Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/13/2015
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Internet Of Things Hacking Village Debuts At DEF CON

Apple network storage, Fitbit, a fridge, blood pressure monitor and a HappyCow toy are all fair game in the IoT hacking Village network.

Some of the hottest attractions at the DEF CON hacker conference every year are the themed hacking villages, which are basically hands-on hacking labs, workshops, contests, and conferences within the conference, focused on a specific technology or topic. There's Lockpick Village, for instance, a mainstay at DEF CON for fledgling or experienced lock-pickers, as well as villages in Crypto and Privacy, Social Engineering, Wireless, and most recently, the Industrial Control Systems (ICS) Village that debuted last year.

Now the Internet of Things joins the menu of DEF CON Villages. The new Internet of Things (IoT) Village opens next month during DEF CON 23 in Las Vegas and will include a hacking contest of consumer and office equipment and medical devices, including ASUS and Zyxel home routers; Netgear and Forscam security cameras; a Samsung baby monitor; a Blipcare WiFi Blood Pressure Monitor; Fitbit Araia WiFi Smart scale; a ZKSoftware time clock; Apple Time Capsule Network Storage; Chamberlain garage-door opener; electronic locks from LockState and Hysoon; a Samsung refrigerator; and a toy, the o-spy HappyCow Tank and its camera.

Ted Harrington, a lead organizer of IoT Village and executive partner at Independent Security Evaluators (ISE), says the goal is to help promote more securely built networked consumer devices. "We're going to try to address head-on the looming challenges that are going to arrive with connected devices. One of the things we're constantly seeing is functionality absolutely being considered first, and security implications not being considered at all," Harrington says.

IoT Village evolved out of the so-called SOHOplessly Broken router-hacking contest held at DEF CON 22 last year, which exposed some 15 zero-day flaws in consumer router devices.

"The addition of a dedicated IoT Village just goes to show that there is an increased interest in this area. I'm looking forward to visiting and I hope it includes some hardware hacking as well," says Runa Sandvik, a privacy and security researcher.

Sandvik and security expert Michael Auger next month at Black Hat USA in Las Vegas will reveal their findings of security and privacy vulnerabilities in an interesting and unusual IoT thing: a long-range, precision-guided rifle from TrackingPoint. The rifle has a Linux-based scope as well as a connected trigger mechanism, and comes with its own mobile apps for downloading videos, and for providing information to the firearm such as weather information.

Why hack networked rifles? "It seemed like a crazy and fun project concerning a new piece of technology -- the combination of a firearm [and] a computer and network connectivity is not something that has been available to regular consumers before," says Sandvik, who declined to share details about their findings just yet.

[Public safety may finally force Internet of Things manufacturers to start taking security seriously. Read Internet Of Things Security Reaches Tipping Point.]

Meanwhile, the IoT security problem may be more glaring than with other networked devices, but the theme is similar. "In some ways, it's a new challenge and in some ways, it's the same challenge in all systems" that don't have security built in by design, ISE's Harrington says.

The good news for now, however, is that most of the security flaws discovered thus far in IoT devices have mostly a minimal impact overall, security experts say -- for now, anyway.

Harrington says he and the IoT Village team hope to add a networked television to the mix as well.

Among the workshop topics planned so far is "Pwning IoT via Hardware Attacks," showing how physical access allows an attacker to root a device: "The implications are significant for anyone who obtains physical access to a connected device and can then later attack the network it is attached to; for example, a malicious hotel guest could tamper with such a vulnerable connected device and then remotely victimize all future guests," says security researcher Chase Schultz, who will host that session.

DEF CON's IoT Village, which also includes a capture-the-flag and zero-day discovery contest, runs from August 6-9 at DEF CON. This year's conference also will feature new villages dedicated to car hacking and bio hacking (think genetic engineering and human "augmentation"). 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17424
PUBLISHED: 2019-10-22
A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
CVE-2019-16404
PUBLISHED: 2019-10-21
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
CVE-2019-17400
PUBLISHED: 2019-10-21
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
CVE-2019-17498
PUBLISHED: 2019-10-21
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a ...
CVE-2019-16969
PUBLISHED: 2019-10-21
In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.