Internet of Things
Top Ten
WhoAmI
• Security Consultant with Payatu Technologies
• Experience in Web Pentesting, VAPT and Mobile Appsec (Android
Only)
• Currently learning IOT
Agenda
• Why IOT Top 10 ??
• Attack vectors
• IOT Architecture
• OWASP TOP 10 – IOT
• IOT Exploitation Anatomy (Pdf for Reference)
• References
Why Top 10 for IOT ??
• The internet of things (IoT) is the network of physical devices,
vehicles, buildings and other items—embedded with electronics,
software, sensors, actuators, and network connectivity that enable
these objects to collect and exchange data(Wikipedia)
• 26 Billion devices connected to Internet by 2020
• Current Security State - still in nascent stage.
• Thus, scope for hackers  HIGH
Attack Vectors????
Lets have a look at the architecture and derive all the attack vectors
IOT Architecture
Attack Vectors List
• All elements need to be considered
• Communication Protocol
• The Cloud
• The Mobile Application
• The Network Interfaces
• Web Interface
• Encryption
• Authentication/Authorization
• Physical ports(JTAG,UART,SPI,I2C)
• Enter the OWASP Internet of Things Top Ten Project
OWASP IOT TOP 10
I1 | Insecure Web Interface
I1 | Insecure Web Interface | Testing
• Account Enumeration
• Weak Default Credentials
• Credentials Exposed in Network
Traffic
• Cross-site Scripting (XSS)
• SQL-Injection
• Session Management
• Account Lockout
I1 | Insecure Web Interface | Make It
Secure
I2 | Insufficient
Authentication/Authorization
I2 | Insufficient Authentication/Authorization |
Testing
• Lack of Password Complexity
• Poorly Protected Credentials
• Lack of Two Factor Authentication
• Insecure Password Recovery
• Privilege Escalation
• Lack of Role Based Access Control
I2 | Insufficient Authentication/Authorization |
Make It Secure
I3 | Insecure Network Services
I3 | Insecure Network Services |
Testing
• Vulnerable Services
• Buffer Overflow
• Open Ports via UPnP
• Exploitable UDP Services
• Denial-of-Service
• DoS via Network Device Fuzzing
I3 | Insecure Network Services | Make It
Secure
I4 | Lack of Transport Encryption
I4 | Lack of Transport Encryption |
Testing
• Unencrypted Services via the
Internet
• Unencrypted Services via the Local
Network
• Poorly Implemented SSL/TLS
• Misconfigured SSL/TLS
I4 | Lack of Transport Encryption | Make It
Secure
I5 | Privacy Concerns
I5 | Privacy Concerns | Testing
• Collection of Unnecessary Personal
Information
I5 | Privacy Concerns | Make It Secure
I6 | Insecure Cloud Interface
I6 | Insecure Cloud Interface | Testing
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network
Traffic
I6 | Insecure Cloud Interface | Make It
Secure
I7 | Insecure Mobile Interface
I7 | Insecure Mobile Interface | Testing
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network
Traffic
I7 | Insecure Mobile Interface | Make It
Secure
I8 | Insufficient Security
Configurability
I8 | Insufficient Security Configurability |
Testing
• Lack of Granular Permission Model
• Lack of Password Security Options
• No Security Monitoring
• No Security Logging
I8 | Insufficient Security Configurability | Make
It Secure
I9 | Insecure Software/Firmware
I9 | Insecure Software/Firmware |
Testing
• Encryption Not Used to Fetch Updates
• Update File not Encrypted
• Update Not Verified before Upload
• Firmware Contains Sensitive
Information
• No Obvious Update Functionality
I9 | Insecure Software/Firmware | Make It
Secure
I10 | Poor Physical Security
I10 | Poor Physical Security | Testing
• Access to Software via USB Ports
• Removal of Storage Media
I10 | Poor Physical Security | Make It
Secure
References
• OWASP -
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#ta
b=Main
• IOT Security Anatomy -
https://github.com/mdsecresearch/Publications/blob/master/presentation
s/An%20Anatomy%20of%20IoT%20Security_OWASPMCR_Nov2016.pdf
(Content May not load properly. Just download the pdf)
• Insinuater.net
• Peerlyst
• Reddit Link – www.reddit.com/r/theinternetofshit
THANK YOU 

Null mumbai-iot top 10

  • 1.
  • 2.
    WhoAmI • Security Consultantwith Payatu Technologies • Experience in Web Pentesting, VAPT and Mobile Appsec (Android Only) • Currently learning IOT
  • 3.
