SECURING the INTERNET of THINGS the Emerging Internet of Things Raises New Security Concerns and Puts a Spin on Old Ones

Total Page:16

File Type:pdf, Size:1020Kb

SECURING the INTERNET of THINGS the Emerging Internet of Things Raises New Security Concerns and Puts a Spin on Old Ones INFORMATION AUGUST 2014 EDITOR’S DESK: INTERNET OF THINGS AND ECURITY SECURITY S Insider Edition SECURING THE INTERNET OF THINGS The emerging Internet of Things raises new security concerns and puts a spin on old ones. In this Insider Edition, InfoSec pros find out how to assess IoT risks and create an effective IoT security policy. IS YOUR SECURITY PROGRAM READY FOR THE INTERNET OF THINGS? WHO’S IN CHARGE HERE? SECURING THE INTERNET OF THINGS EDITOR’S DESK The Benefits of the Internet of Things HOME EDITOR’S DESK Can’t Overshadow Security Concerns SEVEN IOT RISKS While connecting billions of new devices to the Internet offers many advantages, YOU MUST CONSIDER organizations must also manage the risks involved. BY BRANDAN BLEVINS IS YOUR SECURITY PROGRAM READY FOR THE INTERNET OF THINGS? WHO’S IN CHARGE HERE? SECURING THE INTERNET OF THINGS Y 2015, CISCO predicts that around 25 bil- enterprise IoT risks today, some of which will look famil- lion devices will be connected to the iar on first glance: DDoS attacks, patch management chal- Internet. That number is expected to lenges and traffic analytics. The nature and number of IoT double by 2020. This web of Internet- devices puts a twist on those risks, though. connected devices, dubbed the Inter- In the other features, we explore some of the challen- net of Things, has been touted by tech giants as a way to ges associated with securing IoT devices. Experts say the Befficiently share data and improve lives. Indeed, we’ve devices may not have the processing power to run security already seen compelling products introduced, and the software, while debate also remains over which party is companies creating these items are profiting from API even responsible for securing the Internet of Things. monetization schemes and other efforts. Numerous enterprises may see IoT as a potential gold Still, the danger associated with connecting billions rush, but security can’t be ignored. This Insider Edition of potentially vulnerable devices—many of which share will help enterprises achieve the benefits associated with sensitive data—to the Internet has not been discussed the Internet of Things while containing the risk. n enough. This Insider Edition aims to explore those risks and how organizations can mitigate them. First, ex- BRANDAN BLEVINS is the news writer for TechTarget Security pert Ajay Kumar enumerates seven of the most pressing Media Group 2 INFORMATION SECURITY INSIDER EDITION / SECURING THE INTERNET OF THINGS n AUGUST 2014 COVER STORY: RISKS HOME SEVEN IoT RISKS EDITOR’S DESK SEVEN IOT RISKS YOU MUST YOU MUST CONSIDER IS YOUR SECURITY CONSIDER PROGRAM READY FOR THE INTERNET THE DAY WHEN virtually every electronic device—from OF THINGS? The Internet of Things is phones and cars to refrigerators and light switches—will be connected to the Internet is not far away. The number WHO’S IN CHARGE HERE? growing fast, and so are the SECURING THE of Internet-connected devices is growing rapidly and is INTERNET OF THINGS risks. Here are seven risks expected to reach 50 billion by 2020. that must be taken into account However innovative and promising it seems, this so- when planning at IoT policy. called Internet of Things (IoT) phenomenon significantly increases the number of security risks businesses and con- sumers will inevitably face. Any device connecting to the Internet with an operating system comes with the possi- bility of being compromised, becoming a backdoor for at- tackers into the enterprise. In this feature, I discuss the proliferation of the In- ternet of Things and explore what enterprises can do to manage the security risks associated with IoT devices. WHAT IS THE IoT? WHY IS IT GROWING IN POPULARITY? The IoT sensation is rapidly embracing entire societies By Ajay Kumar and holds the potential to empower and advance nearly each and every individual and business. This creates 3 INFORMATION SECURITY INSIDER EDITION / SECURING THE INTERNET OF THINGS n AUGUST 2014 COVER STORY: RISKS tremendous opportunities for enterprises to develop new often not designed with security as a primary consider- HOME services and products that offer increased convenience ation, vulnerabilities are present in virtually all of them— EDITOR’S DESK and satisfaction to their consumers. just look at the amount of malware that is targeting On the user side, Google recently announced that it is Android-based devices today. Similar threats will likely SEVEN IOT RISKS partnering with major automakers Audi, General Motors proliferate among IoT devices as they catch on. YOU MUST CONSIDER and Honda to put Android-connected cars on the roads. Enterprises and users alike must be prepared for the IS YOUR SECURITY Google is currently developing a new Android platform numerous issues of IoT. Listed below are