SlideShare a Scribd company logo
So What is Being Exposed
From IoT Devices?
Ming Chow
mchow@cs.tufts.edu
Twitter: @0xmchow
The Security of Things Forum
September 9, 2015
Absurdities
from @internetofshit
Absurdities (continued)
https://www.vibease.com/
Scope of This Talk
● Ingress and egress from devices
(more of the latter)
● From what devices? Commonly used
devices, not from an infinitely wide
range of stuff (mostly fad)
What This Talk Will Not Cover
● Breaking and exploiting the devices
● Reverse engineering
● Attacking devices (e.g., Denial of Service)
● Defense and fixing the problem
● Web vulnerabilities (e.g., XSS, CSRF)
● Threat profile of mobile and mobile apps
Commonly Exposed from Devices
● Status Data: binary - on or off, available or not
● Identification Data: product, serial numbers
● Location Data: (e.g., where) latitude and longitude
● Automation Data: including sensor data
● Action Data: inferred or determined from status data and/or location data
● Open ports
● Administration web interfaces
Techniques
● Scanning
● Search engines:
○ Google
○ SHODAN - https://www.shodan.io/
○ Thingful - https://thingful.net/
● Social media
Webcams
● Example: AVTECH AVN801: used for surveillance
○ http://www.amazon.com/AVTECH-AVN801-Megapixel-Video-Camera/dp/B008FPDEPK
● 153,998 results on SHODAN: `linux upnp avtech product:"Avtech AVN801
network camera"`
● Ports exposed: 80, 4567, 8080, to name a few
● Admin interface exposed, many don’t even have them
Small Office Home Office (SOHO) Routers
● NETGEAR DG834G
○ http://www.amazon.com/NETGEAR-DG834G-Wireless-G-Router-Built/dp/B0000D8HK1
● 20,311 results on SHODAN: `NETGEAR DG834G`
● Ports exposed: 80, 7547 (modem), 8080, to name a few
● Admin interface exposed (HTTP)
Light Bulbs and Amazon Dash
● Many thanks to my colleague Ben Shapiro at the University of Colorado,
Boulder. He can’t resist playing with this stuff and send me stuff of what can
you do with all this stuff (or whatcouldpossiblygowrong)
● Belkin WeMo line of home automation devices. In this example, a light bulb
http://www.belkin.com/us/Products/home-automation/c/wemo-home-
automation/
● Python API to Belkin WeMo devices: ouimeaux
○ GitHub: https://github.com/iancmcc/ouimeaux
○ Python Package Doc: https://ouimeaux.readthedocs.org/en/latest/readme.html
● Amazon Dash: device to buy home necessities (e.g., food) http://www.
amazon.com/b?node=10667898011
● Belkin WeMo light bulb + Amazon Dash …….
Source Code For Amazon Dash + WeMo Light (thanks again Ben)
from scapy.all import *
import os
def arp_display(pkt):
if pkt[ARP].op == 1: #who-has (request)
if pkt[ARP].psrc == '0.0.0.0': # ARP Probe
if pkt[ARP].hwsrc == 'a0:02:dc:da:8c:58': # Mac n Cheese
print "Pushed Mac n Cheese... toggle bedroom lights"
os.system('wemo -f switch "Bedroom switch" toggle')
else:
print "ARP Probe from unknown device: " + pkt[ARP].hwsrc
while True: sniff(prn=arp_display, filter="arp", store=0, count=999)
The point: ouimeaux is an application programming interface (API) that provides
“command-line tool to discover and control (WeMo) devices in your environment;
REST API to obtain information and perform actions on devices”. Any device on
network can send requests.
Fitbit Ingress
● Body fat
● Weight
● Alarms
● Food
● Water
● Friends
● Heart rate
● Sleep
● Source: https://dev.fitbit.com/docs
Fitbit Egress
● Source: https://dev.fitbit.
com/docs/activity/
● “Fitbit Data Now Being Used In The
Courtroom” http://www.forbes.
com/sites/parmyolson/2014/11/16/fitbit-
data-court-room-personal-injury-claim/
Raspberry Pi
● $35 computers
● Runs a complete Linux distribution off SD card
● Popular for hacking, IoT experiments, home
automation
● Via Thingful: well over 9999+ results. Where does
it get data from? Rastrack: 94845 results
The Future
● My hope: the data that you’ve seen today will help you understand why
security and privacy issues are getting major visibility in the IoT space.
● What’s impressive and scary: the scale of data going in and alas, going out
● API documentation is valuable
● “The Internet of Way Too Many Things” http://www.nytimes.
com/2015/09/06/opinion/sunday/allison-arieff-the-internet-of-way-too-many-
things.html
● Unfortunately, these devices will sell as people generally good at impulse
buys.
● Do really we need all this stuff?
Déjà Vu: Who to Blame
● (heard from Bruce Schneier at USENIX 2004 in Boston)
● Developers
● Users
● Technology
● Politics and "dumb laws"
References
● Dhanjani, N, “Abusing the Internet of Things Blackouts, Freakouts, and Stakeouts”, O’Reilly Media, August 2015
● https://www.blackhat.com/docs/asia-14/materials/Dhanjani/Asia-14-Dhanjani-Abusing-The-Internet-Of-Things-
Blackouts-Freakouts-And-Stakeouts.pdf
● http://www.wired.com/insights/2015/03/internet-things-data-go/
● http://readwrite.com/2015/08/13/five-types-data-internet-of-things
● https://recode.net/2015/04/07/a-hackers-eye-view-of-the-internet-of-things/
● http://www.computerworld.com/article/2944680/internet-of-things/the-internet-of-things-your-worst-nightmare.html
● http://thenextweb.com/insider/2012/12/09/the-future-of-the-internet-of-things/
● http://hackaday.com/2013/01/31/turning-the-belkin-wemo-into-a-deathtrap/
● http://www.networkworld.com/article/2226371/microsoft-subnet/500-000-belkin-wemo-users-could-be-hacked--cert-
issues-advisory.html
● https://community.rapid7.com/community/infosec/blog/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video-
baby-monitors

