SlideShare une entreprise Scribd logo
1  sur  49
Securing IoT in the
Enterprise
Daniel Miessler
May 2017
Securing IoT in the
Enterprise
Daniel Miessler, IOActive
May 2017
About
3
- Infosec for around 18 years
- Mostly technical testing and enterprise consulting
- Net / app / web / mobile / IoT
- Director of Advisory Services for IOActive
- I do a weekly show on infosec, technology, humans
- Reading, writing, table tennis
- Wrote a book: “The Real Internet of Things”
- @danielmiessler
Discuss
4
- A functional definition of IoT
- The IoT Attack Surface
- Securing IoT in the Enterprise
- IoT and Ransomware
What is IoT
5
- Lots of definitions out there.
- Some are based on connectivity.
- Some require “embedded”.
- “OXFORD(ish): An extension of the
Internet where everyday objects have
network connectivity, allowing them to
send and receive data.”
Attack Surface
6
What do?
7
IoT Security != Device
Security
8
What they think it is…
IoT Security != Device
Security
9
IoT Security != Device
Security
10
IoT Security != Device
Security
11
OWASP IoT Security
12
OWASP IoT Security
13
• Attack surfaces
• Vulnerabilities
• Medical Devices
• Firmware Analysis
• IoT Event Logging
• ICS / SCADA
OWASP IoT Security
14
• Ecosystem (general)
• Device Memory
• Device Physical Interfaces
• Device Web Interface
• Device Firmware
• Device Network Services
• Administrative Interface
• Local Data Storage
• Cloud Web Interface
• Third-party Backend APIs
• Update Mechanism
• Mobile Application
• Vendor Backend APIs
• Ecosystem Communication
• Network Traffic
• Privacy
• Sensors
IoT Attack Surfaces
15
IoT Attack Surfaces
16
IoT Attack Surfaces
17
IoT Attack Surfaces
18
https://github.com/craigz28/firmwalker🔥
IoT Attack Surfaces
19
IoT Attack Surfaces
20
IoT Attack Surfaces
21
IoT Attack Surfaces
22
IoT Attack Surfaces
23
IoT Attack Surfaces
24
Network Focus
25
What they think it is…
Network Focus
26
What it actually is…
Getting Packet Visibility
27
Internet
LAN
PCAP
TAP
Firewall
grep -i “Wombat27!”
Get a Tap
28
Caparser
29
https://github.com/danielmiessler/Caparser
• *Capture all internal
traffic from an internal
ecosystem
• *Exercise the product
fully
• Break the .pcap into its
component parts using
tshark
• Extract any sensitive
content from the .pcap.
• Associate the sensitive
content with where it’s
being sent
tshark(s)
30
tshark -r diphone.pcap -q -z conv,ip | awk '{print $3}' | grep "^[0-9]" | sort | uniq | awk '{print $1}'
tshark(s)
31
tshark -r diphone.pcap -q -z conv,ip | awk '{print $3}' | grep "^[0-9]" | sort | uniq | awk '{print $1}'
Caparser Output
32
Enterprise IoT
33
Enterprise IoT
(attack surface)
34
• The biggest threat to enterprises from IoT
is not any specific technology, but
blindness to the attack surface.
‣ Device
‣ Sensors
‣ Administration
‣ Firmware
‣ Network
‣ Mobile
‣ Cloud
‣ Backend APIs
‣ Third-party integrations
Enterprise IoT (understand)
35
•Above all else, you have to understand the
components and structure of the system
you’re deploying into your companies.
‣ How many devices?
‣ What types of sensors?
‣ What network are they on?
‣ How are they administered?
‣ What ports are open on these systems?
‣ How is authentication and authorization performed?
Enterprise IoT (assess)
36
•This means doing an IoT deployment risk
assessment before implementing any
solution.
‣ What data is being captured?
‣ Via what sensors?
‣ Where is it being sent?
‣ How is it being stored?
‣ Who has access to it?
‣ How will it be updated if a flaw is found?
‣ What can those systems access if they’re compromised?
‣ How bad would it be if this system was unavailable?
‣ What would we do if that happened?
Enterprise IoT (data)
37
•Increasingly, we’re going to have to start
thinking about what sensors can perceive,
how that data can be leaked, and the
implications thereof.
‣ Installed systems
‣ Wearables
‣ Are they recording video?
‣ Are they recording audio?
‣ How easy is it to share that content outside?
‣ What could happen if that content went public?
> New sensor project that connects to electrical sockets and tells
you what’s happening inside your house.
Enterprise IoT (ransomware)
38
•The way to think about ransomware is this:
if it’s important to you, they’re coming
for it.
‣ Infrastructure
‣ Data
‣ Connectivity
‣ Devices
‣ Systems
‣ IoT
Enterprise IoT
(three trends)
39
1. We depend on everyday things (lights,
cars, factories, cameras, logistics) to do
business
Enterprise IoT
(three trends)
40
1. We depend on everyday things (lights,
cars, factories, cameras, logistics) to do
business
2. You gain business efficiency when those
things are network enabled (IoT)
Enterprise IoT
(three trends)
41
1. We depend on everyday things (lights,
cars, factories, cameras, logistics) to do
business
2. You gain business efficiency when those
things are network enabled (IoT)
3. Attackers now have a new way to harm
your business.
Takeaways
42
Takeaways
43
1. IoT is about everyday objects becoming interactive.
Takeaways
44
1. IoT is about everyday objects becoming interactive.
2. The IoT attack surface is vastly underestimated.
Takeaways
45
1. IoT is about everyday objects becoming interactive.
2. The IoT attack surface is vastly underestimated.
3. Before you deploy IoT internally, you need a risk assessment on
that specific ecosystem.
Takeaways
46
1. IoT is about everyday objects becoming interactive.
2. The IoT attack surface is vastly underestimated.
3. Before you deploy IoT internally, you need a risk assessment on
that specific ecosystem.
4. Consider what’s being captured, via what methods, and how it’s
being stored and accessed.
Takeaways
47
1. IoT is about everyday objects becoming interactive.
2. The IoT attack surface is vastly underestimated.
3. Before you deploy IoT internally, you need a risk assessment on
that specific ecosystem.
4. Consider what’s being captured, via what methods, and how it’s
being stored and accessed.
5. Be prepared for that system to be compromised or unavailable.
Takeaways
48
1. IoT is about everyday objects becoming interactive.
2. The IoT attack surface is vastly underestimated.
3. Before you deploy IoT internally, you need a risk assessment on
that specific ecosystem.
4. Consider what’s being captured, via what methods, and how it’s
being stored and accessed.
5. Be prepared for that system to be compromised or unavailable.
6. Expect ransomware attacks, because IoT means putting our critical
dependencies on the network.
Thanks & Contact
49
Daniel Miessler
IOActive
daniel.miessler@ioactive.com
@danielmiessler
danielmiessler.com/podcast

