape Survey of current TTPs for embedded device reverse engineering and firmware analysis Practical analysis and penetration test of 3 smart devices.
  • 7. Our Research Purchased 3 “smart” devices Become familiar with intended use cases Analyze default configurations of different devices Study past/current exploitation techniques Obtain device firmware through various methods Analyze firmware and determine potential vulnerabilities Test exploitation techniques Report findings
  • 8. Research Timeline 24 Feb: Proposal submitted March 1: Surveyed current IoT landscape March 9-13: Researched tools and techniques needed for analysis March 16-20: Identified devices to order. D-Link device arrives, testing begins March 20: Two additional devices ordered (WeMo) April 28: Testing concludes May 5: Presentation of findings
  • 9. Belkin WeMo Product Line  Home automation products  Light switches, motion sensors, IP cameras, croc pots. . .  Uses one app to control all devices  Syncs settings to the cloud  Allows for remote access  Embedded devices running on Linux
  • 10. Insight Switch  “Control your electronics”  Running linux on a MIPS processor  Uses UPnP to communicate and punch holes in the router  UPnP vulnerable to XML injection  Clever trick to get telnetd running on switch
  • 11. Wemo NetcamHD+  Cloud controlled Ipcam  Uses netcam app to control camera  Saves video/recordings to cloud service  No local access  Service intermittent
  • 12. Device History  Several vulnerabilities disclosed in the past  Malicious firmware attack  XML UPnP injection  Netcam had telnet open by default  Netcam default admin:admin creds  Belkin fixed most of them. . .
  • 13. Binwalk  Firmware analysis tool  Extracts .bin files  Can view linux file systems of embedded devices  Great for finding default passwords, grabbing binaries from device for analysis (IDA), etc  Also has nice entropy analysis tools
  • 14. msf  Exploitation framework by HD Moore and rapid7  DB of known vulnerabilities  Modular design  Also incorporates auxiliary modules, scanners, post exploitation, and payload encoders
  • 15. Nmap  Network scanning  Service discovery  Banner grabbing  Other custom scans
  • 16. IDA  Interactive Disassembler  Can be compared to ollydbg, gdb, radare2, etc  Used to identify buffer overflows  Other RE tasks
  • 17. Github/Metasploit modules  /dev/ttyS0  disconnected.io  Custom msf modules from github  Slightly modified ruby code  Ufuzz
  • 18. Other tools  Netcat (swiss army knife)  telnet  GPG (GNU Privacy Guard) successor of PGP  Other linux utils for RE and analysis (strings, hexdump, find, grep, etc)  QEMU
  • 19. The Good  Wemo provides decent home automation solutions with their products when they work  Belkin/ D-Link Have addressed most/all of the disclosed vulnerabilities  Wemo devices no longer store GPG private key on devices  Netcam no longer has telnet open by default  Netcam longer has default password on web interface  Firmware is now encrypted “properly”  SSL encryption used when devices communicate with cloud service
  • 20. The Bad  Netcam requires cloud service to operate, no local access  Service is intermittent at best  There are still more unaddressed/undisclosed exploits  Old exploits still work intermittently on fully patched devices  Belkin never changed the GPG keys . . .  Legacy hardcoded credentials and blank passwords still exist
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Summary of Findings  XML UPnP injection still works on other parameters  Devices still ship unpatched  Belkin never changed GPG keys. . .  Can sign and flash our own custom firmware  Devices could be flashed with malicious firmware without the owner knowing  Dangerous considering some users wont bother to update
  • 37. Further Research  More 0-Days?  Fuzz the other attack surfaces/UPnP commands  Flash custom firmware onto device  Discover devices on the internet using shodan/masscan  Investigate other embedded devices
  • 38. Belkin WeMo Remote Shell and Rapid State Change Exploit https://www.youtube.com/watch?v=BcW2q0aHOFo
  • 39. Lessons Learned  Pay attention to your professor when he lectures on protocols  Sanitize, sanitize, sanitize  Vendors are not implementing UPnP properly/securely  Sometimes logical security > Technical security
  • 40. Resources  http://binwalk.org/  https://github.com/phikshun  http://disconnected.io/  http://www.devttys0.com/  https://github.com/issackelly/wemo  http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf  http://www.shodan.io  https://www.scadahacker.com  http://www.exploit-db.com/  https://nvd.nist.gov/  http://1337day.com/exploit/20633  Various Blackhat and Defcon presentations  Scholarly journals/whitepapers
  • 41.
  • 42.
  • 43. Special Thanks  Thanks to The Citadel CSCI department for purchasing the two WeMo devices!