Top Banner
Ethical Hacking v10 Module 20 - IoT Hacking
60

Ethical Hacking v10 Module 20 - IoT Hacking

Mar 17, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical Hacking v10 Module 20 - IoT Hacking

Ethical Hacking v10 Module 20 - IoT Hacking

Page 2: Ethical Hacking v10 Module 20 - IoT Hacking

Goals• Understand IoT concepts• Describe IoT Threats and Attacks• Understand IoT Hacking Methodology• Describe IoT Hacking Tools• Describe IoT Hacking Countermeasures• List IoT Security Tools• Describe IoT Penetration Testing

Page 3: Ethical Hacking v10 Module 20 - IoT Hacking

Module 20.0 IoT Hacking• 20.1 IoT Concepts• 20.2 IoT Vulnerabilities and Attacks• 20.3 IoT Hacking Methodology and Tools• 20.4 IoT Hacking Countermeasures• 20.5 IoT Penetration Testing

Page 4: Ethical Hacking v10 Module 20 - IoT Hacking

20.1 IoTConcepts

Page 5: Ethical Hacking v10 Module 20 - IoT Hacking

What is IoT?

• Internet of Things• Internet of Everything• Anything that can be connected to

a network:• Industrial devices• Embedded devices• Wearable devices• Healthcare devices• Home devices• Buildings, HVACs, Alarm systems

Page 6: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Application Areas and Devices

Service Sector Application Group Location Devices

Buildings • Commercial• Industrial

• Office• Education• Retail• Hospitality• Healthcare• Airports• Stadiums

• HVAF• Transport• Fire & Safety• Lighting• Security• Access

Energy • Supply/Demand• Oil/Gas• Alternative

• Power generators• Transportation &

Distribution• Low Voltage• Power Quality• Energy management• Solar & Windmills• Electrochemical• Rigs, derricks, pumps• Pipelines

• Turbines• Windmills• UPS• Batteries• Generators• Meters• Drills• Fuel Cells

Page 7: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Application Areas and Devices (cont’d)

Service Sector Application Group Location Devices

Consumer and Home • Infrastructure• Awareness & Safety• Convenience and

Entertainment

• Wiring, networkaccess, energy management

• Security/Alerts, Fire safety, Elderly, Children, Power protection

• HVAC/Climate, Lighting, Appliances, Entertainment

• Cameras, power systems, e-Readers, dishwashers, desktop computers, washers/dryers, meters, lights, TVs, MP3 players, Gaming consoles, alarms

Healthcare and Life Sciences

• Care• In Vivo/Home• Research

• Hospital, ER, Mobile, PoC, Clinic, Labs, Doctor’s office

• Implants, Home, monitoring systems

• Drug discovery, diagnostics, labs

• MRI, PDAs, Implants, health monitors, Surgical Equipment, Pumps, Monitors, Telemedicine

Page 8: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Application Areas and Devices (cont’d)Service Sector Application Group Location Devices

Transportation • Non-Vehicular• Vehicles• Transportation

Systems

• Air, Rail, Marine• Consumer,

Commercial, Construction, Off-Highway

• Tools, traffic management, navigation

• Vehicles, lights, ships, planes, signage, tolls

Industrial • Resource automation• Fluid/Processes• Converting/Discrete• Distribution

• Mining, irrigation,agriculture, woodland

• Petrochemical, hydro, carbons, food, beverage

• Metals, papers, rubber/plastic

• Metalworking• Electronics• Assembly/testing

• Pumps, valves, vats, conveyors, fabrication, assembly/packaging, vessels, tanks

Page 9: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Application Areas and Devices (cont’d)Service Sector Application Group Location Devices

Retail • Specialty• Hospitality• Stores

• Fuel stations, Gaming, Bowling, Cinemas, Discos, Special Events,

• Hotel restaurants, bars, cafes, clubs

• Supermarkets, shopping centers, single site, distribution

• POS Terminals, Tags, Cash Registers, Vending machines, Signs, inventory control

Security / Public Safety • Surveillance• Equipment• Tracking• Public Infrastructure

• Radar/satellite,environmental, military, unmanned, fixed

• Human, animal, postal, food, health, beverage

• Water treatment, building, environmental equipment, personnel, police, fire, regulatory

• Tanks, fighter jets, battlefields, jeeps, cars, ambulance, Homeland security, Environment, Monitoring

Page 10: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Application Areas and Devices (cont’d)