Contenu connexe

Tendances

Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 

Tendances (20)

Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 

Similaire à Practical IoT Security in the Enterprise

[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Pierre Metivier
 

Similaire à Practical IoT Security in the Enterprise (20)

The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Is there such a thing as the internet of things !
Is there such a thing as the internet of things !
 

Plus de Daniel Miessler

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security FrameworkDaniel Miessler
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security FrameworkDaniel Miessler
 
Evolution of The Application
Evolution of The ApplicationEvolution of The Application
Evolution of The ApplicationDaniel Miessler
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesDaniel Miessler
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesDaniel Miessler
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResilienceDaniel Miessler
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Daniel Miessler
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015Daniel Miessler
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingDaniel Miessler
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryDaniel Miessler
 

Plus de Daniel Miessler (10)

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Evolution of The Application
Evolution of The ApplicationEvolution of The Application
Evolution of The Application
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing Methodologies
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to Resilience
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 

Dernier

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Practical IoT Security in the Enterprise

  • 1. Securing IoT in the Enterprise Daniel Miessler May 2017
  • 2. Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017
  • 3. About 3 - Infosec for around 18 years - Mostly technical testing and enterprise consulting - Net / app / web / mobile / IoT - Director of Advisory Services for IOActive - I do a weekly show on infosec, technology, humans - Reading, writing, table tennis - Wrote a book: “The Real Internet of Things” - @danielmiessler
  • 4. Discuss 4 - A functional definition of IoT - The IoT Attack Surface - Securing IoT in the Enterprise - IoT and Ransomware
  • 5. What is IoT 5 - Lots of definitions out there. - Some are based on connectivity. - Some require “embedded”. - “OXFORD(ish): An extension of the Internet where everyday objects have network connectivity, allowing them to send and receive data.”
  • 8. IoT Security != Device Security 8 What they think it is…
  • 9. IoT Security != Device Security 9
  • 10. IoT Security != Device Security 10
  • 11. IoT Security != Device Security 11
  • 13. OWASP IoT Security 13 • Attack surfaces • Vulnerabilities • Medical Devices • Firmware Analysis • IoT Event Logging • ICS / SCADA
  • 14. OWASP IoT Security 14 • Ecosystem (general) • Device Memory • Device Physical Interfaces • Device Web Interface • Device Firmware • Device Network Services • Administrative Interface • Local Data Storage • Cloud Web Interface • Third-party Backend APIs • Update Mechanism • Mobile Application • Vendor Backend APIs • Ecosystem Communication • Network Traffic • Privacy • Sensors
  • 25. Network Focus 25 What they think it is…
  • 26. Network Focus 26 What it actually is…
  • 29. Caparser 29 https://github.com/danielmiessler/Caparser • *Capture all internal traffic from an internal ecosystem • *Exercise the product fully • Break the .pcap into its component parts using tshark • Extract any sensitive content from the .pcap. • Associate the sensitive content with where it’s being sent
  • 30. tshark(s) 30 tshark -r diphone.pcap -q -z conv,ip | awk '{print $3}' | grep "^[0-9]" | sort | uniq | awk '{print $1}'
  • 31. tshark(s) 31 tshark -r diphone.pcap -q -z conv,ip | awk '{print $3}' | grep "^[0-9]" | sort | uniq | awk '{print $1}'
