iot_and_the_impact_on_security_brian_knopf_issa-oc_july-2014

50
Brian Knopf [email protected] @doyouqa

Upload: brian-knopf

Post on 08-Aug-2015

83 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Brian Knopf

[email protected]

@doyouqa

Page 2: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Director of Application Security, Belkin International (owners of Linksys)

Member, UPnP Task Force

Previously Principal Test Architect, Office of the CTO at Rapid7

20+ years of experience in IT, QA, Development and Security

Programming, disassembling and reverse engineering since age 5

Page 3: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

What is IoT?

Why is IoT Important?

Components of IoT

IoT Attacks

How Do I Protect My Environment?

Future of IoT

Conclusion

Page 4: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: Wikipedia.org http://en.wikipedia.org/wiki/IOT

Page 5: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: Gartner http://www.gartner.com/newsroom/id/2636073

Page 6: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Originated at the Auto-ID center at MIT

Started with RFID, Electronic Product Code tags to connect devices

Self-configuring was the key

Evolved into connected advanced wireless devices

No single IoT protocol currently

Page 7: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: Gartner http://www.gartner.com/newsroom/id/2636073

Page 8: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Hundreds of manufacturers creating devices

Everyday devices now connected and communicating valuable data

Makes environments smarter

Improves power conservation

Provides sense of security

Connects M2M and M2B

Page 9: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Pain Management 1970’s Pain Management 2010’s

Page 10: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: Postscapes http://postscapes.com/what-exactly-is-the-internet-of-things-infographic

Page 11: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Turn your electronics on/off, monitor them from anywhere

• Create rules, schedules, and receive notifications

• Get insight into home energy or water usage

• Compatible with iOS and Android

Source: http://www.belkin.com

Page 12: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• GPS tracking device for pets

• Track how much exercise they get

• Receive notifications when they leave user configured zone

• Uses Google Maps for setup

• Mobile and web apps for tracking and notifications

• Same technology used to track company vehicles

• Now cheaper and more accessible to average person

Source: http://www.pettracker.com/

Page 13: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• 3-factor authentication (Nymi, smart phone, cardiac rhythm)

• Integration with Windows, Mac OS, Android, and iOS

• Uses Bluetooth Low Energy

• Motion detection for gesture recognition

• Looking at integration with cars to unlock and start them

• Potential to replace identification or PIN for financial transactions

• Is this more secure than a password?

Source: http://www.getnymi.com

Page 14: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Protocols• ZigBee• Z-Wave• 6LoWPAN• NFC• RFID• Bluetooth• Bluetooth Low Energy• INSTEON• Lutron• MQTT

Source: Postscapes http://postscapes.com/what-exactly-is-the-internet-of-things-infographic

Page 15: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

IEEE 802.15.4

2.4GHz frequency worldwide (16 channels)

Regional 915Mhz (Americas) & 868Mhz (Europe)

Powered and battery operated devices

Multiple star topology and inter-personal area network (PAN) communication

AES-128 security

2010 – 40% Market Share

2016 – 55% Market Share

Page 16: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

ZC

ZED

ZRZR

ZED ZED ZED

ZR

ZED

ZED

ZR

ZED

ZED

ZED

ZED

ZigBee Mesh

Network

ZigBee Coordinator - ZC

ZigBee Router - ZR

ZigBee End Device - ZED

• ZigBee Coordinator - ZC

• Only one

• Trust Center

• Network information

• ZigBee Router - ZR• Plug-in not battery

powered

• Passes data from ZED to ZC

• MitM Heaven

• ZigBee End Device - ZED• Talks to ZC or ZR

Page 17: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: Postscapes http://postscapes.com/what-exactly-is-the-internet-of-things-infographic

Page 18: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Hardware, software, protocol solutions

Allow innovation and automation

Software connects APIs between services

Hardware to speak to everything

Protocol to bridge physical layer

Sources: http://www.ifttt.com, http://www.ninjablocks.com, http://www.revolv.com,

Page 19: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Access to personal information