More Related Content

Similar to What is being exposed from IoT Devices

2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
dino715195
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
kingsBSD
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Sigma Software
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
3G4G
 
IOT with Drupal 8 - Webinar Hyderabad Drupal Community
IOT with Drupal 8 -  Webinar Hyderabad Drupal CommunityIOT with Drupal 8 -  Webinar Hyderabad Drupal Community
IOT with Drupal 8 - Webinar Hyderabad Drupal Community
Prateek Jain
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
IoT: Entering an Era of Perfect Information
IoT: Entering an Era of Perfect InformationIoT: Entering an Era of Perfect Information
IoT: Entering an Era of Perfect Information
Christopher Mohritz
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
Yury Chemerkin
 
How the Internet of Things (IoT) Works for Business
How the Internet of Things (IoT) Works for BusinessHow the Internet of Things (IoT) Works for Business
How the Internet of Things (IoT) Works for Business
10x Nation
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Yogesh Ojha
 
Perfect Information - How IoT empowers you to know anything, anytime, anywhere
Perfect Information - How IoT empowers you to know anything, anytime, anywherePerfect Information - How IoT empowers you to know anything, anytime, anywhere
Perfect Information - How IoT empowers you to know anything, anytime, anywhere
10x Nation
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
veerababu penugonda(Mr-IoT)
 
Os hardware meets os software
Os hardware meets os softwareOs hardware meets os software
Os hardware meets os software
Paul Tanner
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
T.Rob Wyatt
 
Programming for the Internet of Things
Programming for the Internet of ThingsProgramming for the Internet of Things
Programming for the Internet of Things
Kinoma
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
Greg Foss
 
Interconnection Automation For All - Extended - MPS 2023
Interconnection Automation For All - Extended - MPS 2023Interconnection Automation For All - Extended - MPS 2023
Interconnection Automation For All - Extended - MPS 2023
Chris Grundemann
 
IoT: An introduction
IoT: An introductionIoT: An introduction
IoT: An introduction
JWORKS powered by Ordina
 

