Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
1/24/2019
09:00 AM
Dark Reading
Dark Reading
Event Updates
50%
50%

Black Hat Asia Offers New IoT Security Tools & Tricks

Come to Black Hat Asia in March for an expert look at what's happening in the world of Internet of Things, and what you can do to secure it.

The so-called “Internet of Things” grows larger and more complicated every day, and cybersecurity professionals need to stay on top of it.

That’s tricky business now that so many devices are capable of processing and exchanging data, but Black Hat Asia returns to Singapore in March with a smorgasbord of practical Briefings and demos aimed at helping you become an IoT master.

With the leak of Mirai botnet source code back in 2016, countless IoT botnet variants have emerged and evolved as part of a larger trend. Get an inside look at how they work and what they’re up to in “Pwning the Core of IoT Botnets: From a Honeypot to Gigabytes of Botnet Source Code”, a 50-minute Briefing in which you’ll see how even a single honeypot can lead to the discovery of gigabytes of botnet source code, uncovering various dramatic scenes among the bot herders behind the curtain.

In “Dive into VxWorks Based IoT Device: Debug the Undebugable Device” an expert will show at how to debug VxWorks, that popular IoT operating system that can be challenging to test and fix since it’s often running on devices without debuggers. This 50-minute Briefing aims to demonstrate how to find vulnerabilities in VxWorks devices via techniques like fuzzing, and debug VxWorks-based IoT devices without built-in debuggers.

You’ll also want to swing by the Arsenal at Black Hat Asia to check out demos of some of the new open-source tools designed specifically for IoT work For example, capable folks love the notion of a good Swiss army knife, and that’s exactly what “MQTT-PWN: Your IoT Swiss-Army Knife” offers. MQTT is a machine-to-machine connectivity protocol designed as an extremely lightweight publish/subscribe messaging transport, one widely used by millions of IoT devices worldwide. MQTT-PWN intends to be a one-stop-shop for IoT broker penetration-testing and security assessment operations. It combines enumeration, supportive functions and exploitation modules while packing it all within command-line-interface with an easy-to-use and extensible shell-like environment. A full circle scenario of attacks will be demonstrated for you that you won’t want to miss!

Cotopaxi: IoT Protocols Security Testing Toolkit” will also be in the Arsenal this year, and this highly useful toolkit for testing and securing IoT devices is worth checking out since new IoT protocols are being widely used in both public networks and industrial environments. Unfortunately, in most cases those servers are not configured properly or use outdated components. The Cotopaxi toolkit is designed specifically to help ferret out those weak points, using new IoT protocols like CoAP, mDNS, and HTCPCP. Check it out!

And make sure to catch a demo of “IoT Hunter: A Framework Tool for Building IoT Threat Intelligence System,” a tool from the Tencent Antivirus Lab that contains all important modules for IOT threat analysis, including information collection, data extraction, threat data analysis, and intelligence visualization.

IoT Hunter can provide (but isn’t limited to) static information extraction, dynamic operation information extraction, and third-party network platform information. It’s designed to help security researchers quickly and easily build their own IOT intelligence platform for IOT malware research and threat tracking.

Black Hat Asia returns to the Marina Bay Sands in Singapore March 26-29, 2019. Early registration pricing for Briefings & Trainings ends Friday, January 18, so register before then to get the best price!

For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.