SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
Ashley Shen, Belinda Lai
Senior Threat Analyst at Team T5
ashley@hitcon.org
• Co-founder of HITCON GIRLS
• Malware analysis, Advanced Persistence
Threat research, campaign tracking
• Speaker at HITCON CMT, HITCON ENT,
CodeBlue, Troopers
Brocade Software Engineer
• Co-founder of HITCON GIRLS
• Speaker at HITCON CMT, HITCON ENT
• Malware analysis
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
“The Internet of Things (IoT) is the network
of physical objects that contain embedded
technology to communicate and sense or
interact with their internal states or the
external environment.”
- Definition of IoT by Gartner
Avg:122B?
IHS	Markit
2017	IoT Trend
Report
• A world of connected everyday objects means a bigger attack surface for
cybercriminals.
• Security is often not considered at the design stage.
• AT&T‘s Cybersecurity Insights Report surveyed more than 5,000 enterprises around the world
and found that 85% of enterprises are in the process of or intend to deploy IoT devices. Yet a
mere 10% of those surveyed feel confident that they could secure those devices against hackers.
(2015)
IoT devices will increasingly penetrate the enterprise, leading to
increased IoT DDoS attacks.
The growth in IoT devices provides a newly available slew of poorly protected or
monitored devices that can be coopted for malicious purposes.
IoT devices will play a bigger role in DDoS attacks; IIoT systems in
targeted attacks.
Growth in the number and variety of Internet of Things devices will break some
cloud security models, leading to successful attacks through these devices
The risk of connecting
everything, regardless — in 2016, need we say more?
2015	Cloud	Security	Alliance	- Security	Guidance	for	Early	Adopters	of	the	Internet	of	Things	(IoT)
2013 2014 2017
• IoT security in Healthcare is life or death , specially implantable medical device.
• Not just about the device, but also the environment.
• Hacking into MRI through the hospital guest WI-FI. (ERNW)
Individual
• Privacy
• Physical	Safety	
(Healthcare)
• Personal	identical	
data
http://www.truste.com/blog/wp-content/uploads/smart-devices-circle-of-trust.png
Organization
• Intellectual	property
• DDOS	blackmail
• Services	stability
• Financial
• Domestic	security
• Homeland	security
• Attacks	on	Critical	
Infrastructure	security
• Cyber	espionage	attack
• Politic	&	Financial
Nation
• IoT leverage in cyber
espionage attack.
• 2015 – PLEAD the
Phantom of routers
by Charles & zha0
IoT Security != Device Security
IoT Ecosystem
Sensors
Network
Application
IoT Ecosystem Attack Surface
Sensors
Hardware
Network
Connectivity
Application
Hardware Connectivity Application
Vendor Backend APIs Cloud Web InterfaceDevice Physical Interfaces
Mobile ApplicationLocal Data Storage
Update Mechanism
Device Firmware
Third-party Backend APIs
Network Traffic
Device Memory
Device Web Interface
Device Network Services
Privacy
Authentication/Authorization
Ecosystem Communication
Administrative	Interface
IoTAttackSurfaceAreas
Hardware
Device Physical Interfaces
Local Data Storage
Update Mechanism
Device Firmware
Device Memory
Device Web Interface
Device Network Services
Common	Vulnerability Hacking Tools
• Firmware extraction
• Admin CLI
• Privilege escalation
• Reset to insecure state
• Removal of storage media
• Debug port
• Web vulnerabilities
• Backdoor accounts
• Hardcoded credentials
• Encryption keys (weak or
crackable)
• Encryption (Symmetric,
Asymmetric)
• Sensitive URL disclosure
• Vulnerable services (web, ssh,
tftp, etc.)
• Unencrypted data
• Mousejack - Injecting Keystrokes
into Wireless Mice
• Metasploit - vulnerabilities for
iot (from smart fridges to smart
cars)
• Attify Badge Tool: hardware
device used to hack IoT devices
• Shikra: Hardware hacking tool
box
• Mifare Classic is one of the most used
RFID card.
• The card utilize the standard ISO 14443
Type A protocol for communication on
frequency 13.56 MHz (High Frequency).
• The proprietary cryptography utilized in
the Mifare Classic cards is CRYPTO1, with
48 bits key.
• In October 2008 Radbond University
published a Crypto-1 cipher
implementation as Open Source (GNU
GPL v2 license).
• Tools:
• RFID Reader (about 900 NTD)
• MFOC & MFCUK (Free)
• UID Changeable Mifare (5 NTD)
https://www.blackhat.com/docs/sp-14/materials/arsenal/sp-14-Almeida-Hacking-MIFARE-Classic-Cards-Slides.pdf