Service Sector Application Group Location Devices

IT and Networks • Public• Enterprise

• Services, e-Commerce,data centers, mobile carriers, ISPs

• Servers, storage, PCs,routers, switches, PBXs

Page 11: Ethical Hacking v10 Module 20 - IoT Hacking

How IoT Works

• Sensing Technology• Gathers telemetry

• IoT Gateway• Connects device to the Internet• Cloud services• Cloud-based storage

• Cloud Server/Data Storage• Connect through web services

• Remote Control• Mobile App

Page 12: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Architecture

Page 13: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Architecture

• Application Layer• Delivery of services to

end users• Middleware Layer

• Sits between application layer and hardware layer

• Data management• Data analysis and

aggregation• Data filtering• Device information

discovery• Access control

• Internet Layer• Device-to-device• Device-to-Cloud• Device-to-Gateway• Back-end Data-sharing

• Access Gateway Layer• Connection between

device and client• Very first data handling• Message routing,

identification, subscribing• Edge Technology Layer

• Devices• RFID tags• Sensors

Page 14: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Technologies and Protocols

Short-Range Wireless Communications

Medium-Range Wireless Communications

Long-Range Wireless Communications

Wired Communications

IoT Operating Systems

• Bluetooth Low Energy

• Light-Fidelity (Li-Fi)

• NFC• QR

Codes/Barcodes• RFID• Thread• Wi-Fi• Wi-Fi Direct• Z-Wave• ZigBee

• Ha-Low• LTE-Advanced

• Low-power WAN (LPWAN)

• Very Small Aperture Terminal (VSAT

• Cellular

• Ethernet• Multimedia over

Coax Alliance (MoCA)

• Power-line Communication (PLC)

• RIOT OS• ARM embedded

OS• RealSense OS X• Nucleus RTOS• Brillo• Contiki• Zephyr• Ubuntu Core• Integrity RTOS• Apache Mynewt• Windows 10 IoT

Core

Page 15: Ethical Hacking v10 Module 20 - IoT Hacking

Challenges of IoT

• Lack of security and privacy• Most devices are connected to the Internet• They contain important and confidential data• Lack even basic security

• Vulnerable web interfaces• Many devices have embedded web servers that make them vulnerable

• Legal regulatory and rights issues• No existing laws that address interconnection of IoT devices

• Default, weak, or hardcoded credentials• Clear text protocols• Unnecessary ports

Page 16: Ethical Hacking v10 Module 20 - IoT Hacking

Challenges of IoT (cont’d)

• Coding errors• buffer overflows• SQL injection

• Storage issues• Small storage capacity, yet limitless data collection

• Difficult to update firmware and OS• Interoperability• Inability of manufacturers to test APIs using common methods and mechanisms

• Physical theft and tampering• Lack of vendor support for fixing vulnerabilities• Emerging economy and development issues

• Policy makers have yet to catch up

Page 17: Ethical Hacking v10 Module 20 - IoT Hacking

20.2 IoTVulnerabilities

and Attacks

Page 18: Ethical Hacking v10 Module 20 - IoT Hacking

OWASP Top 10 IoT Vulnerabilities

• Insecure web interface• Insufficient Authentication/Authorization• Insecure Network Services• Lack of Transport Encryption/Integrity Verification• Privacy Concerns• Insecure Cloud Interface• Insecure Mobile Interface• Insufficient Security Configurability• Insecure Software/Firmware• Poor Physical Security

Page 19: Ethical Hacking v10 Module 20 - IoT Hacking

#1 Insecure Web Interface

Page 20: Ethical Hacking v10 Module 20 - IoT Hacking

#2 Insufficient Authentication/Authorization

Page 21: Ethical Hacking v10 Module 20 - IoT Hacking

#3 Insecure Network Services

Page 22: Ethical Hacking v10 Module 20 - IoT Hacking

#4 Lack of Transport Encryption/Integrity Verification

Page 23: Ethical Hacking v10 Module 20 - IoT Hacking

#5 Privacy Concerns

Page 24: Ethical Hacking v10 Module 20 - IoT Hacking

#6 Insecure Cloud Interface

Page 25: Ethical Hacking v10 Module 20 - IoT Hacking

#7 Insecure Mobile Interface

Page 26: Ethical Hacking v10 Module 20 - IoT Hacking

#8 Insufficient Security Configurability

Page 27: Ethical Hacking v10 Module 20 - IoT Hacking

#9 Insecure Software/Firmware

Page 28: Ethical Hacking v10 Module 20 - IoT Hacking

#10 Poor Physical Security

Page 29: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces

• Device memory• Clear text credentials• Third party credentials• Vulnerable encryption keys

