Abusing the Internet of Things
FIGURE 7-15. Selecting the SMS action channel Click on Activate to activate the SMS channel. You will be asked to enter a valid ...
FIGURE 7-16. Activating the SMS action channel Pull the cloudBit away from the USB power module; this will power it off. Connect ...
FIGURE 7-17. Customizing the trigger SMS message FIGURE 7-18. Doorbell prototype using the cloudBit INTRODUCING THE CLOUDBIT STA ...
FIGURE 7-19. SMS message alert from IFTTT Security Evaluation We now have a working prototype of a wireless doorbell that sends ...
WiFi Insecurity, Albeit Brief One of the first things we did to create a working prototype was to configure the cloudBit to hop ...
POST /set-wifi/ HTTP/1.1 Host: 10.0.0.1 Accept: */* Proxy-Connection: keep-alive Accept-Language: en-us Accept-Encoding: gzip, d ...
computing device infected with malware can automate this process by building the attack vec- tor into the malware code. As IoT d ...
Here we have a situation in which the WiFi password is stored in clear text. What’s more, the pre-shared key (PSK) hash, calcula ...
Now unmount the micro SD card and insert it back into the cloudBit. Once the cloudBit powers on, hold down the setup button for ...
card, which in turn allows anyone with access to the product to analyze the system in real time. The solution here is not to imp ...
FIGURE 7-23. Gathering information about the connected cloudBit using the cloudBit API We needed both the DeviceID and the Acces ...
the final product to be able to expire and refresh the AccessToken. This will prevent the token from persisting forever, which i ...
FIGURE 7-25. Additional IFTTT recipe to sound buzzer Imagine waking up in the middle of the night with your doorbell screeching ...
client device and the microcontroller. The first order of business is to locate the VCC (power), GND (ground), RX (receive), and ...
TIP A simple communications program such as Minicom can be used to connect and interact with the UART. However, we will have to ...
Interfaces such as UART and JTAG can be used to uncover security issues such as global shared encryption keys, which are a bad i ...
employ persistent and sophisticated tactics against specific assets, whereas a disgruntled employee may leverage confidential kn ...
Terrorists While terrorists are known to focus on physical attacks to promote terror, it is only a matter of time before they in ...
erty and financial data. For example, attackers have been able to compromise home refrigera- tors that have Internet connectivit ...
FIGURE 7-27. Internal email message between Sony Pictures executive and producer Scott Rudin leaked as part of the attack Action ...
«
6
7
8
9
10
11
12
13
14
15
»
Free download pdf