Connectivity
Vendor Backend APIs
Third-party Backend APIs
Network Traffic
Ecosystem Communication
• Common	Vulnerability • Hacking Tools
• Weak authentication
• Weak access controls
• Protocol fuzzing
• Injection attacks
• Hidden services
• Unencrypted PII sent
• Encrypted PII sent
• Device information leaked
• Location leaked
• Non-standard
• Wireless (WiFi, Z-wave, XBee,
Zigbee, Bluetooth, LoRA)
• Inherent trust of cloud or mobile
application
• Wifi-hacking: aircrack-ng
• BLE Hacking: Ubertooth One
• Fluxion – WPA/WPA2 Security
Hacked Without Brute Force
• Cain and Abel - penetration
tools
• Fiddler - monitor, manipulate,
and reuse HTTP requests
• Kismet: network detector, packet
sniffer for 802.11 a/b/g/n layers
• GATTracker: BLE Man in the
middle attack
• Bluetooth low energy (a.k.a Bluetooth Smart, Bluetooth 4.0), different from
Bluetooth Classic and high speed
• Designed	to	be	power-efficient,	different	protocol
BLE	authentication	design	challenges	on	smartphone	controlled	IoT devices:	analyzing	Gogoro	Smart	Scooter	by	Chen-yu Dai	[GD]	&	Professor	Shi-Cho	Cha	[CSC]
• Security	Procedures	provided	by	Security	Manager:
• Paring: (Encrypt with Temp Key)
• Security Manager Protocol
• Just Work: No Passkey required. à Man in the Middle Attack
• Passkey	Display:	Passkey	required.
• Out	of	Bound	(OOB):	Passing	through	non-BLE	protocol.	
• Bonding: (Encrypt with permanent key)
• Encryption	Re-establishment (Support Bonding)
• Many BLE Devices do “FAKE PARING”:
• Mi bracelet could be vibrated by
anyone close to you
• No authentication & Paring
• Mi Smart Scale
• Sending data without
encryption
• Anyone could see your
weight when they are close
to you
• Tool: BLE Scanner (app on your
phone)
Application
Cloud Web Interface
Mobile Application
Administrative	Interface
Common	Vulnerability Hacking Tools
• SQL injection
• Cross-site scripting
• Cross-site Request Forgery
• Username enumeration
• Weak passwords
• Account lockout
• Known default credentials
• Transport encryption
• Two-factor authentication
• Insecure password recovery
mechanism
• Two-factor authentication
• SuperPutty : operate all your
VPS
• Hardcode : Android hacking
• AndroRAT : Remote
Administration Tool for Android
• SpoofApp:spoof (Place) calls
with any caller ID number
• APK Inspector:reverse engineer
any android app
• dSploit :perform various attacks
• AnDOSid : perform a DOS attack
• SQLMap: Finding vulnerabilities
on web application
• Androbug: Finding android app
vulunerbilities
• The process of finding targets and
vulnerabilities.
• Tools
• Shodan
• www.shodan.io
• Censys
• censys.io
• ZoomEye
• www.zoomeye.org
• WHOIS
• Netcraft
• Nmap
• Consider security by design, rather
than an afterthought.
• Provide security trainings to
developer.
• Listen to security experts.
• Do penetration testing before
releasing.
• Know what and how much IoT devices you have.
• Device management.
• Know the IoT vulnerabilities.
• Understand the threat (vulnerabilities, attack vector) and defend.
• Securing IoT devices does NOT means simply securing the actual devices
themselves. Companies also need to build security into software applications
and network connections that link to those devices.
• Creating a separate network segment is one option.
• Requiring the vendors to assert that their products aren't vulnerable to
common attacks.
• Understand the risk of your device. (Do not trust them)
• Don’t use them if you don’t want to share your data
• Ensure the default passwords on all devices are changed (using unique,
complex passwords) to prevent them being remotely accessed.
• Review the functionality of a smart device and disable any functions that you
don’t actually need.
Internet of Threat!Things?
HITCON GIRLS Internet Security Group
RFID Card Hacking WIFI Hacking Wall of Sheep BLE Device Hacking Pineapple Router
Web Pentesting Android PentestingMalware AnalysisNewbie Group
Recruiting !!!
https://www.facebook.com/HITCONGIRLS/
• Internet of Things (IoT) History, http://www.postscapes.com/internet-of-things-history/
• 20 Billion Connected Internet of Things Devices in 2017, IHS Markit Says, http://electronics360.globalspec.com/article/8032/20-billion-
connected-internet-of-things-devices-in-2017-ihs-markit-says
• IoT-trend-watch-2017, https://cdn.ihs.com/www/pdf/IoT-trend-watch-2017.pdf
