Abusing the Internet of Things

(Rick Simeone) #1
  - Exploiting Key-Exchange Vulnerability


  • Bluetooth Low Energy and Unlocking via Mobile Apps

    • Understanding Weaknesses in BLE and Using Packet-Capture Tools

    • Kevo Mobile App Insecurities



  • Conclusion

  • Thing.

  • The Foscam Incident

    • Foscam Vulnerabilities Exposed by Researchers

    • Using Shodan to Find Baby Monitors Exposed on the Internet

    • Exploiting Default Credentials

    • Exploiting Dynamic DNS

    • The Foscam Saga Continues



  • The Belkin WeMo Baby Monitor

    • Bad Security by Design

    • Malware Gone Wild



  • Some Things Never Change: The WeMo Switch

  • Conclusion

  • 4.Blurred Lines—When the Physical Space Meets the Virtual Space.

    • SmartThings

      • Hijacking Credentials

      • Abusing the Physical Graph

      • SmartThings SSL Certificate Validation Vulnerability



    • Interoperability with Insecurity Leads to...Insecurity

      • SmartThings and hue Lighting

      • SmartThings and the WeMo Switch



    • Conclusion



  • 5.The Idiot Box—Attacking “Smart” Televisions.

    • The TOCTTOU Attack

      • The Samsung LExxB650 Series

      • The Exploit



    • You Call That Encryption?

      • Understanding XOR

      • I call it Encraption



    • Understanding and Exploiting the App World

      • Decrypting Firmware

      • Cursory Exploration of the Operating System

      • Remotely Exploiting a Samsung Smart TV



    • Inspecting Your Own Smart TV (and Other IoT Devices)

      • Say Hello to the WiFi Pineapple Mark V

      • Capturing credentials and stripping TLS



    • Conclusion



  • 6.Connected Car Security Analysis—From Gas to Fully Electric.

    • The Tire Pressure Monitoring System (TPMS)

      • Reversing TPMS Communication

      • Eavesdropping and Privacy Implications

      • Spoofing Alerts



    • Exploiting Wireless Connectivity

      • Injecting CAN Data

      • Bluetooth Vulnerabilities

      • Vulnerabilities in Telematics

      • Significant Attack Surface



    • The Tesla Model S

      • Locate and Steal a Tesla the Old-Fashioned Way

      • Social Engineering Tesla Employees and the Quest for Location Privacy

      • Handing Out Keys to Strangers

      • Or Just Borrow Someone’s Phone

      • Additional Information and Potential Low-Hanging Fruit

      • AutoPilot and the Autonomous Car



    • Conclusion



  • 7.Secure Prototyping—littleBits and cloudBit.

    • Introducing the cloudBit Starter Kit

      • Setting Up the cloudBit

      • Designing the SMS Doorbell

      • Oops, We Forgot the Button!



    • Security Evaluation

      • WiFi Insecurity, Albeit Brief

      • Sneaking in Command Execution

      • One Token to Rule them All

      • Beware of Hardware Debug Interfaces



    • Abuse Cases in the Context of Threat Agents

      • Nation-States, Including the NSA

      • Terrorists

      • Criminal Organizations

      • Disgruntled or Nosy Employees

      • Hacktivists

      • Vandals

      • Cyberbullies

      • Predators



    • Bug Bounty Programs

    • Conclusion

    • Vectors. 8.Securely Enabling Our Future—A Conversation on Upcoming Attack

    • The Thingbots Have Arrived

    • The Rise of the Drones

    • Cross-Device Attacks

    • Hearing Voices

    • IoT Cloud Infrastructure Attacks

    • Backdoors

    • The Lurking Heartbleed

    • Diluting the Medical Record

    • The Data Tsunami

    • Targeting Smart Cities

    • Interspace Communication Will Be a Ripe Target

    • The Dangers of Superintelligence

    • Conclusion



  • 9.Two Scenarios—Intentions and Outcomes.

    • The Cost of a Free Beverage

      • There’s a Party at Ruby Skye

      • Leveraging the BuzzWord

      • The Board Meeting

      • What Went Wrong?



    • A Case of Anger, Denial, and Self-Destruction

      • The Benefit of LifeThings

      • Social Engineering Customer Support by Caller ID Spoofing

      • The (In)Secure Token

      • Total Ownership

      • The Demise of LifeThings



    • Conclusion



  • Index.

Free download pdf