Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Akshat Sharma Samarth Shah
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
NETWORK SECURITY.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Session Hijacking & ARP Poisoning Why web security depends on communications security and how TLS everywhere is the only solution.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Software Security Testing Vinay Srinivasan cell:
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
CHAPTER 9 Sniffing.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CLOUD COMPUTING-3.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Introduction to Networking. What is a Network? Discuss in groups.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
Lab #2 NET332 By Asma AlOsaimi.
Network security Vlasov Illia
An Introduction To ARP Spoofing & Other Attacks
CompTIA Security+ Study Guide (SY0-401)
CSCE 548 Student Presentation By Manasa Suthram
Chapter 15: Security.
Instructor Materials Chapter 6 Building a Home Network
Chapter 7: Identifying Advanced Attacks
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Secure Software Confidentiality Integrity Data Security Authentication
Information Technology Deanship
Exam Review.
Cross-Site Request Forgeries: Exploitation and Prevention
CompTIA Security+ Study Guide (SY0-401)
The Internet of Things (IoT)
Man-in-the-Middle Attacks
IS4550 Security Policies and Implementation
Internet of Things (IoT)
Li Yang, Carson Woods (University of Tennessee at Chattanooga
Home Internet Vulnerabilities
Goals Introduce the Windows Server 2003 family of operating systems
Lesson 16-Windows NT Security Issues
AbbottLink™ - IP Address Overview
Tareq Khan, Ph.D. Assistant Professor,
Cengage Learning: Computer Networking from LANs to WANs
Wireless Spoofing Attacks on Mobile Devices
Lecture 36.
Lecture 36.
Presentation transcript:

Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina A& T State University 1

Introduction ❏ The Internet of Things (IoT) is becoming a reality in today’s society. ❏ The IoT can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. ❏ It is important to teach students importance and techniques that are essential in protecting IoT. 2

Importance of IoT Security Bruce Schneier said that while website security is a major issue, the Internet of Things will prove much more difficult to manage. “These are devices that are made cheaply with very low margins, and the companies that make them don’t have the expertise to secure them. 3

Setting up Experiment Environment We set up a Smart Home environment using a Raspberry Pi, Razberry Daughter Board, and Z-Wave sensors. 4

Lab 1: Sniffing of IoT and Its Countermeasures Sniffing is a form of passive attack to learn about the communication between two computers. Remote Access Analysis: Communication between the mobile device and find.zwave.me, and communication between find.zwave.me and Raspberry Pi. User will use find.zwave.me to log into his Raspberry Pi remotely. Observe difference when find.zwave.me is set to “Not a secure connection” or othewise. Local Access Analysis: 5

Students analyzed the web application hosted on the Raspberry Pi. 6 Lab 1: Sniffing of IoT and Its Countermeasures The connection from the Mobile device to the server used TLS 1.2. The certificate appears to be valid, and no issues were reported using Firefox, Internet Explorer, or Chrome. Traffic between the server and the Raspberry Pi also used TLS. Vulnerabilities for TLS were tested on the Raspberry Pi’s implementation using a test script which can be found at

Lab1: Access: find.zwave.me server ❏ Communication between Mobile Device and find.zwave.me is secure ❏ Communication between find.zwave.me and PI is secure (no serious vulnerabilities) ❏ Allows for Client-Initiated Renegotiation: Potential DoS threat ❏ Implements TLS_FALLBACK_SCSV ❏ Implements SSLv3 with RC4 (highly discouraged) 7

Lab 1: Local System Vulnerabilities ❏ Given access to local area network (LAN) where Raspberry Pi is connected with. ❏ No encryption between local computer and the PI ❏ Credentials exchanged in Plain Text 8

Lab1: Local System Vulnerabilities continued 9

Lab 2: Session Hijacking and Replay Attacks Session ID or cookie ID is a unique identifier used to determine communications between two parties. Session hijacking is to first acquire the session ID and then combine with replay attacks to impersonate one party of the communication. Students first discover Session ID between Rasberry Pi and Smart Switch: 10

Lab 2: Session Hijacking and Replay Attacks Students are then asked to use the same session ID to replay the control message from the Raspberry Pi to the smart switches. Students are able to change “on” and “off” easily by replaying the control message with its session ID. 11

Lab 3: ARP Cache Poisoning Attack Man-in-the-Middle (MitM) attacks can be achieved by using ARP cache poisoning on a local network. ARP cache poisoning is an achievable task due to the fact that no authentication mechanism exists for ARP. To begin the attack, the students will need to know the address of the Raspberry Pi and the machine attempting communication with the Raspberry Pi. This information can be given to the students or discovered using wireshark, nmap, or another tool. 12

Lab 3: ARP Cache Poisoning Attack Students are first instructed to modify ARP table so that Host-A’s IP address will be mapped to the MAC address of the attacking PC. Host A IP: Attacking PC MAC: 00:14:22:30:a3:6d. 13 Before attack After attack

Students logged into the Raspberry Pi (Host-B) from the Host-A computer. As the password is sent in plaintext, sniffing shows Raspberry Pi’s login password again. 14 Lab 3: ARP Cache Poisoning Attack Password Revealed by an ARP Cache Poisoning Attack

Lab 4: ARM Stack Exploits and Security Measures The Raspberry Pi B+ uses an ARM11 processor which is based on the ARMv6 architecture. Most mobile devices use ARM because it dissipates less heat and uses less energy than its major competitors. A buffer overflow (BoF) attack is to supply enough data to overfill the buffer, and write malicious data into an area that can be directly called by address. 15

Lab 4: ARM Stack Exploits and Security Measures Students are first asked to write a program called “overflow_exploit” with a typical Buffer Overflow (BoF) program called “vulnerable_callee” that copies the user- supplied parameter into a buffer with fixed size. 16 Starting Memory Address of vulnerable_callee Success BoF attack

EVALUATION AND DISCUSSION These labs are designed to demonstrate attacks and security practices; and show the significance of security in the Internet of Things. The attacks are designed to work against TCP/IP and the Razberry software. These labs do not directly address Z-Wave because it is closed source and resources on Z-Wave are limited. 17

Future works Attacks against the IP camera Attacks on sensors Analyze other protocols such as ZigBee or Bluetooth Low Energy Acquiring a hub for a Smart Home, such as the SmartThings hub and analyze protocols, smartphone app, and hub software 18

Thank you! Questions? 19