    Agenda • Why IOTTop 10 ?? • Attack vectors • IOT Architecture • OWASP TOP 10 – IOT • IOT Exploitation Anatomy (Pdf for Reference) • References
  • 4.
    Why Top 10for IOT ?? • The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data(Wikipedia) • 26 Billion devices connected to Internet by 2020 • Current Security State - still in nascent stage. • Thus, scope for hackers  HIGH
  • 5.
    Attack Vectors???? Lets havea look at the architecture and derive all the attack vectors
  • 6.
  • 7.
    Attack Vectors List •All elements need to be considered • Communication Protocol • The Cloud • The Mobile Application • The Network Interfaces • Web Interface • Encryption • Authentication/Authorization • Physical ports(JTAG,UART,SPI,I2C) • Enter the OWASP Internet of Things Top Ten Project
  • 8.
  • 9.
    I1 | InsecureWeb Interface
  • 10.
    I1 | InsecureWeb Interface | Testing • Account Enumeration • Weak Default Credentials • Credentials Exposed in Network Traffic • Cross-site Scripting (XSS) • SQL-Injection • Session Management • Account Lockout
  • 11.
    I1 | InsecureWeb Interface | Make It Secure
  • 12.
  • 13.
    I2 | InsufficientAuthentication/Authorization | Testing • Lack of Password Complexity • Poorly Protected Credentials • Lack of Two Factor Authentication • Insecure Password Recovery • Privilege Escalation • Lack of Role Based Access Control
  • 14.
    I2 | InsufficientAuthentication/Authorization | Make It Secure
  • 15.
    I3 | InsecureNetwork Services
  • 16.
    I3 | InsecureNetwork Services | Testing • Vulnerable Services • Buffer Overflow • Open Ports via UPnP • Exploitable UDP Services • Denial-of-Service • DoS via Network Device Fuzzing
  • 17.
    I3 | InsecureNetwork Services | Make It Secure
  • 18.
    I4 | Lackof Transport Encryption
  • 19.
    I4 | Lackof Transport Encryption | Testing • Unencrypted Services via the Internet • Unencrypted Services via the Local Network • Poorly Implemented SSL/TLS • Misconfigured SSL/TLS
  • 20.
    I4 | Lackof Transport Encryption | Make It Secure
  • 21.
    I5 | PrivacyConcerns
  • 22.
    I5 | PrivacyConcerns | Testing • Collection of Unnecessary Personal Information
  • 23.
    I5 | PrivacyConcerns | Make It Secure
  • 24.
    I6 | InsecureCloud Interface
  • 25.
    I6 | InsecureCloud Interface | Testing • Account Enumeration • No Account Lockout • Credentials Exposed in Network Traffic
  • 26.
    I6 | InsecureCloud Interface | Make It Secure
  • 27.
    I7 | InsecureMobile Interface
  • 28.
    I7 | InsecureMobile Interface | Testing • Account Enumeration • No Account Lockout • Credentials Exposed in Network Traffic
  • 29.
    I7 | InsecureMobile Interface | Make It Secure
  • 30.
    I8 | InsufficientSecurity Configurability
  • 31.
    I8 | InsufficientSecurity Configurability | Testing • Lack of Granular Permission Model • Lack of Password Security Options • No Security Monitoring • No Security Logging
  • 32.
    I8 | InsufficientSecurity Configurability | Make It Secure
  • 33.
    I9 | InsecureSoftware/Firmware
  • 34.
    I9 | InsecureSoftware/Firmware | Testing • Encryption Not Used to Fetch Updates • Update File not Encrypted • Update Not Verified before Upload • Firmware Contains Sensitive Information • No Obvious Update Functionality
  • 35.
    I9 | InsecureSoftware/Firmware | Make It Secure
  • 36.
    I10 | PoorPhysical Security
  • 37.
    I10 | PoorPhysical Security | Testing • Access to Software via USB Ports • Removal of Storage Media
  • 38.
    I10 | PoorPhysical Security | Make It Secure
  • 39.
    References • OWASP - https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#ta b=Main •IOT Security Anatomy - https://github.com/mdsecresearch/Publications/blob/master/presentation s/An%20Anatomy%20of%20IoT%20Security_OWASPMCR_Nov2016.pdf (Content May not load properly. Just download the pdf) • Insinuater.net • Peerlyst • Reddit Link – www.reddit.com/r/theinternetofshit
  • 40.