• Sensing-as-a-Service - New Business Models for Internet of Things (IOT), https://www.slideshare.net/mazlan1/sensingasaservice-new-
business-models-for-internet-of-things-iot
• Connecting RFID to IoT, https://image.slidesharecdn.com/internetofthingsiot-160825065927/95/internet-of-things-iot-10-
638.jpg?cb=1472108952
• IoE vs. IoT vs. M2M: What’s the Difference and Does It Matter?, http://blog.aeris.com/ioe-vs.-iot-vs.-m2m-what-s-the-difference-and-
does-it-matter
• The Internet of Things By Samuel Greengard,
https://books.google.com.tw/books?id=oyyyBwAAQBAJ&pg=PA16&lpg=PA16&dq=physical-first+digital-
first+iot&source=bl&ots=IlVCfyMGMM&sig=OHCYXqPAs5FayJ5zcB6mzQ484pQ&hl=en&sa=X&ved=0ahUKEwij5fqwmq7SAhWBgLwK
HdpaDwQQ6AEINzAF#v=onepage&q=physical-first%20digital-first%20iot&f=false
• CISCO Internet of Everthing Infographic, http://internetofeverything.cisco.com/vas-public-sector-infographic/
• https://blog.trendmicro.com.tw/?p=10855
• QUESTIONS
• AND ANSWERS:
• FireEye - THE 2017 SECURITY LANDSCAPE – ASIA PACIFIC 2017, https://www2.fireeye.com/rs/848-DID-242/images/rpt-security-
predictions-2017-
apac.pdf?mkt_tok=eyJpIjoiTWpnNE1EUmlNbUZoWmpVeSIsInQiOiJDY3lUMXBYR2tXdVRIRW81bjlWNEZGREVXMUFwU3d1cmo3MHpM
RG1qWHY4RlQ2N3JaSWQ0MVh3VWc1S3Nhb1JWZTRXTWJMUytjRFROVThRQ01VZDRZdHVYZDdHN1c3dmtEK1wvXC9PSlplN01kc2htN
GxrbEdLRm5zMHZIbFRpNktTIn0%3D
• Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead, https://www.symantec.com/connect/blogs/security-2017-
and-beyond-symantec-s-predictions-year-ahead
• KASPERSKY_SECURITY_BULLETIN_2016,
https://kasperskycontenthub.com/securelist/files/2016/12/KASPERSKY_SECURITY_BULLETIN_2016.pdf
• McAfee Labs 2017 Threats Predictions, https://www.mcafee.com/us/resources/reports/rp-threats-predictions-2017.pdf
• How the Internet of Things will affect security & privacy, http://www.businessinsider.com/internet-of-things-security-privacy-2016-8
• Hackers Remotely Kill a Jeep on the Highway—With Me in It, https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
• 比特幣集體勒索又來了,這次鎖定全臺4千校!不只大學,桃園3小學也出現駭客勒索信, http://www.ithome.com.tw/news/112282
• 2.5萬監視器成DDoS殭屍網路大軍,多數來自台灣 !, http://www.ithome.com.tw/news/106745
• Compromised clinics, hacked MRIs and online breach-traders | MassDevice.com On Call, http://www.massdevice.com/compromised-
clinics-hacked-mris-and-online-breach-traders-massdevicecom-call/
• IoT in Healthcare: Life or Death, Dr. May Wang,
https://webcache.googleusercontent.com/search?q=cache:PF0a41C3ttoJ:https://www.rsaconference.com/writable/presentations/file
_upload/sbx2-r4-iot-in-healthcare-life-or-death.pdf+&cd=1&hl=en&ct=clnk&gl=tw
• Internet of Things (IoT): Security, Privacy and Safety, https://datafloq.com/read/internet-of-things-iot-security-privacy-safety/948
• Does CCTV put the public at risk of cyberattack?, https://securelist.com/blog/research/70008/does-cctv-put-the-public-at-risk-of-
cyberattack/
• University DDoS'd by its own seafood-curious malware-infected vending machines,
https://www.theregister.co.uk/2017/02/13/university_ddosd_by_own_vending_machines/
• Bombs that can recognise their targets are back in fashion, http://www.economist.com/news/science-and-technology/21711012-new-
generation-smart-weapons-development-bombs-can-recognise-their
• Amazon's delivery drones may drop packages via parachute, http://money.cnn.com/2017/02/14/technology/amazon-drone-patent/
• https://www.cyberscoop.com/researchers-hack-robots-killer-industrial-machines/
• Hackers can hijack Wi-Fi Hello Barbie to spy on your children, https://www.theguardian.com/technology/2015/nov/26/hackers-can-
hijack-wi-fi-hello-barbie-to-spy-on-your-children
• Hacking Mifare Classic Cards, https://www.blackhat.com/docs/sp-14/materials/arsenal/sp-14-Almeida-Hacking-MIFARE-Classic-Cards-
Slides.pdf
• Mifare classic-slides, https://de.slideshare.net/nethemba/mifare-classicslides
• 物聯網 BLE 認證機制設計的挑戰 以 Gogoro Smart Scooter 為例, https://hitcon.org/2016/CMT/slide/day1-r0-a-1.pdf
• https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersOllie Whitehouse
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityPriyanka Aash
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchFidelis Cybersecurity
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!centralohioissa
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesNCCOMMS
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingPriyanka Aash
 