  • 34. Enterprise IoT (attack surface) 34 • The biggest threat to enterprises from IoT is not any specific technology, but blindness to the attack surface. ‣ Device ‣ Sensors ‣ Administration ‣ Firmware ‣ Network ‣ Mobile ‣ Cloud ‣ Backend APIs ‣ Third-party integrations
  • 35. Enterprise IoT (understand) 35 •Above all else, you have to understand the components and structure of the system you’re deploying into your companies. ‣ How many devices? ‣ What types of sensors? ‣ What network are they on? ‣ How are they administered? ‣ What ports are open on these systems? ‣ How is authentication and authorization performed?
  • 36. Enterprise IoT (assess) 36 •This means doing an IoT deployment risk assessment before implementing any solution. ‣ What data is being captured? ‣ Via what sensors? ‣ Where is it being sent? ‣ How is it being stored? ‣ Who has access to it? ‣ How will it be updated if a flaw is found? ‣ What can those systems access if they’re compromised? ‣ How bad would it be if this system was unavailable? ‣ What would we do if that happened?
  • 37. Enterprise IoT (data) 37 •Increasingly, we’re going to have to start thinking about what sensors can perceive, how that data can be leaked, and the implications thereof. ‣ Installed systems ‣ Wearables ‣ Are they recording video? ‣ Are they recording audio? ‣ How easy is it to share that content outside? ‣ What could happen if that content went public? > New sensor project that connects to electrical sockets and tells you what’s happening inside your house.
  • 38. Enterprise IoT (ransomware) 38 •The way to think about ransomware is this: if it’s important to you, they’re coming for it. ‣ Infrastructure ‣ Data ‣ Connectivity ‣ Devices ‣ Systems ‣ IoT
  • 39. Enterprise IoT (three trends) 39 1. We depend on everyday things (lights, cars, factories, cameras, logistics) to do business
  • 40. Enterprise IoT (three trends) 40 1. We depend on everyday things (lights, cars, factories, cameras, logistics) to do business 2. You gain business efficiency when those things are network enabled (IoT)
  • 41. Enterprise IoT (three trends) 41 1. We depend on everyday things (lights, cars, factories, cameras, logistics) to do business 2. You gain business efficiency when those things are network enabled (IoT) 3. Attackers now have a new way to harm your business.
  • 43. Takeaways 43 1. IoT is about everyday objects becoming interactive.
  • 44. Takeaways 44 1. IoT is about everyday objects becoming interactive. 2. The IoT attack surface is vastly underestimated.
  • 45. Takeaways 45 1. IoT is about everyday objects becoming interactive. 2. The IoT attack surface is vastly underestimated. 3. Before you deploy IoT internally, you need a risk assessment on that specific ecosystem.
  • 46. Takeaways 46 1. IoT is about everyday objects becoming interactive. 2. The IoT attack surface is vastly underestimated. 3. Before you deploy IoT internally, you need a risk assessment on that specific ecosystem. 4. Consider what’s being captured, via what methods, and how it’s being stored and accessed.
  • 47. Takeaways 47 1. IoT is about everyday objects becoming interactive. 2. The IoT attack surface is vastly underestimated. 3. Before you deploy IoT internally, you need a risk assessment on that specific ecosystem. 4. Consider what’s being captured, via what methods, and how it’s being stored and accessed. 5. Be prepared for that system to be compromised or unavailable.
  • 48. Takeaways 48 1. IoT is about everyday objects becoming interactive. 2. The IoT attack surface is vastly underestimated. 3. Before you deploy IoT internally, you need a risk assessment on that specific ecosystem. 4. Consider what’s being captured, via what methods, and how it’s being stored and accessed. 5. Be prepared for that system to be compromised or unavailable. 6. Expect ransomware attacks, because IoT means putting our critical dependencies on the network.
  • 49. Thanks & Contact 49 Daniel Miessler IOActive daniel.miessler@ioactive.com @danielmiessler danielmiessler.com/podcast