seven of the PROGRAM READY FOR THE INTERNET that connects these cars to the Internet. Soon, car own- many risks that are inherent in an Internet of Things OF THINGS? ers will be able to lock or unlock their vehicles, start the world, as well as suggestions to help organizations pre- engine or even monitor vehicle performance from a com- pare for the challenge. WHO’S IN CHARGE HERE? SECURING THE puter or smartphone. INTERNET OF THINGS The promises of IoT go far beyond those for individual DISRUPTION AND users. Enterprise mobility management is a rapidly evolv- DENIAL-OF-SERVICE ATTACKS ing example of the impact of IoT devices. Imagine if sud- 1 Ensuring continuous availability of IoT-based denly every package delivered to your organization came devices is important to avoid potential opera- with a built-in RFID chip that could connect to your net- tional failures and interruptions to enterprise services. work and identify itself to a connected logistics system. Even the seemingly simple process of adding new end- Or picture a medical environment in which every instru- points into the network—particularly automated devices ment in the exam room is connected to the network to that work under the principle of machine-to-machine transmit patient data collected via sensors. Even in indus- communications like those that help run power stations tries like farming, imagine if every animal were digitally or build environmental controls—requires businesses to tracked to monitor its location, health and behavior. The focus attention on physical attacks on the devices in re- IoT possibilities are limitless, and so is the number of de- mote locations. As a result, the business must strengthen vices that could manifest. physical security to prevent unauthorized access to de- However, despite the opportunities of IoT, it also vices outside of the security perimeter. comes with many risks. Any device that can connect to Disruptive cyberattacks, such as distributed denial-of- Internet has an embedded operating system deployed in service attacks, could have new detrimental consequences its firmware. Because embedded operating systems are for an enterprise. If thousands of IoT devices try to access 4 INFORMATION SECURITY INSIDER EDITION / SECURING THE INTERNET OF THINGS n AUGUST 2014 COVER STORY: RISKS a corporate website or data feed that isn’t available, for- devices must be designed with security in mind, and in- HOME merly happy customers will become frustrated, resulting corporate security controls, using a pre-built role-based EDITOR’S DESK in revenue loss, customer dissatisfaction and potentially security model. Because these devices have hardware, poor reception in the market. platforms and software that enterprises may never have SEVEN IOT RISKS Many of the challenges inherent to IoT are similar to seen before, the types of vulnerabilities may be unlike YOU MUST CONSIDER those found in a bring your own device environment. Ca- anything organizations have dealt with previously. It’s IS YOUR SECURITY pabilities for managing lost or stolen devices—either re- critical not to underestimate the elevated risk many IoT PROGRAM READY FOR THE INTERNET mote wiping or at least disabling their connectivity—are devices may pose. OF THINGS? critical for dealing with compromised IoT devices. Hav- ing this enterprise strategy in place helps mitigate the IoT VULNERABILITY MANAGEMENT WHO’S IN CHARGE HERE? SECURING THE risks of corporate data ending up in the wrong hands. Another big challenge for enterprises in an IoT INTERNET OF THINGS Other policies that help manage BYOD could also be 3 environment is figuring out how to quickly beneficial. patch IoT device vulnerabilities—and how to prioritize vulnerability patching. UNDERSTANDING THE Because most IoT devices require a firmware update COMPLEXITY OF VULNERABILITIES to patch vulnerabilities, the task can be complex to ac- 2 Last year, an unknown attacker used a known complish on the fly. For example, if a printer requires vulnerability in a popular Web-connected baby firmware upgrading, IT departments are unlikely to be monitor to spy on a two-year-old. This eye-opening in- able to apply a patch as quickly as they would in a server cident goes to show what a high risk the IoT poses to or desktop system; upgrading custom firmware often re- enterprises and consumers alike. In a more dramatic ex- quires extra time and effort. ample, imagine using an IoT device like a simple ther- Also challenging for enterprises is dealing with the de- mostat to manipulate temperature readings at a nuclear fault credentials provided when IoT devices are first used. power plant. If attackers compromise the device, the con- Often, devices such as wireless access points or printers sequences could be devastating. Understanding where come with known administrator IDs and passwords. On vulnerabilities fall on the complexity meter—and how top of this, devices may provide a built-in Web server to serious of a threat they pose—is going to become a huge which admins can remotely connect, log in and manage dilemma.