Can be used to protect physical location

Share some technology with traditional networked devices

Updates are mostly manual if available

Some endpoint devices are not updateable at all (ZigBee, Z-Wave)

Consumers rarely think about patching

Consumers are dependent on manufacture updates

Many built on SDKs from chip vendors and manufactures with no security expertise

Use 3rd Party libraries as black boxes

Page 20: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Consumer - Loosely connected devices that may or may not have rules integrating them

Enterprise – Technologies like Closed Loop Lifecycle Management (CL2M) enable businesses to see how their products are being used, track maintenance status, and share information securely

Enterprise users are charging, synching, and connecting IoT devices to corporate assets

The dividing line will disappear

Page 21: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Sources: http://www.vizualiiz.com, http://professional.medtronic.com, http://www.nike.com, http://www.progressive.com, http://retailnext.net, http://www.skylanders.com, https://onlycoin.com

Banking

Insurance

Retail

Health

& Fitness

Medical

Entertainment

Asset

Management

Page 22: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Sources: http://www.getnymi.com, http://www.yubico.com, http://myidkey.com/

Do these improve security or make people feel safer?

Page 23: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Some IoT devices rely on Wi-Fi credentials only

Hard to use products fail

Accounts should depend on class of products

Take measures to counter ease of use & improve security

Perception vs Reality

P2P vs Server Relay

Which is safer?

Page 24: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Page 25: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

IoT protocols open parallel wireless networks

Strong encryption + bad implementation = 0 benefit

Increase in attack surface

More devices to patch and maintain

Cannot backport fixes

Dependent on vendor updates

Where do IT teams draw the responsibility line?

Page 26: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Impact of IoT on BYOD

What is allowed on systems?

What is allowed in the network?

What glue services make sense for your company?

Is it worth the risk?

How can you stop them?

Are you watching outbound?

Page 27: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: http://www.veracode.com

Page 28: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

3rd party libraries getting attacked

Developers select based on features and popularity

Rarely audit code or understand them

Poorly architected, bad code, and not well reviewed

Critical Vulns UPnP (libupnp, miniupnp)

GnuTLS

OpenSSL

GoToFail (Apple SSL)

OpenSSH

LibYAML

Page 29: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Page 30: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Researcher: Nitesh Dhanjani

• User browses to website containing Java exploit code

• Laptop on network compromised with malware

• Infected laptop turns lights off

• Attack pauses when bridge is unplugged

• Attack resumes when bridge is plugged back in

Exploit Source: Nitesh Dhanjani http://www.dhanjani.com/blog/2013/08/hacking-lightbulbs.html

Page 31: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Researcher: HD Moore

• Cameras were searchable on Internet

• Scanned 3% of Internet

• Found 250,000 devices running services, 5000 vulnerable

• Some vendors had disabled auto answer by default

• Able to capture passwords and documents

• Audio outside rooms was captured

Exploit Source: HD Moore, R7 http://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html?_r=0

Page 32: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Researcher: Daniel Crowley

• No authentication on web console

• Unconfirmed authentication bypass

• Firmware can be modified from attacks

• Server-side request forgery enables devices to bypass firewall and be used as a proxy

Exploit Source: Daniel Crowley of Trustwave SpiderLabs https://www.youtube.com/watch?v=PSRPE49lGYw

Page 33: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Used UPnP buffer overflow to exploit WeMo

• Able to turn on and off the device rapidly

• We had a patch available before the researcher notified us of the issue

• Valid UPnP requests still work within the network

Exploit Source: Daniel Buentello using UPnP vulnerability discovered by HD Moore http://hackaday.com/2013/01/31/turning-the-belkin-wemo-into-a-deathtrap/

Page 34: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Page 35: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

2010 study by Tufin Technologies, supported by UK's Association of Chief Police Officers

"...23% of "uni" students have hacked into IT systems.

32% thought hacking was "cool.“

28% considered it to be easy.