Was ist angesagt? (20)

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
 
IOT Security FUN-damental
IOT Security FUN-damentalIOT Security FUN-damental
IOT Security FUN-damental
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber Security
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri Diogenes
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty Training
 

Andere mochten auch

HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎
HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎
HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎HITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣HITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - Belinda
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - BelindaHITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - Belinda
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - BelindaHITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生HITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了HITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - Turkey
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - TurkeyHITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - Turkey
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - TurkeyHITCON GIRLS
 
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料HITCON GIRLS
 
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&TurkeyHITCON GIRLS
 
給軟體工程師的不廢話 R 語言精要班
給軟體工程師的不廢話 R 語言精要班給軟體工程師的不廢話 R 語言精要班
給軟體工程師的不廢話 R 語言精要班台灣資料科學年會
 

Andere mochten auch (9)

HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎
HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎
HITCON GIRLS 資安萌芽推廣 2017: 你知道你連線的網站黑黑的嗎
 
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣
HITCON GIRLS 資安萌芽推廣 2017: 從研究生轉職資安工程師 - 蜘子珣
 
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - Belinda
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - BelindaHITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - Belinda
HITCON GIRLS 資安萌芽推廣 2017: 資安工作很酷嘛?當然! - Belinda
 
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生
HITCON GIRLS 資安萌芽推廣 2017: 密碼學深入淺出 阿毛 - 台科資管碩士生&圓圓 - 台科資管碩士生
 
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了
HITCON GIRLS 資安萌芽推廣 2017: 還能不能好好玩遊戲了
 
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - Turkey
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - TurkeyHITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - Turkey
HITCON GIRLS 資安萌芽推廣 2017: 探索駭客的世界 - Turkey
 
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料
HITCON GIRLS 資安萌芽推廣 2017: 從 CVE 找材料
 
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey
未來大人物【互動工作坊】社群網路滲透生活,我們如何保護個資不外洩 蜘子珣&Turkey
 
給軟體工程師的不廢話 R 語言精要班
給軟體工程師的不廢話 R 語言精要班給軟體工程師的不廢話 R 語言精要班
給軟體工程師的不廢話 R 語言精要班
 

Ähnlich wie 逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)

Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Daniel West
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationAuliaArifWardana
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 

Ähnlich wie 逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai) (20)

Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
IoT security
IoT securityIoT security
IoT security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 

Mehr von HITCON GIRLS

20200810_資訊洩漏所帶來的資安問題_turkey
20200810_資訊洩漏所帶來的資安問題_turkey20200810_資訊洩漏所帶來的資安問題_turkey
20200810_資訊洩漏所帶來的資安問題_turkeyHITCON GIRLS
 