Similar to What is being exposed from IoT Devices (20)

2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
 
IOT with Drupal 8 - Webinar Hyderabad Drupal Community
IOT with Drupal 8 -  Webinar Hyderabad Drupal CommunityIOT with Drupal 8 -  Webinar Hyderabad Drupal Community
IOT with Drupal 8 - Webinar Hyderabad Drupal Community
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
IoT: Entering an Era of Perfect Information
IoT: Entering an Era of Perfect InformationIoT: Entering an Era of Perfect Information
IoT: Entering an Era of Perfect Information
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
How the Internet of Things (IoT) Works for Business
How the Internet of Things (IoT) Works for BusinessHow the Internet of Things (IoT) Works for Business
How the Internet of Things (IoT) Works for Business
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
 
Perfect Information - How IoT empowers you to know anything, anytime, anywhere
Perfect Information - How IoT empowers you to know anything, anytime, anywherePerfect Information - How IoT empowers you to know anything, anytime, anywhere
Perfect Information - How IoT empowers you to know anything, anytime, anywhere
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 
Os hardware meets os software
Os hardware meets os softwareOs hardware meets os software
Os hardware meets os software
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
 
Programming for the Internet of Things
Programming for the Internet of ThingsProgramming for the Internet of Things
Programming for the Internet of Things
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
Interconnection Automation For All - Extended - MPS 2023
Interconnection Automation For All - Extended - MPS 2023Interconnection Automation For All - Extended - MPS 2023
Interconnection Automation For All - Extended - MPS 2023
 
IoT: An introduction
IoT: An introductionIoT: An introduction
IoT: An introduction
 

More from The Security of Things Forum

Securing the Fog
Securing the FogSecuring the Fog
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
The Security of Things Forum
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy Computing
The Security of Things Forum
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
The Security of Things Forum
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
The Security of Things Forum
 

More from The Security of Things Forum (6)

Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy Computing
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