The hackers offered a variety of motivations for their behavior: curiosity, fun, while "an entrepreneurial 15% revealed that they hacked to make money.“

Source: Fast Company http://www.fastcompany.com/1690541/it-security-firm-fear-students, image from Infosec Reactions - http://securityreactions.tumblr.com/

Page 36: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Exploit Source: Joshua Wright http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf

• Researcher: Joshua Wright

• Presented at ToorCon 11 - 2009

• Framework for ZigBee exploitation

• Presentation and source are easy to find

• Hardware is cheap and easy to get

• Wireshark has built in tool for cracking ZigBee Network (NWK) encryption

Page 37: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Page 38: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Source: https://greatscottgadgets.com/ubertoothone/, http://www.kismetwireless.net

• Open source affordable Bluetooth development platform

• Class 1 Bluetooth device

• Bluetooth & BTLE injection & monitoring

• 802.11 FHSS monitoring and injection

• Basic spectrum monitoring

• Works with Kismet sniffer

• Commercial Bluetooth equipment starts at $10,000

• Cost: $115

Page 39: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

10 MHz to 6 GHz operating frequency

Half-duplex transceiver

Compatible with GNU Radio, and Software Defined Radio (SDR)

Software-configurable RX and TX gain baseband filter

Open source hardware

Lots of applications already written to decode wireless using this

Cost: $330

Source: https://greatscottgadgets.com/hackrf/, http://www.sharebrained.com/2014/05/28/portapack-h1-imminent/

Page 40: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Universal bus interface

Talks to most chips via PC serial terminal

Comes with debugger software and BIOS/flash programmers

Cost: $30

Source: http://dangerousprototypes.com/docs/Bus_Pirate

• Supports

• 1-Wire

• I2C

• SPI

• JTAG

• Asynchronous serial

• MIDI

• PC keyboard

• HD44780 LCD

• & more

Page 41: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Texas Insturments CC1110

2x SmartRF boards

1 Debugger

Documentation

Software for sniffing & controlling hardware

Flash programmer

Cost: $76

Paired with Z-Force exploit framework from researchers

Source:Behrang Fouladi & Sahand Ghanoun, Sensepost http://research.sensepost.com/conferences/2013/bh_zwave, http://research.sensepost.com/tools/embedded/zforce

Page 42: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Page 43: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Offensive Security Defensive Security

Page 44: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

New technologies, limited standards, competing protocols, and more attack surface may scare you…

GO BACK TO BASICS

• Secure By Design

• Secure By Default

• Secure In Deployment

• Defense In Depth

Page 45: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Secure by Design

Secure architecture and code

Threat analysis

Vulnerability reduction

Secure by Default

Attack surface area reduced

Unused features turned off by default

Minimum privileges used

Secure in Deployment

Protection: Detection, defense,

recovery, and management

Process: How to guides, architecture

guides

People: Training

Source: Josh Abraham (Jabra)

Page 46: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Defense In Depth is critical

Separate classes of systems, devices, and users

What do IoT devices need access to?

Limit password reuse

Password Management

Multi-factor authentication

Page 47: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Industry collaboration to improve security of embedded OS and protocols is critical

Groups like BuildItSecure.ly trying to improve collaboration between vendors and security researchers

Improvements to standards like ZigBee HA 1.3

UPnP+ certification requiring Device Protection

Secure Elements / TPM for firmware protection

Page 48: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

• Does deploying biometric sensors to employees put a company at risk if the data is compromised?

• What compliance issues arise based on the data being collected and whether companies have access to it?

Source: http://www.computerworld.com/s/article/9247137/Pros_and_Cons_of_Using_Fitness_Trackers_for_Employee_Wellness?taxonomyId=220

Page 49: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

IoT brings awareness, automation, & security to enterprise environments

Rapid growth of IoT devices and vendors without security focus

Insecure devices expanding network attack surface

Plan your IoT implementation based on use cases

Select devices to fit use cases rather than individual issues

Threat Model, plan, remediate, mitigate

The protection line has moved, adjust your goals

Page 50: IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014

Thank you for attending

Contact [email protected] for additional information on IoT & Security

Thanks to Amanda Honea, Dianne Asis, & my family for their support

Thanks to Terry Gold for the invitation and in-depth biometrics discussions

Questions?