Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
May 10-13, 2022
Hybrid/Marina Bay Sands, Singapore
Black Hat USA
August 6-11, 2022
Las Vegas, NV, USA
Black Hat Europe
December 5-8, 2022
London
End of Bibblio RCM includes -->
1/24/2019
09:00 AM
Dark Reading
Dark Reading
Event Updates

Black Hat Asia Offers New IoT Security Tools & Tricks

Come to Black Hat Asia in March for an expert look at what's happening in the world of Internet of Things, and what you can do to secure it.

The so-called “Internet of Things” grows larger and more complicated every day, and cybersecurity professionals need to stay on top of it.

That’s tricky business now that so many devices are capable of processing and exchanging data, but Black Hat Asia returns to Singapore in March with a smorgasbord of practical Briefings and demos aimed at helping you become an IoT master.

With the leak of Mirai botnet source code back in 2016, countless IoT botnet variants have emerged and evolved as part of a larger trend. Get an inside look at how they work and what they’re up to in “Pwning the Core of IoT Botnets: From a Honeypot to Gigabytes of Botnet Source Code”, a 50-minute Briefing in which you’ll see how even a single honeypot can lead to the discovery of gigabytes of botnet source code, uncovering various dramatic scenes among the bot herders behind the curtain.

In “Dive into VxWorks Based IoT Device: Debug the Undebugable Device” an expert will show at how to debug VxWorks, that popular IoT operating system that can be challenging to test and fix since it’s often running on devices without debuggers. This 50-minute Briefing aims to demonstrate how to find vulnerabilities in VxWorks devices via techniques like fuzzing, and debug VxWorks-based IoT devices without built-in debuggers.

You’ll also want to swing by the Arsenal at Black Hat Asia to check out demos of some of the new open-source tools designed specifically for IoT work For example, capable folks love the notion of a good Swiss army knife, and that’s exactly what “MQTT-PWN: Your IoT Swiss-Army Knife” offers. MQTT is a machine-to-machine connectivity protocol designed as an extremely lightweight publish/subscribe messaging transport, one widely used by millions of IoT devices worldwide. MQTT-PWN intends to be a one-stop-shop for IoT broker penetration-testing and security assessment operations. It combines enumeration, supportive functions and exploitation modules while packing it all within command-line-interface with an easy-to-use and extensible shell-like environment. A full circle scenario of attacks will be demonstrated for you that you won’t want to miss!

Cotopaxi: IoT Protocols Security Testing Toolkit” will also be in the Arsenal this year, and this highly useful toolkit for testing and securing IoT devices is worth checking out since new IoT protocols are being widely used in both public networks and industrial environments. Unfortunately, in most cases those servers are not configured properly or use outdated components. The Cotopaxi toolkit is designed specifically to help ferret out those weak points, using new IoT protocols like CoAP, mDNS, and HTCPCP. Check it out!

And make sure to catch a demo of “IoT Hunter: A Framework Tool for Building IoT Threat Intelligence System,” a tool from the Tencent Antivirus Lab that contains all important modules for IOT threat analysis, including information collection, data extraction, threat data analysis, and intelligence visualization.

IoT Hunter can provide (but isn’t limited to) static information extraction, dynamic operation information extraction, and third-party network platform information. It’s designed to help security researchers quickly and easily build their own IOT intelligence platform for IOT malware research and threat tracking.

Black Hat Asia returns to the Marina Bay Sands in Singapore March 26-29, 2019. Early registration pricing for Briefings & Trainings ends Friday, January 18, so register before then to get the best price!

For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42247
PUBLISHED: 2022-10-03
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.
CVE-2022-41443
PUBLISHED: 2022-10-03
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.
CVE-2022-33882
PUBLISHED: 2022-10-03
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
CVE-2022-42306
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process.
CVE-2022-42307
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.