What is being exposed from IoT Devices

  • 1. So What is Being Exposed From IoT Devices? Ming Chow mchow@cs.tufts.edu Twitter: @0xmchow The Security of Things Forum September 9, 2015
  • 4.
  • 5. Scope of This Talk ● Ingress and egress from devices (more of the latter) ● From what devices? Commonly used devices, not from an infinitely wide range of stuff (mostly fad)
  • 6. What This Talk Will Not Cover ● Breaking and exploiting the devices ● Reverse engineering ● Attacking devices (e.g., Denial of Service) ● Defense and fixing the problem ● Web vulnerabilities (e.g., XSS, CSRF) ● Threat profile of mobile and mobile apps
  • 7. Commonly Exposed from Devices ● Status Data: binary - on or off, available or not ● Identification Data: product, serial numbers ● Location Data: (e.g., where) latitude and longitude ● Automation Data: including sensor data ● Action Data: inferred or determined from status data and/or location data ● Open ports ● Administration web interfaces
  • 8. Techniques ● Scanning ● Search engines: ○ Google ○ SHODAN - https://www.shodan.io/ ○ Thingful - https://thingful.net/ ● Social media
  • 9. Webcams ● Example: AVTECH AVN801: used for surveillance ○ http://www.amazon.com/AVTECH-AVN801-Megapixel-Video-Camera/dp/B008FPDEPK ● 153,998 results on SHODAN: `linux upnp avtech product:"Avtech AVN801 network camera"` ● Ports exposed: 80, 4567, 8080, to name a few ● Admin interface exposed, many don’t even have them
  • 10. Small Office Home Office (SOHO) Routers ● NETGEAR DG834G ○ http://www.amazon.com/NETGEAR-DG834G-Wireless-G-Router-Built/dp/B0000D8HK1 ● 20,311 results on SHODAN: `NETGEAR DG834G` ● Ports exposed: 80, 7547 (modem), 8080, to name a few ● Admin interface exposed (HTTP)
  • 11. Light Bulbs and Amazon Dash ● Many thanks to my colleague Ben Shapiro at the University of Colorado, Boulder. He can’t resist playing with this stuff and send me stuff of what can you do with all this stuff (or whatcouldpossiblygowrong) ● Belkin WeMo line of home automation devices. In this example, a light bulb http://www.belkin.com/us/Products/home-automation/c/wemo-home- automation/ ● Python API to Belkin WeMo devices: ouimeaux ○ GitHub: https://github.com/iancmcc/ouimeaux ○ Python Package Doc: https://ouimeaux.readthedocs.org/en/latest/readme.html ● Amazon Dash: device to buy home necessities (e.g., food) http://www. amazon.com/b?node=10667898011 ● Belkin WeMo light bulb + Amazon Dash …….
  • 12. Source Code For Amazon Dash + WeMo Light (thanks again Ben) from scapy.all import * import os def arp_display(pkt): if pkt[ARP].op == 1: #who-has (request) if pkt[ARP].psrc == '0.0.0.0': # ARP Probe if pkt[ARP].hwsrc == 'a0:02:dc:da:8c:58': # Mac n Cheese print "Pushed Mac n Cheese... toggle bedroom lights" os.system('wemo -f switch "Bedroom switch" toggle') else: print "ARP Probe from unknown device: " + pkt[ARP].hwsrc while True: sniff(prn=arp_display, filter="arp", store=0, count=999) The point: ouimeaux is an application programming interface (API) that provides “command-line tool to discover and control (WeMo) devices in your environment; REST API to obtain information and perform actions on devices”. Any device on network can send requests.
  • 13. Fitbit Ingress ● Body fat ● Weight ● Alarms ● Food ● Water ● Friends ● Heart rate ● Sleep ● Source: https://dev.fitbit.com/docs
  • 14. Fitbit Egress ● Source: https://dev.fitbit. com/docs/activity/ ● “Fitbit Data Now Being Used In The Courtroom” http://www.forbes. com/sites/parmyolson/2014/11/16/fitbit- data-court-room-personal-injury-claim/
  • 15. Raspberry Pi ● $35 computers ● Runs a complete Linux distribution off SD card ● Popular for hacking, IoT experiments, home automation ● Via Thingful: well over 9999+ results. Where does it get data from? Rastrack: 94845 results
  • 16.
  • 17.
  • 18.
  • 19. The Future ● My hope: the data that you’ve seen today will help you understand why security and privacy issues are getting major visibility in the IoT space. ● What’s impressive and scary: the scale of data going in and alas, going out ● API documentation is valuable ● “The Internet of Way Too Many Things” http://www.nytimes. com/2015/09/06/opinion/sunday/allison-arieff-the-internet-of-way-too-many- things.html ● Unfortunately, these devices will sell as people generally good at impulse buys. ● Do really we need all this stuff?
  • 20. Déjà Vu: Who to Blame ● (heard from Bruce Schneier at USENIX 2004 in Boston) ● Developers ● Users ● Technology ● Politics and "dumb laws"
  • 21. References ● Dhanjani, N, “Abusing the Internet of Things Blackouts, Freakouts, and Stakeouts”, O’Reilly Media, August 2015 ● https://www.blackhat.com/docs/asia-14/materials/Dhanjani/Asia-14-Dhanjani-Abusing-The-Internet-Of-Things- Blackouts-Freakouts-And-Stakeouts.pdf ● http://www.wired.com/insights/2015/03/internet-things-data-go/ ● http://readwrite.com/2015/08/13/five-types-data-internet-of-things ● https://recode.net/2015/04/07/a-hackers-eye-view-of-the-internet-of-things/ ● http://www.computerworld.com/article/2944680/internet-of-things/the-internet-of-things-your-worst-nightmare.html ● http://thenextweb.com/insider/2012/12/09/the-future-of-the-internet-of-things/ ● http://hackaday.com/2013/01/31/turning-the-belkin-wemo-into-a-deathtrap/ ● http://www.networkworld.com/article/2226371/microsoft-subnet/500-000-belkin-wemo-users-could-be-hacked--cert- issues-advisory.html ● https://community.rapid7.com/community/infosec/blog/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video- baby-monitors