Notes de l'éditeur

  1. Ok, thanks for having me today. We’re going to talk about IoT Security and how it affects the enterprise.
  2. So I wanted to break my comments today into four main areas. A definition of IoT, the IoT Attack Surface, Securing IoT in the Enterprise, and Ransomware
  3. Let’s start with defining IoT.
  4. So with that out of the way, let’s talk about the attack surface that IoT presents.
  5. The central question I had when I got into this was, “How do I conceptualize an approach to hacking a given IoT thing, regardless of what it is?”
  6. People think they have this device.
  7. But it really has a web interface on it.
  8. Oh, and a mobile app.
  9. Oh, and the mobile app works from the internet, so there’s cloud functionality as well.
  10. So after doing a bunch of research on products I created the OWASP Internet of Things project back in like 2010 or so.
  11. So it has a number of sub-projects, each of which lives on its own tab and has its own project leader. The one I want to focus on is the Attack Surfaces.
  12. So here’s the complete list of them, and let’s look very lighting fast at a few of them.
  13. So that was a few of the attack surfaces, but let’s return back to the network. This is what most people assume they have.
  14. But this what the traffic really looks like.
  15. I want to see as many conversations as possible, and know what’s in them, so I built a lab that allowed me to see as many parts of the conversation as possible. I then exercise the app in every way possible, touching every component. Web app, mobile, internet, etc. And what I do is put a HONEY TOKEN into my interactions. Something like Wombat27!
  16. And here’s a tap you can use for this, by the way, if you don’t do it through a virtual network.
  17. So what I did was wrote a tool that automates a lot of this, called Caparser. What it does is: (slide)
  18. A lot of the magic is in this tshark syntax, which finds every IP.
  19. I then use tcpdump to break every conversation out individually into its own pcap. Then I grep for sensitive content in each connection!
  20. So let’s talk about how all this pertains to the enterprise.
  21. You can’t defend what you don’t understand.
  22. New system that plugs sensors into wall outlets and can infer through AI/ML what’s happening in the office.
  23. Maybe you have a system that reads serial numbers. Maybe you have cameras that do OCR. Maybe it’s a heating and lighting system. If you lose money if it’s down, then there’s a good chance you’ll pay for it to be up. Expect ransomware for it. Remember the definition of IoT: Everyday objects put on the network.
  24. As a business, we depend on everyday things.
  25. You make more money when you can control these things using computers.
  26. And attackers can now use these two facts to make billions. This is the simplest way to understand IoT security as it pertains to business.
  27. So here’s a quick encapsulation of what we talked about.
  28. At the highest most important level, IoT means taking things that used to be analog and making them digital.
  29. Most people vastly underestimate how easy it is to attack IoT systems.
  30. You need to assess any IoT system you’re considering putting in your environment across multiple dimensions.
  31. We also need to be thinking about the sensor capabilities of these IoT systems, and how the data they collect will be accessed and used.
  32. We absolutely must be prepared for these essentials to become unavailable or insecure. How do we respond? We can’t wait until it happens to figure that out.
  33. And finally, expect ransom-based attacks to increase as the dependence on IoT increases. The more valuable IoT systems become, the more dependent we’ll be on them, and the more valuable they’ll become to attackers.
  34. So that’s what I wanted to talk about today. I hope you got some value from it, feel free to reach out if you’d like to chat about anything, and I’m happy to take any questions.