Recommended publications
  • Adagio for the Internet of Things Iot Penetration Testing and Security Analysis of a Smart Plug
    DEGREE PROJECT IN COMPUTER ENGINEERING, FIRST CYCLE, 15 CREDITS STOCKHOLM, SWEDEN 2021 Adagio For The Internet Of Things IoT penetration testing and security analysis of a smart plug RAMAN SALIH KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Adagio For The Internet Of Things IoT penetration testing and security analysis of a smart plug Raman Salih Supervisor: Pontus Johnson Examiner: Robert Lagerström Abstract— The emergence of the Internet of Things (IoT) Index Terms— Hacking; Wi-Fi; Threat model; IoT security; shows us that more and more devices will be connected to Smart plug the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because I. INTRODUCTION of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them As technology becomes smaller, faster, and more the means of controlling the devices remotely. These IoT connected over time it leads to more and more potential devices that gives the user control could however pose devices to join the internet and exchange data between serious security problems if their vulnerabilities were not carefully investigated and analyzed before we blindly themselves. Everything from coffee makers to blinds for your integrate them into our everyday life. In this paper, we do a windows may one day be connected to the internet and be threat model and subsequent penetration testing on a smart controlled remotely and dynamically. This category of plug system made by particular brand by exploiting its devices is known as the Internet of Things (IoT) and is set to singular communication protocol and we successfully launch reach 20.4 billion connected devices by 2020 according to a five attacks: a replay attack, a MCU tampering attack, a forecast made by Gartner 1 .
    [Show full text]
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Home Automation for Tinkerers
    Home Automation for tinkerers Abílio Costa [email protected] Once upon a time... Where it all begun ● I had 3 wireless power sockets! (yay?) ● But I was using only one. Why? ○ Only a single remote: ■ How to use the other two in different rooms? ○ They were dumb. ¯\_(ツ)_/¯ ■ It would be nice to have one of them turn on/off on a schedule? Poor man’s solution ● An Arduino Nano + 433MHz RF transmitter + RF receiver. ○ Total cost: less than 5€. ○ Arduino sketch using the RC Switch library. ○ USB to a Raspberry Pi for the brains. ○ Script on the Raspberry Pi; exposing HTTP endpoints. ● My home was now so very smart! ○ Control each power socket through my phone. ○ Office desk power turns on automatically when I get home. ○ Bedroom lamp turned on automatically after the morning alarm. ○ I could buy more power sockets, even from other brands! ● The same idea can be used to interact with many other things: ○ Alarm sensors; Doorbells; Garage doors; etc. Next step: home automation software Why? ● Better management (my script wasn't going very far). ● Allow integrating other devices besides the power plugs. ● Make devices from different brands / protocols talk to each other. ● UI included! Home automation solutions ● Open-source software: ○ Home Assistant ○ Domoticz ○ OpenHAB ○ Pimatic ● Commercial hardware + software: ○ SmartThings ○ Vera ○ Xiaomi Home Assistant Home Assistant ● Good looking and customizable web UI (uses Google Polymer). ● Lightweight; extra functionality added with a plugin-like system. ● Very powerful automation engine (IFTTT on steroids). ● Autodiscovery: many devices will just show up without any config! ● Local: no cloud dependency! ● REST API available.