CYBERSEC 2020 臺灣資安大會 windows malware hot 5 - 短短
CYBERSEC 2020 臺灣資安大會 windows malware hot 5  - 短短CYBERSEC 2020 臺灣資安大會 windows malware hot 5  - 短短
CYBERSEC 2020 臺灣資安大會 windows malware hot 5 - 短短HITCON GIRLS
 
HITCON CTF 介紹 - HG 導覽活動
HITCON CTF 介紹 - HG 導覽活動HITCON CTF 介紹 - HG 導覽活動
HITCON CTF 介紹 - HG 導覽活動HITCON GIRLS
 
HITCON CTF 2019 特色 - HG 導覽活動
HITCON CTF 2019 特色 - HG 導覽活動HITCON CTF 2019 特色 - HG 導覽活動
HITCON CTF 2019 特色 - HG 導覽活動HITCON GIRLS
 
HITCON CTF 2017 特色 - HG 導覽活動
HITCON CTF 2017 特色 - HG 導覽活動HITCON CTF 2017 特色 - HG 導覽活動
HITCON CTF 2017 特色 - HG 導覽活動HITCON GIRLS
 
HITCON CTF 2016 特色 - HG 導覽活動
HITCON CTF 2016 特色 - HG 導覽活動HITCON CTF 2016 特色 - HG 導覽活動
HITCON CTF 2016 特色 - HG 導覽活動HITCON GIRLS
 
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdf
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdfiThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdf
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdfHITCON GIRLS
 
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdfiThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdfHITCON GIRLS
 
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom Kim
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom KimBirds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom Kim
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom KimHITCON GIRLS
 
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronBirds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronHITCON GIRLS
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON GIRLS
 
Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)HITCON GIRLS
 
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS
 
HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS
 
HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS
 
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS
 
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS
 

Mehr von HITCON GIRLS (17)

20200810_資訊洩漏所帶來的資安問題_turkey
20200810_資訊洩漏所帶來的資安問題_turkey20200810_資訊洩漏所帶來的資安問題_turkey
20200810_資訊洩漏所帶來的資安問題_turkey
 
CYBERSEC 2020 臺灣資安大會 windows malware hot 5 - 短短
CYBERSEC 2020 臺灣資安大會 windows malware hot 5  - 短短CYBERSEC 2020 臺灣資安大會 windows malware hot 5  - 短短
CYBERSEC 2020 臺灣資安大會 windows malware hot 5 - 短短
 
HITCON CTF 介紹 - HG 導覽活動
HITCON CTF 介紹 - HG 導覽活動HITCON CTF 介紹 - HG 導覽活動
HITCON CTF 介紹 - HG 導覽活動
 
HITCON CTF 2019 特色 - HG 導覽活動
HITCON CTF 2019 特色 - HG 導覽活動HITCON CTF 2019 特色 - HG 導覽活動
HITCON CTF 2019 特色 - HG 導覽活動
 
HITCON CTF 2017 特色 - HG 導覽活動
HITCON CTF 2017 特色 - HG 導覽活動HITCON CTF 2017 特色 - HG 導覽活動
HITCON CTF 2017 特色 - HG 導覽活動
 
HITCON CTF 2016 特色 - HG 導覽活動
HITCON CTF 2016 特色 - HG 導覽活動HITCON CTF 2016 特色 - HG 導覽活動
HITCON CTF 2016 特色 - HG 導覽活動
 
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdf
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdfiThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdf
iThome 資安大會 2019 資安大會_AI 的逆襲,眼見真的為憑嗎? - Turkey&Melody.pdf
 
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdfiThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
 
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom Kim
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom KimBirds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom Kim
Birds of a Feather 2017: 邀請分享 Light Up The Korean DarkWeb - Dasom Kim
 
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronBirds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
 
Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)
 
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
 
HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)
 
HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)
 
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
 
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
 

Kürzlich hochgeladen

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 

Kürzlich hochgeladen (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)

