Exploring IoT and Firmware Reversing Concepts

introduction to iot and firmware reversing n.w
1 / 28
Embed
Share

Discover the world of IoT and firmware reversing, including applications, protocols, security, and device examples. Learn about the interconnected nature of IoT devices and the protocols used. Uncover the significance of IoT in various industries and its impact on technology.

  • IoT
  • Firmware Reversing
  • Protocols
  • Security
  • Devices

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Introduction to IOT and Firmware Reversing

  2. WhoAmI Security Consultant with Payatu Technologies Experience in Web Pentesting, VAPT and Mobile Appsec (Android Only) and currently learning IOT. Twitter Handle nitmalviya03

  3. Topics to be covered Introduction to IOT IOT Applications Protocols in IOT system Components Involved IOT security Firmware Extraction and Reversing Topics for future session Automated Framework

  4. What is IoT ?? The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data(Wikipedia) Internet of things increases the connectedness of people and things on a scale that once was unimaginable.

  5. Devices like Networking devices(routers, firewalls, IDS) Set-top boxes Medical devices(Health monitors) Mobile phones. Home security systems Vehicles, in-flight entertainment. Thermostats, metering systems, consumer electronics Displays

  6. Information Security Office of Budget and Finance Various Names, One Concept Education Partnership Solutions M2M (Machine to Machine) Internet of Everything (Cisco Systems) World Size Web (Bruce Schneier) Skynet (Terminator movie)

  7. Information Security Office of Budget and Finance Where is IoT? Education Partnership Solutions It s everywhere!

  8. Information Security Office of Budget and Finance Education Partnership Solutions

  9. The IoT Protocols Various protocols used are HTTP WebSocket XMPP Extensible Messaging and Presence Protocol CoAP Constrained Application Protocol MQTT - Message Queue Telemetry Transport AMQP Advanced Message Queuing Protocol

  10. Why be concerned about IoT? It s just another computer, right? All of the same issues we have with access control, vulnerability management, patching, monitoring, etc. Imagine your network with 1,000,000 more devices Any compromised device is a foothold on the network

  11. Attacking IoT Devices Education Partnership Solutions Default, weak, and hardcoded credentials Difficult to update firmware and OS Lack of vendor support for repairing vulnerabilities Vulnerable web interfaces (SQL injection, XSS) Coding errors (buffer overflow) Clear text protocols and unnecessary open ports DoS / DDoS Physical theft and tampering

  12. What we going to discuss Firmware Reversing

  13. What is Firmware Ascher Opler coined the term "firmware" in 1967. Firmware is data that is stored on a computer or other hardware device's read-only memory that provides instruction on how that device should operate. Unlike normal software, firmware cannot be changed or deleted by an without the aid of special programs and remains on that device whether or not it's on or off.

  14. Firmware Extraction Firmware Extraction - Process of extracting firmware from the embedded device Method Embedded Device Firmware Extraction via hardware Interfaces Hex File Conversion to Bin File Bin File Extraction NOTE - We will be learning bin file extraction and not hardware extraction part.

  15. Tools of the trade Binwalk (will be using this) Firmwalk Firmware Modification Kit Firmdyne ERESI Framework FRAK Firmware Reverse Analysis Konsole

  16. What to do ? Get the firmware Reconnaisannce Unpack Localize point of interest Pentest

  17. Any vulnerable bin file for analysis/pentest ?? DVRF - Damn Vulnerable Router Firmware Get it here - https://github.com/praetorian-inc/DVRF For our demo will use dlink firmware -DIR412A1_FW114WWb02.bin Link - http://www.filewatcher.com/m/DIR412A1_FW114WWb02.bin.35349 83-0.html

  18. DEMO TIME

  19. Any website for automated binary analysis ?? Upload your binary file here - http://firmware.re/ Many times it does not work. Thus, not much reliable.

  20. What needs to be covered/learn. QEMU Emulator for running binaries based on MIPS/ARM architecture. Reversing binaries using IDA pro (Useful in login bypass and key extraction) IOT components and its functionalities in depth. IOT protocols

  21. OWASP IOT TOP 10 Various file systems used in IOT devices. Firmware extraction using Hardware Interfaces (UART,JTAG,I2C etc) Firmware Reversing tools apart from binwalk. Common Processor Architectures

  22. Types of memory in embedded devices. Types of storage. Common Operating systems used in embedded devices. Various Bootloaders. Common libraries....

  23. And last but not the least a final and small demo on.

  24. Is there any automated Framework?? Like metasploit we have routersploit Get it here - https://github.com/reverse-shell/routersploit Just run rsf.py and enjoy!!! A very Small Demo

  25. Thank You

  26. References http://www.devttys0.com/ https://www.coursera.org/ http://resources.infosecinstitute.com/

Related


More Related Content