PETIoT: PEnetration Testing the Internet of Things

02/09/2023
by   Giampaolo Bella, et al.
0

Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as well as to gather personal data of the legitimate device owners'. Vulnerability Assessment and Penetration Testing (VAPT) sessions help to verify the effectiveness of the adopted security measures. However, VAPT over IoT devices, namely VAPT targeted at IoT devices, is an open research challenge due to the variety of target technologies and to the creativity it may require. Therefore, this article aims at guiding penetration testers to conduct VAPT sessions over IoT devices by means of a new cyber Kill Chain (KC) termed PETIoT. Several practical applications of PETIoT confirm that it is general, while its main novelty lies in the combination of attack and defence steps. PETIoT is demonstrated on a relevant example, the best-selling IP camera on Amazon Italy, the TAPO C200 by TP-Link, assuming an attacker who sits on the same network as the device's in order to assess all the network interfaces of the device. Additional knowledge is generated in terms of three zero-day vulnerabilities found and practically exploited on the camera, one of these with High severity and the other two with Medium severity by the CVSS standard. These are camera Denial of Service (DoS), motion detection breach and video stream breach. The application of PETIoT culminates with the proof-of-concept of a home-made fix, based on an inexpensive Raspberry Pi 4 Model B device, for the last vulnerability. Ultimately, our responsible disclosure with the camera vendor led to the release of a firmware update that fixes all found vulnerabilities, confirming that PetIoT has valid impact in real-world scenarios.

READ FULL TEXT

page 13

page 14

page 15

page 16

research
02/14/2022

Vulnerability Assessment and Penetration Testing on IP cameras

IP cameras have always been part of the Internet of Things (IoT) and are...
research
08/17/2023

Smart Bulbs can be Hacked to Hack into your Household

The IoT is getting more and more pervasive. Even the simplest devices, s...
research
02/17/2022

Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

We present Alexa versus Alexa (AvA), a novel attack that leverages audio...
research
01/08/2023

A Continent-Wide Assessment of Cyber Vulnerability Across Africa

As the internet penetration rate in Africa increases, so does the prolif...
research
01/29/2019

Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps

Internet of Things (IoT) devices are becoming increasingly important. Th...
research
08/03/2022

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

The ubiquity and pervasiveness of modern Internet of Things (IoT) device...
research
08/18/2020

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Due to the new advancements in automation using Artificial Intelligence,...

Please sign up or login with your details

Forgot password? Click here to reset