• Ecosystem access control • Implicit trust between components• Weak restrictions allow enrolling malicious devices

• Device physical interfaces• Hidden OS vulnerabilities can be exposed if firmware is accessed• Possible user access to administrative features/CLI

Page 30: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces

• Device web interface• SQL injection• XSS• XSRF• Weak passwords• Absence of account lockout• Known default credentials

Page 31: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces (cont’d)

• Device firmware• Hard coded credentials• Leak of sensitive data via URLs• Poorly protected encryption keys

• Device network services• Standard network risks (information disclosure, DoS, UPnP, UDP services

Page 32: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces (cont’d)

• Administrative interface• SQL injection• XSS/XSRF• Username enumeration and default credentials• Weak passwords• Inability to wipe device

• Local data storage• Unencrypted data• Data encryption keys are discoverable• Lack of data integrity checks

Page 33: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces (cont’d)

• Cloud web interface• Weak or missing transport encryption• All of the common cloud/web issues

• Update mechanism• Updates sent without encryption• Updates not signed• No mechanism for updates

• Third-party back end APIs• Unencrypted PII/PHI• Device information leakage

• Mobile applications• Implicitly trusted by device or cloud• All of the common mobile app issues

Page 34: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Mobile App Attack Surface Example

Page 35: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Attack Surfaces (cont’d)

• Vendor back end APIs• Inherent trust of cloud or mobile app• Weak authentication/authorization/access control

• Ecosystem communications• Vulnerable medical devices can put a patient’s life at risk• Vulnerable medical devices are connected to many monitors and sensors• Potential points of entry into the hospital network• Lack of verification of any commands• Improperly de-commissioned devices that are still connected to the network

• Network traffic• Absence of any robust LAN security

Page 36: Ethical Hacking v10 Module 20 - IoT Hacking

Common IoT Threats

• DDoS• Exploiting HVAC• Rolling code• BlueBorne Attack• Jamming• Remote access / backdoor• Remote accessing using

telnet• Sybil attack

• Exploit kits• MITM• Replay • Forged malicious devices• Side channel attack• Ransomware attack

Page 37: Ethical Hacking v10 Module 20 - IoT Hacking

20.3 IoT Hacking Methodology and

Tools

Page 38: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Device Hacking

• Information gathering • Shodan.io• Censys.io• Thingful.net• Z-Wave Sniffer• CloudShark• Ubiqua Protocol Analyzer• Wireshark• Multiping• Nmap• RIoT Vulnerability Scanner• Foren6

Page 39: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Device Hacking (cont’d)

• Vulnerability Scanning• beSTORM fuzzer• Metasploit• IoTsploit• IoTSeeker• Bitdefender Home Scanner• IoTInspector

Page 40: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Device Hacking (cont’d)

• Attack• RFCrack - obtain vehicle unlock rolling code• Attify Zigbee - attack Zigbee devices• HackRF One - BlueBorne attack (replay, fuzzing, jamming)• Firmalyzer Enterprise - automated security assessment• ChipWhisperer• Rfcat-rolljam• KillerBee• GATTack.io• JTAGULATOR• Firmware Analysis Toolkit

Page 41: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Device Hacking (cont’d)

• Gain Remote Access• Telnet

• Maintain Access• Firmware Mod Kit -

Exploit firmware

Page 42: Ethical Hacking v10 Module 20 - IoT Hacking

20.4 IoT Hacking Countermeasures

Page 43: Ethical Hacking v10 Module 20 - IoT Hacking

Defend Against IoT Hacking

• Approach security as a unified, integrated, holistic system• Disable guest and demo accounts if enabled• Implement any existing lockout feature• Implement the strongest available authentication mechanism• Local control system networks and devices behind firewalls, and

isolate them from the business network• Implement IDS/IPS on the network• Implement end-to-end encryption using PKI when possible• Use VPNs when possible

Page 44: Ethical Hacking v10 Module 20 - IoT Hacking

Defend Against IoT Hacking (cont’d)

• Only allow trusted IP addresses to access the device from the Internet• Disable telnet (TCP 23)• Disable UPnP ports on routers• Protect devices from physical tampering• Patch vulnerabilities and update firmware if available• Monitor traffic on port 48101 as infected devices tend to use this port