  • 2. Senior Threat Analyst at Team T5 ashley@hitcon.org • Co-founder of HITCON GIRLS • Malware analysis, Advanced Persistence Threat research, campaign tracking • Speaker at HITCON CMT, HITCON ENT, CodeBlue, Troopers
  • 3. Brocade Software Engineer • Co-founder of HITCON GIRLS • Speaker at HITCON CMT, HITCON ENT • Malware analysis
  • 5.
  • 6. “The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.” - Definition of IoT by Gartner
  • 8. • A world of connected everyday objects means a bigger attack surface for cybercriminals. • Security is often not considered at the design stage. • AT&T‘s Cybersecurity Insights Report surveyed more than 5,000 enterprises around the world and found that 85% of enterprises are in the process of or intend to deploy IoT devices. Yet a mere 10% of those surveyed feel confident that they could secure those devices against hackers. (2015)
  • 9. IoT devices will increasingly penetrate the enterprise, leading to increased IoT DDoS attacks. The growth in IoT devices provides a newly available slew of poorly protected or monitored devices that can be coopted for malicious purposes. IoT devices will play a bigger role in DDoS attacks; IIoT systems in targeted attacks. Growth in the number and variety of Internet of Things devices will break some cloud security models, leading to successful attacks through these devices The risk of connecting everything, regardless — in 2016, need we say more?
  • 10.
  • 11.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. 2013 2014 2017 • IoT security in Healthcare is life or death , specially implantable medical device. • Not just about the device, but also the environment. • Hacking into MRI through the hospital guest WI-FI. (ERNW)
  • 18.
  • 19.
  • 20. Individual • Privacy • Physical Safety (Healthcare) • Personal identical data http://www.truste.com/blog/wp-content/uploads/smart-devices-circle-of-trust.png
  • 22. • Domestic security • Homeland security • Attacks on Critical Infrastructure security • Cyber espionage attack • Politic & Financial Nation • IoT leverage in cyber espionage attack. • 2015 – PLEAD the Phantom of routers by Charles & zha0
  • 23.
  • 24. IoT Security != Device Security
  • 26. IoT Ecosystem Attack Surface Sensors Hardware Network Connectivity Application
  • 27.
  • 28. Hardware Connectivity Application Vendor Backend APIs Cloud Web InterfaceDevice Physical Interfaces Mobile ApplicationLocal Data Storage Update Mechanism Device Firmware Third-party Backend APIs Network Traffic Device Memory Device Web Interface Device Network Services Privacy Authentication/Authorization Ecosystem Communication Administrative Interface IoTAttackSurfaceAreas
  • 29. Hardware Device Physical Interfaces Local Data Storage Update Mechanism Device Firmware Device Memory Device Web Interface Device Network Services Common Vulnerability Hacking Tools • Firmware extraction • Admin CLI • Privilege escalation • Reset to insecure state • Removal of storage media • Debug port • Web vulnerabilities • Backdoor accounts • Hardcoded credentials • Encryption keys (weak or crackable) • Encryption (Symmetric, Asymmetric) • Sensitive URL disclosure • Vulnerable services (web, ssh, tftp, etc.) • Unencrypted data • Mousejack - Injecting Keystrokes into Wireless Mice • Metasploit - vulnerabilities for iot (from smart fridges to smart cars) • Attify Badge Tool: hardware device used to hack IoT devices • Shikra: Hardware hacking tool box
  • 30. • Mifare Classic is one of the most used RFID card. • The card utilize the standard ISO 14443 Type A protocol for communication on frequency 13.56 MHz (High Frequency). • The proprietary cryptography utilized in the Mifare Classic cards is CRYPTO1, with 48 bits key. • In October 2008 Radbond University published a Crypto-1 cipher implementation as Open Source (GNU GPL v2 license).
  • 31. • Tools: • RFID Reader (about 900 NTD) • MFOC & MFCUK (Free) • UID Changeable Mifare (5 NTD) https://www.blackhat.com/docs/sp-14/materials/arsenal/sp-14-Almeida-Hacking-MIFARE-Classic-Cards-Slides.pdf
