際際滷

際際滷Share a Scribd company logo
Web11Internet security lessons for IoT
Dirk Zittersteyn
Engineer @ HackerOne
Crypto Rule to live by:
Crypto Rule to live by:
Don't build your own
Remember why the good Lord made your eyes,
So dont shade your eyes,
But plagiarize, plagiarize, plagiarize 
Only be sure always to call it please 'research'.
-- Tom Lehrer, "Lobachevsky"
The bulk of this wasn't stolen
from OWASP.
It was researched using sources
including OWASP.
See? There's even a citation!
[1] http://bit.do/iot_sec
Without further ado
Internet security lessons for IoT
!
Internet security lessons for IoT
#1: The internet is evil.
#1: The internet is nuts.
.. is in it 4TehEpicLULZ
.. is a creeeeeepy place
Internet security lessons for IoT
(In)security through
obscurity
Are you sure you're comfortable with this?
Encrypt & Sign
Know Shodan.io exists
Secure by default
Be secure off and online
#2: Proximity != Authority.
Internet security lessons for IoT
Internet security lessons for IoT
I was showing off my home
automation setup to a
neighbor a few days ago,
he's cool techy guy like
myself.
Later I'm pulling out of my
driveway and he runs up and
asks to borrow some flour to
fry wings for an office wing
party/contest
Dude walks up to my front
door and shouts,
"HEY SIRI, UNLOCK THE
FRONT DOOR."
She unlocked the front door.
 /u/sportingkcmo
Don't trust the local network
Don't trust the local area
Pair all wireless components
Be aware of chained behavior
#3: Everybody lies
Internet security lessons for IoT
Internet security lessons for IoT
Internet security lessons for IoT
Don't assume it's a human
Sanity check your input
Don't trust user input
Enforce rate limits
#4: Everybody is dumb.
Internet security lessons for IoT
Internet security lessons for IoT
Internet security lessons for IoT
DON'T MAKE YOUR OWN CRYPTO
Crypto is hard!
Have disaster recovery plans
Enforce secure behavior
#5: Nothing lasts forever.
Internet security lessons for IoT
Internet security lessons for IoT
API's change, deal with it
Update your stack
End of sale != End of life
#6: Weak links are targets
Usability feature
Vulnerability!
Legacy Code
Vulnerability!
Using it wrong
Vulnerability!
No sensitive data
Biggest DDoS ever
Make sure auth is consistent
Remove what isn't used
Don't rely on vendors to "sell it right"
Be concious of other kinds of abuse
#7: Lazy !
DON'T MAKE YOUR OWN CRYPTO
SERIOUSLY!
Have somebody else check for vulns
Pentest and/or auditing
Or.. you know..
Start a bug bounty
program
Or.. you know..
Start a bug bounty
program
I promise I'm biased
 #1: The internet is evil.
 #2: Proximity != Authority.
 #3: Everybody lies
 #4: Everybody is dumb.
 #5: Nothing lasts forever.
 #6: Weak links are targets
 #7: Lazy is the new smart
Dirk Zittersteyn
Internet security lessons for IoT
!

More Related Content

What's hot (17)

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Internet Safety
Internet SafetyInternet Safety
Internet Safety
scar Ortiz Bel辿n
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hacker
Casey Dunham
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
Constantinos Loizou (Msc Engineer)
Rules for success when developing for cameras.
Rules for success when developing for cameras.Rules for success when developing for cameras.
Rules for success when developing for cameras.
Evercam - Construction Time-lapse & Project Management Cameras
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps TutorialGoing LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Dr. Josie Ahlquist
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptx
Technomine
Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
5 Minute Webinars
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
The internet is broken, by Ola Bini
The internet is broken, by Ola BiniThe internet is broken, by Ola Bini
The internet is broken, by Ola Bini
Thoughtworks
Malware
MalwareMalware
Malware
Diven Chen
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
n|u - The Open Security Community
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016
Greg Foss
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
charlesgarrett
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
justin johnson
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hacker
Casey Dunham
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps TutorialGoing LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Going LIVE at #ACPA16 | Streaming Mobile Apps Tutorial
Dr. Josie Ahlquist
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptx
Technomine
Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
5 Minute Webinars
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
The internet is broken, by Ola Bini
The internet is broken, by Ola BiniThe internet is broken, by Ola Bini
The internet is broken, by Ola Bini
Thoughtworks
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016
Greg Foss
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
charlesgarrett
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
justin johnson

Similar to Internet security lessons for IoT (20)

Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Shekh Md Mehedi Hasan
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
Ravi Aggarwal
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Santhosh Tuppad
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
Online reputation
Online reputationOnline reputation
Online reputation
Eslam Mohammed
about cyber bullying -Presentation1.pptx
about cyber bullying -Presentation1.pptxabout cyber bullying -Presentation1.pptx
about cyber bullying -Presentation1.pptx
nazirahmadryk1980
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
mozilla.presentations
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
RajeshArora97
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
Michael Renner
Phd final
Phd finalPhd final
Phd final
Positive Hack Days
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
Ravi Aggarwal
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Santhosh Tuppad
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
about cyber bullying -Presentation1.pptx
about cyber bullying -Presentation1.pptxabout cyber bullying -Presentation1.pptx
about cyber bullying -Presentation1.pptx
nazirahmadryk1980
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
mozilla.presentations
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
RajeshArora97
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
Michael Renner

Recently uploaded (14)

QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro

Internet security lessons for IoT