Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet of Insecure Things

Similar presentations


Presentation on theme: "Internet of Insecure Things"— Presentation transcript:

1 Internet of Insecure Things
Tanvi Dharmarha, Varun Agarwal | Adobe Systems

2 Buzz around IoT Internet of Things(IoT) has become an industry buzzword and in simplest terms it refers to integration of devices (or things) with the internet.

3 IoT everywhere Cars, electricity bulbs, health monitors, refrigerators and other kitchen appliances, smoke or fire alarms, alarm clocks etc are going smart as they integrate with the internet. As IoT grows in the industry, more devices join the list.

4 Internet of INSECURE Things
Device (Firmware) Internet Backend Data Transmission A flaw or loophole in the device or firmware, in the internet backend or in the data transmission can compromise privacy and security.

5 Default/Hardcoded credentials Firmware Vulnerabilities
Security Concerns Default/Hardcoded credentials Firmware Vulnerabilities Universal Plug and Play(UPnP) HeartBleed Bug

6 Default/Hardcoded credentials Firmware Vulnerabilities
Security Concerns Default/Hardcoded credentials Firmware Vulnerabilities Universal Plug and Play(UPnP) HeartBleed Bug

7 Default/Hardcoded credentials
IoT device manufacturing happens pretty much like non IoT device manufacturing. Not much is spent on firmware hence the firmware contains default or hardcoded credentials for it to work with and connect to backend. Software Lifecycle not followed – Due to conventional manufacturing, cost reductions and early time to market, Software Development Life Cycle (SDLC) is not followed while building firmware for IoT devices. This causes several developmental loopholes which can be exploited; the biggest being unsafe human machine interfaces (HMI).

8 Default/Hardcoded credentials Firmware Vulnerabilities
Security Concerns Default/Hardcoded credentials Firmware Vulnerabilities Universal Plug and Play(UPnP) HeartBleed Bug

9 Firmware Vulnerabilities

10 Default/Hardcoded credentials Firmware Vulnerabilities
Security Concerns Default/Hardcoded credentials Firmware Vulnerabilities Universal Plug and Play(UPnP) HeartBleed Bug

11 UPnP

12 Demystifying Mirai Botnet
What are Botnet Attacks What Is Mirai Mirai Botnet Code Walk Through Command and Control (CNC)

13 DDoS A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

14 Random IP selection do { tmp = rand_next(); o1 = tmp & 0xff; o2 = (tmp >> 8) & 0xff; o3 = (tmp >> 16) & 0xff; o4 = (tmp >> 24) & 0xff; }

15 Random Port Selection ………………….. if (!tcph->syn) continue; if (!tcph->ack) if (tcph->rst) if (tcph->fin) if (htonl(ntohl(tcph->ack_seq) - 1) != iph->saddr) if (n < sizeof(struct iphdr) + sizeof(struct tcphdr)) continue; if (iph->daddr != LOCAL_ADDR) if (iph->protocol != IPPROTO_TCP) if (tcph->source != htons(23) && tcph->source != htons(2323))

16 Password Management Port Management Security Patches OWASP Guidelines
Preventive Steps Password Management Port Management Security Patches OWASP Guidelines

17 DataSets and Predictions
~500K CSV with summary of some real network traffic data date: yyyy-mm-dd (from through ) l_ipn: local IP (coded as an integer from 0-9) r_asn: remote ASN (an integer which identifies the remote ISP) f: flows (count of connnections for that day) Real traces are analyzed to create profiles for agents that generate real traffic for HTTP, SMTP, SSH, IMAP, POP3, and FTP.

18 Emphasize security from day one Lifecycle, future-proofing, updates
Key Takeaways Emphasize security from day one Lifecycle, future-proofing, updates Access control and device authentication Know your enemy Prepare for security breaches

19 For more info, please contact:. Tanvi Dharmarha. tbajajdh@adobe. com
For more info, please contact: Tanvi Dharmarha Varun Agarwal


Download ppt "Internet of Insecure Things"

Similar presentations


Ads by Google