  • 32. Connectivity Vendor Backend APIs Third-party Backend APIs Network Traffic Ecosystem Communication • Common Vulnerability • Hacking Tools • Weak authentication • Weak access controls • Protocol fuzzing • Injection attacks • Hidden services • Unencrypted PII sent • Encrypted PII sent • Device information leaked • Location leaked • Non-standard • Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA) • Inherent trust of cloud or mobile application • Wifi-hacking: aircrack-ng • BLE Hacking: Ubertooth One • Fluxion – WPA/WPA2 Security Hacked Without Brute Force • Cain and Abel - penetration tools • Fiddler - monitor, manipulate, and reuse HTTP requests • Kismet: network detector, packet sniffer for 802.11 a/b/g/n layers • GATTracker: BLE Man in the middle attack
  • 33. • Bluetooth low energy (a.k.a Bluetooth Smart, Bluetooth 4.0), different from Bluetooth Classic and high speed • Designed to be power-efficient, different protocol BLE authentication design challenges on smartphone controlled IoT devices: analyzing Gogoro Smart Scooter by Chen-yu Dai [GD] & Professor Shi-Cho Cha [CSC]
  • 34. • Security Procedures provided by Security Manager: • Paring: (Encrypt with Temp Key) • Security Manager Protocol • Just Work: No Passkey required. à Man in the Middle Attack • Passkey Display: Passkey required. • Out of Bound (OOB): Passing through non-BLE protocol. • Bonding: (Encrypt with permanent key) • Encryption Re-establishment (Support Bonding)
  • 35. • Many BLE Devices do “FAKE PARING”: • Mi bracelet could be vibrated by anyone close to you • No authentication & Paring • Mi Smart Scale • Sending data without encryption • Anyone could see your weight when they are close to you • Tool: BLE Scanner (app on your phone)
  • 36. Application Cloud Web Interface Mobile Application Administrative Interface Common Vulnerability Hacking Tools • SQL injection • Cross-site scripting • Cross-site Request Forgery • Username enumeration • Weak passwords • Account lockout • Known default credentials • Transport encryption • Two-factor authentication • Insecure password recovery mechanism • Two-factor authentication • SuperPutty : operate all your VPS • Hardcode : Android hacking • AndroRAT : Remote Administration Tool for Android • SpoofApp:spoof (Place) calls with any caller ID number • APK Inspector:reverse engineer any android app • dSploit :perform various attacks • AnDOSid : perform a DOS attack • SQLMap: Finding vulnerabilities on web application • Androbug: Finding android app vulunerbilities
  • 37.
  • 38. • The process of finding targets and vulnerabilities. • Tools • Shodan • www.shodan.io • Censys • censys.io • ZoomEye • www.zoomeye.org • WHOIS • Netcraft • Nmap
  • 39.
  • 40. • Consider security by design, rather than an afterthought. • Provide security trainings to developer. • Listen to security experts. • Do penetration testing before releasing.
  • 41. • Know what and how much IoT devices you have. • Device management. • Know the IoT vulnerabilities. • Understand the threat (vulnerabilities, attack vector) and defend. • Securing IoT devices does NOT means simply securing the actual devices themselves. Companies also need to build security into software applications and network connections that link to those devices. • Creating a separate network segment is one option. • Requiring the vendors to assert that their products aren't vulnerable to common attacks.
  • 42. • Understand the risk of your device. (Do not trust them) • Don’t use them if you don’t want to share your data • Ensure the default passwords on all devices are changed (using unique, complex passwords) to prevent them being remotely accessed. • Review the functionality of a smart device and disable any functions that you don’t actually need.
  • 43.
  • 45. HITCON GIRLS Internet Security Group RFID Card Hacking WIFI Hacking Wall of Sheep BLE Device Hacking Pineapple Router Web Pentesting Android PentestingMalware AnalysisNewbie Group Recruiting !!! https://www.facebook.com/HITCONGIRLS/
  • 46.
