際際滷

際際滷Share a Scribd company logo
Web11Internet security lessons for IoT
Dirk Zittersteyn
Engineer @ HackerOne
Crypto Rule to live by:
Crypto Rule to live by:
Don't build your own
Remember why the good Lord made your eyes,
So dont shade your eyes,
But plagiarize, plagiarize, plagiarize 
Only be sure always to call it please 'research'.
-- Tom Lehrer, "Lobachevsky"
The bulk of this wasn't stolen
from OWASP.
It was researched using sources
including OWASP.
See? There's even a citation!
[1] http://bit.do/iot_sec
Without further ado
Internet security lessons for IoT
!
Internet security lessons for IoT
#1: The internet is evil.
#1: The internet is nuts.
.. is in it 4TehEpicLULZ
.. is a creeeeeepy place
Internet security lessons for IoT
(In)security through
obscurity
Are you sure you're comfortable with this?
Encrypt & Sign
Know Shodan.io exists
Secure by default
Be secure off and online
#2: Proximity != Authority.
Internet security lessons for IoT
Internet security lessons for IoT
I was showing off my home
automation setup to a
neighbor a few days ago,
he's cool techy guy like
myself.
Later I'm pulling out of my
driveway and he runs up and
asks to borrow some flour to
fry wings for an office wing
party/contest
Dude walks up to my front
door and shouts,
"HEY SIRI, UNLOCK THE
FRONT DOOR."
She unlocked the front door.
 /u/sportingkcmo
Don't trust the local network
Don't trust the local area
Pair all wireless components
Be aware of chained behavior
#3: Everybody lies
Internet security lessons for IoT
Internet security lessons for IoT
Internet security lessons for IoT
Don't assume it's a human
Sanity check your input
Don't trust user input
Enforce rate limits
#4: Everybody is dumb.
Internet security lessons for IoT
Internet security lessons for IoT
Internet security lessons for IoT
DON'T MAKE YOUR OWN CRYPTO
Crypto is hard!
Have disaster recovery plans
Enforce secure behavior
#5: Nothing lasts forever.
Internet security lessons for IoT
Internet security lessons for IoT
API's change, deal with it
Update your stack
End of sale != End of life
#6: Weak links are targets
Usability feature
Vulnerability!
Legacy Code
Vulnerability!
Using it wrong
Vulnerability!
No sensitive data
Biggest DDoS ever
Make sure auth is consistent
Remove what isn't used
Don't rely on vendors to "sell it right"
Be concious of other kinds of abuse
#7: Lazy !
DON'T MAKE YOUR OWN CRYPTO
SERIOUSLY!
Have somebody else check for vulns
Pentest and/or auditing
Or.. you know..
Start a bug bounty
program
Or.. you know..
Start a bug bounty
program
I promise I'm biased
 #1: The internet is evil.
 #2: Proximity != Authority.
 #3: Everybody lies
 #4: Everybody is dumb.
 #5: Nothing lasts forever.
 #6: Weak links are targets
 #7: Lazy is the new smart
Dirk Zittersteyn
Internet security lessons for IoT
!

More Related Content

Internet security lessons for IoT