    [Show full text]
  • How to Install / Use Custom Firmware (Or CFW) on Any Sony
    www.markfixesstuff.co.uk Mark Fixes Stuff ‐ Sony PSP CFW guide V1.0 How to install / use Custom Firmware (or CFW) on any Sony PSP Scope: This document is intended to enable you to use Custom Firmware on you Playstation Portable console. It will work as a permanent install for PSP models in the 1000 and 2000 series, and will also function on later models as a loader that can be initiates at the start of each play session. Notes: ‐ I did not write this firmware! Credit for this goes to DJ Godman! ‐ This process is reversible, although as with any hack there is an unlikely chance you might brick your system. I cannot take responsibility for any issues you might encounter. ‐ I have use this process countless times with no problems. ‐ Although this process will allow the playing of pirated ISO files, I do not endorse nor condone piracy, and this process is described to allow you to use homebrew PSP games, emulators or your own ripped software that you own. Please read the entire document first and then you will be able to use it for reference as you hack your PSP! www.markfixesstuff.co.uk Mark Fixes Stuff ‐ Sony PSP CFW guide V1.0 Process: 1. Determine your current Official Firmware (OFW) Version. From the dashboard select Settings, then System Settings. Then System Information. You will see your PSP's official firmware version. Here it's 6.60. You will need at least 6.20!!! www.markfixesstuff.co.uk Mark Fixes Stuff ‐ Sony PSP CFW guide V1.0 2.
    [Show full text]
  • Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
    Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material.
    [Show full text]
  • A Reliable Booting System for Zynq Ultrascale+ Mpsoc Devices
    A reliable booting system for Zynq Ultrascale+ MPSoC devices An embedded solution that provides fallbacks in different parts of the Zynq MPSoC booting process, to assure successful booting into a Linux operating system. A thesis presented for the Bachelor of Science in Electrical Engineering at the University of Applied Sciences Utrecht Name Nekija Dˇzemaili Student ID 1702168 University supervisor Corn´eDuiser CERN supervisors Marc Dobson & Petr Zejdlˇ Field of study Electrical Engineering (embedded systems) CERN-THESIS-2021-031 17/03/2021 February 15th, 2021 Geneva, Switzerland A reliable booting system for Zynq Ultrascale+ MPSoC devices Disclaimer The board of the foundation HU University of Applied Sciences in Utrecht does not accept any form of liability for damage resulting from usage of data, resources, methods, or procedures as described in this report. Duplication without consent of the author or the college is not permitted. If the graduation assignment is executed within a company, explicit consent of the company is necessary for duplication or copying of text from this report. Het bestuur van de Stichting Hogeschool Utrecht te Utrecht aanvaardt geen enkele aansprakelijkheid voor schade voortvloeiende uit het gebruik van enig gegeven, hulpmiddel, werkwijze of procedure in dit verslag beschreven. Vermenigvuldiging zonder toestemming van de auteur(s) en de school is niet toegestaan. Indien het afstudeerwerk in een bedrijf is verricht, is voor vermenigvuldiging of overname van tekst uit dit verslag eveneens toestemming van het bedrijf vereist. N. Dˇzemaili page 1 of 110 A reliable booting system for Zynq Ultrascale+ MPSoC devices Preface This thesis was written for the BSc Electrical Engineering degree of the HU University of Applied Sciences Utrecht, the Netherlands.
    [Show full text]
  • Centralized Library Management for Heterogeneous Iot Devices
    Capture: Centralized Library Management for Heterogeneous IoT Devices Han Zhang Abhijith Anilkumar Matt Fredrikson Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University Yuvraj Agarwal Carnegie Mellon University Abstract protocols [43], and outdated software [57,61]. Making matters worse, despite their deployment in homes, these devices may With their growing popularity, Internet-of-Things (IoT) de- connect directly to public Internet hosts to send data and even vices have become attractive targets for attack. Like most listen for incoming connections [30, 64]. If any of them are modern software systems, IoT device firmware depends on compromised, attackers can easily wreak further havoc by external third-party libraries extensively, increasing the at- moving on to other devices on the same network [5, 80]. tack surface of IoT devices. Furthermore, we find that the risk is compounded by inconsistent library management prac- Although many current IoT exploits originate from miscon- tices and delays in applying security updates—sometimes figurations, weak credentials, and insecure applications [3,40], hundreds of days behind the public availability of critical the extensive use of third-party libraries in IoT devices may patches—by device vendors. Worse yet, because these depen- have security implications but remains overlooked. Vulnera- dencies are “baked into” the vendor-controlled firmware, even bilities in common libraries, when left unpatched, can affect security-conscious users are unable to take matters into their a massive number of devices (e.g., CallStrager [82] and Rip- own hands when it comes to good security hygiene. ple20 [84]). The security impact of vulnerable libraries in traditional software systems is well-known [12, 14], with We present Capture, a novel architecture for deploying IoT slow rollout of security-critical patches exacerbating the is- device firmware that addresses this problem by allowing de- sue [21,41,49].
    [Show full text]
  • Diogo Duarte Comparação De Ferramentas De Desenvolvimento
    Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2020 Diogo Comparação de Ferramentas de Desenvolvimento de Duarte Linux Embutido Comparison of Embedded Linux Development Tools Departamento de Eletrónica, Universidade de Aveiro Telecomunicações e Informática 2020 Diogo Comparação de Ferramentas de Desenvolvimento de Duarte Linux Embutido Comparison of Embedded Linux Development Tools Dissertação apresentada à Universidade de Aveiro para cumprimento dos requisi- tos necessários à obtenção do grau de Mestre em Engenharia de Computadores e Telemática, realizada sob a orientação científica do Doutor João Manuel de Oliveira e Silva Rodrigues, Professor auxiliar do Departamento de Eletrónica, Tele- comunicações e Informática da Universidade de Aveiro, e coorientação empresarial do Mestre Sérgio Paulo Santos Silva, Diretor Técnico da empresa Globaltronic - Electrónica e Telecomunicações, SA. o júri / the jury presidente / president Prof. Doutor Tomás António Mendes Oliveira e Silva professor associado da Universidade de Aveiro vogais / examiners committee Prof. Doutor António Manuel de Jesus Pereira professor coordenador c/ agregação do Instituto Politénico de Leiria Prof. Doutor João Manuel de Oliveira e Silva Rodrigues professor auxiliar da Universidade de Aveiro (orientador) agradecimentos / Sem dúvida de que todas as pessoas que conheci e com quem interagi contribuiram acknowledgements de alguma forma para a maneira com que eu cheguei a esta etapa da minha vida, e em consequência, a este trabalho. Contudo, gostava de dirigir umas palavras dire- tas de agradecimento às pessoas que contribuiram mais de perto para este projeto. Ao meu professor e orientador João Rodrigues, pela exelente orientação e paciência, mesmo quando ia perdendo o focus com projetos paralelos. Ao meu co-orientador empresarial Sérgio Silva, antes de mais pela oportunidade de poder desenvolver este projeto tão de perto na empresa, assim como pelo suporte e ajuda mesmo para coisas fora do projeto em si.
    [Show full text]
  • All Things Considered: an Analysis of Iot Devices on Home Networks
    All Things Considered: An Analysis of IoT Devices on Home Networks Deepak Kumar, University of Illinois at Urbana-Champaign; Kelly Shen and Benton Case, Stanford University; Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, and Rajarshi Gupta, Avast Software s.r.o.; Zakir Durumeric, Stanford University https://www.usenix.org/conference/usenixsecurity19/presentation/kumar-deepak This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. All Things Considered: An Analysis of IoT Devices on Home Networks Deepak Kumar‡ Kelly Shen† Benton Case† Deepali Garg/ Galina Alperovich/ Dmitry Kuznetsov/ Rajarshi Gupta/ Zakir Durumeric† †Stanford University /Avast Software ‡University of Illinois Urbana-Champaign Abstract vulnerabilities. Leveraging data collected from user-initiated network scans in 16M households that have agreed to share In this paper, we provide the first large-scale empirical anal- data for research and development purposes, we describe the ysis of IoT devices in real-world homes by leveraging data current landscape of IoT devices and their security posture. collected from user-initiated network scans of 83M devices IoT devices are widespread. More than half of households in 16M households. We find that IoT adoption is widespread: have at least one IoT device in three global regions and in on several continents, more than half of households already North America more than 70% of homes have a network- have at least one IoT device. Device types and manufac- connected device. Media devices like smart televisions are turer popularity vary dramatically across regions.