  • 47. • Internet of Things (IoT) History, http://www.postscapes.com/internet-of-things-history/ • 20 Billion Connected Internet of Things Devices in 2017, IHS Markit Says, http://electronics360.globalspec.com/article/8032/20-billion- connected-internet-of-things-devices-in-2017-ihs-markit-says • IoT-trend-watch-2017, https://cdn.ihs.com/www/pdf/IoT-trend-watch-2017.pdf • Sensing-as-a-Service - New Business Models for Internet of Things (IOT), https://www.slideshare.net/mazlan1/sensingasaservice-new- business-models-for-internet-of-things-iot • Connecting RFID to IoT, https://image.slidesharecdn.com/internetofthingsiot-160825065927/95/internet-of-things-iot-10- 638.jpg?cb=1472108952 • IoE vs. IoT vs. M2M: What’s the Difference and Does It Matter?, http://blog.aeris.com/ioe-vs.-iot-vs.-m2m-what-s-the-difference-and- does-it-matter • The Internet of Things By Samuel Greengard, https://books.google.com.tw/books?id=oyyyBwAAQBAJ&pg=PA16&lpg=PA16&dq=physical-first+digital- first+iot&source=bl&ots=IlVCfyMGMM&sig=OHCYXqPAs5FayJ5zcB6mzQ484pQ&hl=en&sa=X&ved=0ahUKEwij5fqwmq7SAhWBgLwK HdpaDwQQ6AEINzAF#v=onepage&q=physical-first%20digital-first%20iot&f=false • CISCO Internet of Everthing Infographic, http://internetofeverything.cisco.com/vas-public-sector-infographic/ • https://blog.trendmicro.com.tw/?p=10855 • QUESTIONS • AND ANSWERS: • FireEye - THE 2017 SECURITY LANDSCAPE – ASIA PACIFIC 2017, https://www2.fireeye.com/rs/848-DID-242/images/rpt-security- predictions-2017- apac.pdf?mkt_tok=eyJpIjoiTWpnNE1EUmlNbUZoWmpVeSIsInQiOiJDY3lUMXBYR2tXdVRIRW81bjlWNEZGREVXMUFwU3d1cmo3MHpM RG1qWHY4RlQ2N3JaSWQ0MVh3VWc1S3Nhb1JWZTRXTWJMUytjRFROVThRQ01VZDRZdHVYZDdHN1c3dmtEK1wvXC9PSlplN01kc2htN GxrbEdLRm5zMHZIbFRpNktTIn0%3D
  • 48. • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead, https://www.symantec.com/connect/blogs/security-2017- and-beyond-symantec-s-predictions-year-ahead • KASPERSKY_SECURITY_BULLETIN_2016, https://kasperskycontenthub.com/securelist/files/2016/12/KASPERSKY_SECURITY_BULLETIN_2016.pdf • McAfee Labs 2017 Threats Predictions, https://www.mcafee.com/us/resources/reports/rp-threats-predictions-2017.pdf • How the Internet of Things will affect security & privacy, http://www.businessinsider.com/internet-of-things-security-privacy-2016-8 • Hackers Remotely Kill a Jeep on the Highway—With Me in It, https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ • 比特幣集體勒索又來了,這次鎖定全臺4千校!不只大學,桃園3小學也出現駭客勒索信, http://www.ithome.com.tw/news/112282 • 2.5萬監視器成DDoS殭屍網路大軍,多數來自台灣 !, http://www.ithome.com.tw/news/106745 • Compromised clinics, hacked MRIs and online breach-traders | MassDevice.com On Call, http://www.massdevice.com/compromised- clinics-hacked-mris-and-online-breach-traders-massdevicecom-call/ • IoT in Healthcare: Life or Death, Dr. May Wang, https://webcache.googleusercontent.com/search?q=cache:PF0a41C3ttoJ:https://www.rsaconference.com/writable/presentations/file _upload/sbx2-r4-iot-in-healthcare-life-or-death.pdf+&cd=1&hl=en&ct=clnk&gl=tw • Internet of Things (IoT): Security, Privacy and Safety, https://datafloq.com/read/internet-of-things-iot-security-privacy-safety/948 • Does CCTV put the public at risk of cyberattack?, https://securelist.com/blog/research/70008/does-cctv-put-the-public-at-risk-of- cyberattack/ • University DDoS'd by its own seafood-curious malware-infected vending machines, https://www.theregister.co.uk/2017/02/13/university_ddosd_by_own_vending_machines/ • Bombs that can recognise their targets are back in fashion, http://www.economist.com/news/science-and-technology/21711012-new- generation-smart-weapons-development-bombs-can-recognise-their • Amazon's delivery drones may drop packages via parachute, http://money.cnn.com/2017/02/14/technology/amazon-drone-patent/
  • 49. • https://www.cyberscoop.com/researchers-hack-robots-killer-industrial-machines/ • Hackers can hijack Wi-Fi Hello Barbie to spy on your children, https://www.theguardian.com/technology/2015/nov/26/hackers-can- hijack-wi-fi-hello-barbie-to-spy-on-your-children • Hacking Mifare Classic Cards, https://www.blackhat.com/docs/sp-14/materials/arsenal/sp-14-Almeida-Hacking-MIFARE-Classic-Cards- Slides.pdf • Mifare classic-slides, https://de.slideshare.net/nethemba/mifare-classicslides • 物聯網 BLE 認證機制設計的挑戰 以 Gogoro Smart Scooter 為例, https://hitcon.org/2016/CMT/slide/day1-r0-a-1.pdf • https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf