Endpoint
7/13/2015
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Internet Of Things Hacking Village Debuts At DEF CON

Apple network storage, Fitbit, a fridge, blood pressure monitor and a HappyCow toy are all fair game in the IoT hacking Village network.

Some of the hottest attractions at the DEF CON hacker conference every year are the themed hacking villages, which are basically hands-on hacking labs, workshops, contests, and conferences within the conference, focused on a specific technology or topic. There's Lockpick Village, for instance, a mainstay at DEF CON for fledgling or experienced lock-pickers, as well as villages in Crypto and Privacy, Social Engineering, Wireless, and most recently, the Industrial Control Systems (ICS) Village that debuted last year.

Now the Internet of Things joins the menu of DEF CON Villages. The new Internet of Things (IoT) Village opens next month during DEF CON 23 in Las Vegas and will include a hacking contest of consumer and office equipment and medical devices, including ASUS and Zyxel home routers; Netgear and Forscam security cameras; a Samsung baby monitor; a Blipcare WiFi Blood Pressure Monitor; Fitbit Araia WiFi Smart scale; a ZKSoftware time clock; Apple Time Capsule Network Storage; Chamberlain garage-door opener; electronic locks from LockState and Hysoon; a Samsung refrigerator; and a toy, the o-spy HappyCow Tank and its camera.

Ted Harrington, a lead organizer of IoT Village and executive partner at Independent Security Evaluators (ISE), says the goal is to help promote more securely built networked consumer devices. "We're going to try to address head-on the looming challenges that are going to arrive with connected devices. One of the things we're constantly seeing is functionality absolutely being considered first, and security implications not being considered at all," Harrington says.

IoT Village evolved out of the so-called SOHOplessly Broken router-hacking contest held at DEF CON 22 last year, which exposed some 15 zero-day flaws in consumer router devices.

"The addition of a dedicated IoT Village just goes to show that there is an increased interest in this area. I'm looking forward to visiting and I hope it includes some hardware hacking as well," says Runa Sandvik, a privacy and security researcher.

Sandvik and security expert Michael Auger next month at Black Hat USA in Las Vegas will reveal their findings of security and privacy vulnerabilities in an interesting and unusual IoT thing: a long-range, precision-guided rifle from TrackingPoint. The rifle has a Linux-based scope as well as a connected trigger mechanism, and comes with its own mobile apps for downloading videos, and for providing information to the firearm such as weather information.

Why hack networked rifles? "It seemed like a crazy and fun project concerning a new piece of technology -- the combination of a firearm [and] a computer and network connectivity is not something that has been available to regular consumers before," says Sandvik, who declined to share details about their findings just yet.

[Public safety may finally force Internet of Things manufacturers to start taking security seriously. Read Internet Of Things Security Reaches Tipping Point.]

Meanwhile, the IoT security problem may be more glaring than with other networked devices, but the theme is similar. "In some ways, it's a new challenge and in some ways, it's the same challenge in all systems" that don't have security built in by design, ISE's Harrington says.

The good news for now, however, is that most of the security flaws discovered thus far in IoT devices have mostly a minimal impact overall, security experts say -- for now, anyway.

Harrington says he and the IoT Village team hope to add a networked television to the mix as well.

Among the workshop topics planned so far is "Pwning IoT via Hardware Attacks," showing how physical access allows an attacker to root a device: "The implications are significant for anyone who obtains physical access to a connected device and can then later attack the network it is attached to; for example, a malicious hotel guest could tamper with such a vulnerable connected device and then remotely victimize all future guests," says security researcher Chase Schultz, who will host that session.

DEF CON's IoT Village, which also includes a capture-the-flag and zero-day discovery contest, runs from August 6-9 at DEF CON. This year's conference also will feature new villages dedicated to car hacking and bio hacking (think genetic engineering and human "augmentation"). 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.