Page 45: Ethical Hacking v10 Module 20 - IoT Hacking

Defend Against IoT Hacking (cont’d)

• Ensure that a vehicle has only one identity• Implement data privacy and protection as much as possible• Implement data authentication, authenticity, and encryption

wherever possible

Page 46: Ethical Hacking v10 Module 20 - IoT Hacking

OWASP Top 10 IoT Vulnerabilities Solutions

Page 47: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Security Tools

• SeaCat.io• DigiCert IoT Security Solution• Pulse: IoT Security Platform• Symantec IoT Security• Google Cloud IoT• Net-Shield• Trustwave Endpoint Protection

Suite• NSFOCUS ADS

• Darktrace• Noddos• Norton Core• Cisco IoT Threat Defense• AWS IoT Device Defender• Zvelo0 IoT Security Solution• Cisco Umbrella• Carwall• Bayshore Industrial Cyber Protection

Platform

Page 48: Ethical Hacking v10 Module 20 - IoT Hacking

20.5 IoTPenetration

Testing

Page 49: Ethical Hacking v10 Module 20 - IoT Hacking

1. Discover IoT Devices

• Shodan• Censys• Thingful• Multiping

Page 50: Ethical Hacking v10 Module 20 - IoT Hacking

2. Perform Hardware Analysis

• Evaluate physical and hardware components• See if you can connect to JTAG, SWD or USB interfaces• Use tools like:• JTAG Dongle• Digital Storage Oscilloscope• Software Defined Radio

Page 51: Ethical Hacking v10 Module 20 - IoT Hacking

3. Perform Firmware and OS Analysis

• See if the firmware is cryptographically signed, and has an update mechanism• Use tools such as:• IoTInspector• Binwalk• Firmware Mod Kit• Firmalyzer Enterprise

Page 52: Ethical Hacking v10 Module 20 - IoT Hacking

4. Conduct Wireless Protocol Analysis

• See if you can connect using:• ZigBee• Bluetooth LE• 6LoWPAN• Attempt to perform replay and MITM attacks• Attempt to gain unauthorized network access• Try to fuzz test the device

• Use tools such as:• Ubiqua Protocol Analyzer• Perytons Protocol Analyzer• Wireshark• SoapUI Pro• Attify Zigbee• Z3sec

Page 53: Ethical Hacking v10 Module 20 - IoT Hacking

Attify Zigbee Example

Page 54: Ethical Hacking v10 Module 20 - IoT Hacking

5. Conduct Mobile App Testing

• Attempt to penetrate mobile apps that connect with the IoT device• Try to access storage, and bypass authentication and authorization• Use tools such as:• X-Ray• Threat Scan• Norton Halt exploit defender• Shellshock Scanner - Zimperium• Hackode• BlueBorne• EternalBlue Vulnerability Scanner

Page 55: Ethical Hacking v10 Module 20 - IoT Hacking

Blueborne Example

Page 56: Ethical Hacking v10 Module 20 - IoT Hacking

6. Perform Web App Testing

• Try typical attacks against a web app including buffer overflows, SQL injection, bypassing authentication, XSS/XSRF, code execution• Use tools such as:• SAUCE LABS Functional Testing• PowerSploit• Kali Linux• WAFNinja• Arachni

Page 57: Ethical Hacking v10 Module 20 - IoT Hacking

WAF Ninja Example

Page 58: Ethical Hacking v10 Module 20 - IoT Hacking

7. Perform Cloud Services Testing

• Try to gain unauthorized access to cloud services for the IoT device• Use tools such as:

• ZEPHYR• SOASTA CloudTest• LoadStorm PRO• BlazeMeter• Nexpose

Page 59: Ethical Hacking v10 Module 20 - IoT Hacking

8. Document All Findings

• Analyze all findings• Make any recommendations• Provide all findings in a report

Page 60: Ethical Hacking v10 Module 20 - IoT Hacking

IoT Hacking Review

• The Internet of Things is the connection of any type of device, industrial, scientific, home/consumer, public health and safety, etc. to a network, and ultimate the Internet• IoT devices may require a gateway to

connect them to the cloud• Ultimately IoT devices can be remotely

accessed and managed across a network and often the cloud• Most IoT devices have few if any

security features• There are currently few or no laws

governing IoT devices and the data they process• IoT is a new, uncharted frontier in

cyber security