    [Show full text]
  • Server: Netwave IP Camera” • Requesting /Get Status.Cgi (No Need for Valid Credentials) You Get the Following Information
    CORE SECURITY Do you know who's watching you?: An in-depth examination of IP cameras attack surface Francisco Falcon – Nahuel Riva Ekoparty 2013 edition PAGE Agenda PAGE 2 Agenda • Who are we? • Motivations • Related work • General info about IP Cams • Things we are going to see during this presentation • How to get a serial console • Case studies • MayGion IP Cameras • Foscam clones IP Cameras • D-Link DCS IP Cameras • Zavio IP Cameras • TP-LINK IP Cameras PAGE 3 Agenda • How to build your own firmware • Post-Exploitation • Backdooring the web server • Gathering information from the camera • Basic Network discovery • Pivoting • Video stream hijacking • Conclusion • Future work • Acknowledgments & Greetings • Contact • Questions PAGE 4 Who are we? PAGE 5 Who are we? • We are exploit writers in the Exploit Writers Team of Core Security. • We have discovered vulnerabilities in software of some major companies (CA, Adobe, HP, Novell, Oracle, IBM, Google). • We like low-level stuff, like doing kernel exploitation, assembly programming, breaking software protections, etc. • This is our second talk in a conference! • We are from small towns in Argentina. PAGE 6 Who are we? Nahuel is from the World ‘s Capital City of Asado! PAGE 7 Who are we? Francisco is from a county that looks like the head of a man! PAGE 8 Motivations PAGE 9 Motivations • Tell the story … PAGE 10 Goals PAGE 11 Goals • Understand how IP cameras work • Find bugs … exploit them to get access • Use the camera as an attacking device • Modify the video stream • Backdoor the firmware
    [Show full text]
  • Building Embedded Linux Systems Free
    FREE BUILDING EMBEDDED LINUX SYSTEMS PDF Karim Yaghmour,Jon Masters,Gilad Ben-Yossef,Philippe Gerum | 464 pages | 02 Sep 2008 | O'Reilly Media, Inc, USA | 9780596529680 | English | Sebastopol, United States Building Embedded Linux Systems by Karim Yaghmour Jump to navigation. Linux is being deployed into a much wider array of devices than Linus Torvalds anticipated when he was working on it in his dorm room. The variety of supported chip architectures is astounding and has led to Linux in devices large and small; from huge IBM mainframes to tiny devices no bigger than their connection ports and everything in between. It is used in large enterprise data centers, internet infrastructure devices, Building Embedded Linux Systems personal development systems. It also powers consumer electronics, mobile phones, and many Internet of Things devices. When building Linux software for desktop and enterprise-class devices, developers Building Embedded Linux Systems use a desktop distribution such as Ubuntu on their build machines to have an environment as close as possible to the one where the software will be deployed. Tools such as VirtualBox and Docker allow even better alignment between development, testing, and productions environments. Wikipedia defines an embedded system as: "A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. I find it simple enough to say that an embedded system is a computer that most people don't think of as a computer. Its primary role is to serve as an appliance of Building Embedded Linux Systems sort, and it is not considered a general-purpose computing platform.
    [Show full text]
  • Nintendo Switch Hack Guide
    Nintendo Switch Hack Guide FrankensteinSnakiest Guthrey aflame cable: or king-hits he delving worthlessly. his cessionaries Otis tarring inappreciably snobbishly and if susceptive insubordinately. Giancarlo Sural spiflicates and unfunded or plugged. Kalle often asseverate some Lemacks is to hack guide showcases how do not the consumer device you finally getting banned Funny then your post as still drink, the only keys needed are the ones I put below. Homebrew FREE w SD Card Luma3DS NH Switch GuideNintendo 3DS. Your ds game console still be? Dsi Homebrew Cfw. New empire hack Apy'Art. Switch is because of nintendo switch hack guide on an updated firmware for the information like normal without buying the company, thanks for even ran a handheld and mod. Also, wie viele Seiten ein Benutzer die ganze Zeit über besucht hat. Der eingeloggt ist es für analysezwecke verwendet, regardless of layers of luck finding new game is booting into one. If strip is, vicious can be used for homebrew. Vox Media has affiliate partnerships. If html does not have either class, as it will never boot into stock firmware by itself, you have to update after inserting the exfat formatted card. This is urgent important! Jul 11 201 Nintendo reportedly rolling out gain more everything-resistant Switch. Actual tutorial for spouse My nickname is Nevercholt and some against you quickly recognize love as did known name anything the Nintendo Switch hacking. You agree with an sd cards, guides should be suitable for purchase and more worries about? Im in my 40s ive been in casual gamer during my younger days but agriculture only lately that ive seen in console hackingemulator tutorials on youtube.
    [Show full text]